DEF CON 31 - Car Hacking Village - Exploiting Wireless Side Channels in EV Charging - Kohler, Baker

DEF CON 31 - Car Hacking Village - Exploiting Wireless Side Channels in EV Charging - Kohler,  Baker

Show Video

Right. So this is Redeploying the Same  Vulnerabilities. This is a talk about EV   security work that we've been doing for a little  while together, and some of how we're seeing the   same vulnerabilities that have existed for a  long time coming back in modern standards.   This is Sebastian, and I'm Richard. We both  work at Oxford University. We've been doing   vehicle security stuff among other stuff for  about five years now, really focusing on EVs,   and charging security, the security when you  plug it in to charge. That's all we're going   to be talking about today, and then some  talks about where that field is going.  

Right. We've probably all seen something  like this, like a charging park as shown   on this slide. Actually back in December,  2022, this was supposed to be the largest   charging park in Europe, with, I believe, 56  charging outlets, DC fast charging outlets.   But this keeps changing. Every week we  hear about the new largest charging park.   But EV charging is not just for cars. We can  now see electric trucks, like this one here.  

Buses, so public transport, is currently  electrified. This shows a bus depot in Hamburg,   and I don't know if you can see, but there are  wires actually hanging down from the ceiling,   and these are charging cables. So all these  buses you can see here are fully electric.   Another example is this... Sorry.  Another example is this ferry. Going to  

switch to this. Yeah. This ferry, you can see it  charges also with... it's electric, and it has 28   charging cables, so they charge simultaneously  with 28 charging cables. But there's also now a   move in the mining industry, so making mining  greener, so electrifying mining equipment.   And yeah, why did I tell you all this? Well,  all of these examples use actually the same   charging standard, which is known as the combined  charging system, or short, CCS. I don't know,  

most of the people are probably familiar with the  left one, which is the combined charging system   plug type one, which is used in the US, and on  the right is the one that is used in Europe.   It's exactly the same technology, underlying  technology, it's just a different plug type.   Of course, there are much more charging  standards, as we can see on this overview   here. But in this talk, we are going to focus on  DC charging using the combined charging system.   So why is CCS so interesting for us? Well CCS  is actually using a power line communication.   So the car and the charger are communicating  during a charging session all the time. So the  

car is telling the charger, "Hey, this is how much  electricity I need. This is the maximum current,   the maximum voltage. This is my state of  charge," and the charger actually confirms   these messages, and also, yeah, exchanges  information about the charging session.  

There is more communication actually going on. For  example, with Plug and Charge, you can actually   plug in your car and leave without tapping a  card or using an app. It will automatically   send your credentials to the charger, and the  charging session will be authenticated.   So yeah, it's quite a detailed charging standard.  There's a range of open standards that underpin   it, and this is why it was quite interesting  to us. It was also getting deployed very,  

very widely even when we first started working  on this. That's a lot of infrastructure that's   being built, going to be expensive, going to  be hard to change. So keen to get in early.   And even then and ever since, we've been finding  insecurities and a lot of charging infrastructure,   and that made us concerned about the  kind of things we were deploying.   So particularly for CCS, we were interested  in this power line communication, because it   comes from a system called HomePlug, which  was originally these little plugin adapters   you'd use at home for wifi extension, and there  were some issues known about these in the past,   and particularly, they were built for a  different threat model--in-home, shared keys,   not a kind of open public access network.  Also, they were known decades ago, frankly,   to be able to leak their signal radiatively out  of cables. This wasn't necessarily too much of  

a problem at home, but it's interesting when  you see this deployed in a different setting.   And of course, it's part of deploying CCS, and the  new world of connected charging was that there are   lots more services. There's not just talking car  to charger, but also out to systems behind the   scenes providing additional services--automated  billing, reactive charging, load balancing, all of   these things that depend on having a nice secure  link. So it was kind of quite interesting to us.   We'll talk about a couple of bits of work  here. We started with just a purely passive   threat model. So what is it that someone just  eavesdropping might want to do? Well, as ever,  

lift some fingerprints and have some privately  identifiable information, of course. And then also   we thought maybe there'd be some opportunity for  billing fraud here. So there is a system called   auto charge, which a couple of networks implement,  which just uses identifies that are pretty much   public. If someone could lift these then they  could use them to start to pretend to be people.   And threat model's fairly simple. It's a kind  of motivated hobbyist. Not a lot of information,   [inaudible 00:05:50] deep technical knowledge  to fully build systems from scratch, but   someone that can run some code and has access to  off-the-shelf hardware. Not much more than that.  

