TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Hacking an Audi: performing a man-in-the-middle attack on FlexRay

85 pointsby pd0wmabout 5 years ago

7 comments

stuff4benabout 5 years ago
I wish I could hack my Lexus RX350's LKAS. It's pretty bad and seems to bounce left and right between the lanes. It gets to the point that I just shut it off since I don't want to fight it when driving long distances as it's very tiring. It's probably a timing issue as the computer isn't getting updates fast enough and has to keep correcting which causes the bouncing between the lane. A Tesla this is not!
评论 #22531016 未加载
评论 #22530387 未加载
评论 #22529297 未加载
评论 #22532718 未加载
评论 #22531342 未加载
评论 #22531214 未加载
评论 #22530615 未加载
_pmf_about 5 years ago
&gt; On the Q8, the FlexRay bus has cycle time of 5 ms, so each ECU can send messages at 200 Hz.<p>That&#x27;s weirdly worded. The cycle repeats (disregarding multiplexed PDUs) every 5 ms, but there are lots of messages within a cycle.<p>Even on CAN, it&#x27;s not uncommon to have &gt; 2000 msg&#x2F;s (looking at Daimler trucks with 70% utilization).
chewsabout 5 years ago
This is a fantastic writeup and it&#x27;s truly brilliant what the very clever folks at comma.ai are up to.<p>Very slick stuff indeed.
harywilkeabout 5 years ago
I really wanted the company to be called &quot;,,,&quot; when i read: &quot;This medium post is about a project by three comma employees&quot;
Glawenabout 5 years ago
They do not know about Vector Canoe ? I did this &quot;hacking&quot; every other day when testing software on a prototype vehicle
评论 #22530482 未加载
评论 #22530299 未加载
评论 #22530268 未加载
评论 #22533277 未加载
ex3ndrabout 5 years ago
I didn&#x27;t get it, FlexRay usually uses end-to-end encryption and it seems that everything is in a plain text? Audi just decided not to encrypt something?
评论 #22533281 未加载
jboy55about 5 years ago
Is this a &#x27;man in the middle&#x27; attack for 3rd party nefarious purposes, like controlling someone else&#x27;s Audi ... Or just plain reverse engineering of a communications protocol to hack the software for 1st party education and extension? Why the click-baity title as if this is some great compromise to the integrity of the Audi? Am I missing something?
评论 #22531552 未加载