So for a particular attack, like one example,  we had a look at signal level attenuation   characterization. SLAC. It's a SLAC attack.  This is a system that, in my opinion, probably   shouldn't have existed in the first place. This is  part of the initialization routine of a charging   session, where the car and the charger need to  make sure that even though they're connected with   a big cable, they're actually talking to the right  charger. Because there's so much potential for   crosstalk, conductive or radiative, that you could  just be talking to the charger next door, like   two, three meters away. That seems a little  bit... a bad smell in designing the system.  

Also, there's a big long protocol here.  I mean you initiate the SLAC session,   you test the attenuation, and all  the charges that can hear respond,   and then you pick the one that has the lowest  attenuation. So that's probably the one you're   talking to. In step six and seven, you say, "Oh  okay, I've picked you. You are the charger for me.   Can I join?" And he goes, "Yeah,  sure. The shared key is this." And   that's just in the clear. Unless you've got the  security mode turned on, which we've never seen  

happen, this is just given to the car. And  so anyone that can lift that has a key for   the network. There's some authentication later,  but once you've got the master key, you're in.   So can we do this in the world?   Well, we set up an experiment. So we got a car,  we ran around some charging stations, and then   we just set up software-defined radio. We've done  this with different equipment setups over time.   And just put the antenna at various points in the  car, around, nearby. A bit of an exploratory thing   to just see what kind of signal we could collect  and whether we could use that for something.  

We did quite a sort of long evaluation, 800 miles  of driving, there were three cars at the time.   Every now and then, we pick up an electric  car rental and we tested a bit further,   but even then ,14 locations,  six networks, enough to have a   good overview of what was happening in the  industry, all in the UK where we're from,   but all kinds of places. Service stations,  hotels, wherever we could find a CCS charger.   To put it into a bit of perspective, so  these are places where we're pacing the SDR,   the antennas. Some of it was super,  super close range. You're inside the car,   we're interested in whether this  signal is leaking out from the cable,   whether it's leaking out from the  car, which part of the electronics.   Some of it was further away. You'll notice it's  even sunny in England sometimes, as this picture   shows. Here we've got someone just behind the  car, in a bay behind, probably five meters away,  

and you are not going to suspect someone there  for picking up your signal. And the other one   on the right, it's about four meters away next  bay. But this is a reasonable short distance.   And even some with two vehicles. So this is when  we had the I-PACE and the Gulf at the same time,  

and we just went to, at this point, one  of the bigger charging parks we could get   to. Of course, now that's changed and you  have easily 50. But here, two was enough,   and just one radio share between and  multiple sessions being picked up.   The end result was we picked up a signal basically  everywhere we went. You could certainly see on a   frequency plot, so these plots in the top  right, they're all spectrums. You can see   this distinctive frequency usage that you get  with HomePlug. You notice these deep notches,  

they're in there to not interfere with amateur  bands. The fact that you've got this little   visual fingerprint kind of already tells you that  you are picking up the signal. The other thing to   say is it vastly varied between location, between  site, between charger hardware, how much of this   signal came through, and how much noise. You've  got all of these noise spikes around, you've got   a lot of high-power electrical devices working  there to provide the charging. So you get a lot   of noise when the charging starts. But point is  we could pick up the signal everywhere we went.   And then we built a receiver. So this is open  source, this is entirely software receiver. It  

takes a file in of just the raw signal and then  it processes it and pulls out the packets it   can find. This is pretty much just doing what a  normal modem would do, but it's open instead of   in a proprietary IC. It detects the packet, it  synchronizes on them, it does all the OFDM, and   then at the end, spits out everything it possibly  can. So messages, keys, messages that failed to  

decode, but you might be able to get some data out  of all of these, dumps them into a big database.   As I say, it's available. If it's useful to  community, please use it, please build on it.   This is a big table of numbers. You don't  really need to read or pause it very much.   The important things are probably left-hand  column. Lots and lots of messages, thousands,   big variation. Some sites very bad, some  sites much better, but lots of messages.   Column on the right, these are messages  that fully validated their CRCs, and so   these are ones that are good. So these are both  metrics of how well we were able to pick it up.  

For two examples there next to the cable,  beautiful clean signal, very easy, and is   nearly a hundred percent of the messages that are  valid. They're all modulated slightly differently   depending on which bit of the protocol they're  in. Some of them are easy to pick up than others,   but overall, you can pick up enough to have a  whole session. And a bit further away, of course  

the performance falls down. We're still picking  up some, the bay next door or the bay behind,   and I think with more equipment optimization,  this was just stuff we had in the lab,   you could increase this number further. And then   from that, we ran our bit of code.  It took a long time to perfect,  

but then out of individual messages  we just dumped out values.   What we're seeing here are messages we received  from the end of this SLAC protocol. So you can   see in this key column which messages it's  coming out of and which value we are getting.   Two are interesting here. One, for this  privacy and fingerprints or identifiers issue,   there's a vehicle MAC. We ended up getting  the same cars multiple times over a period   of months. These didn't change. I mean the  MAC addresses, you could rotate them fine,  

but they weren't being rotated. Some  manufacturers and some batches of cars   did not have vehicle unique identifiers,  and we see this happening in auto charge,   actually. Some vehicles are not compatible  because some of the MACs are zeroes.   The majority that we saw did have completely  unique MACs. You can identify that car forever   from that, and you can pick it up later sessions  as normal. Then there's also, of course, the key.   This arrives a few seconds into starting a  session, and you pick it up. I mean that's   the key in plain text there. You also get it  in Wireshark, and then from then on the code  

automatically starts to decrypt the rest  of the session, once it's got that key.   We are also outputting traffic to Wireshark.  It's a little bit of a messy capture here,   but you can kind of see the process evolving.  So at the top, there's this request to get the   master key, that's the stages six and seven  I was talking about before, getting it back,   and then trying to find the controller  that's actually going to initiate the charge.  

Keen observers on the blue lines, it talks support  15118, that's the ISO number of the standard,   that was a kind of fun little Easter  egg, and then it sets up a tunnel and   then sets up higher communication where there's  a whole stack of things. It's IP communication,   then there's TCP on top, then maybe there's crypto  on top of that, and then there's just sending XML   back and forth for state of charge for charging  speed, temperature, and all these other things.   That's also up where you would have automated  billing and stuff, per the standard.   All of those would require you to have a TLS  session. So I'm not saying that there is traffic   for that that we've ever seen unencrypted or  accessible from here. You're only getting the  

lower layers. There's also a lot of support  though for external additional services to be   built on. This is ultimately an IP link, right?  With two Linux boxes either end, you could put   any services you want. You can open additional  ports, you could have a web interface, and so on.   There's some talk about that, although we haven't  seen it much in the wild being deployed. But  

any of that, you're then back into whether the  developer secures that as well as they should.   For the simplest standard, DIN 70121, this is  just charging. There's no security on top of that,   but there's also only so much you can  learn. You can get the identifier out,   you can listen traffic, but there's not  too much important stuff going over it.   There has been laterally some talk about different  approaches to try and secure this. Some people,   one particularly big manufacturer's talking  about just establishing AVPN on top,   which maybe goes back to your own charging  provider. I mean, that or TLS is providing you  

some crypto either way. I think the big problem  is doing the PKI to support this and having the   right keys for the charger, for the car, for the  driver, for everyone involved. Still ongoing.   Right. So as Richard just told us, he  basically found that there is a unique   high quality unintentional wireless channel when  you use PLC charging, or when you use CCS that   uses PLC. The main question we asked ourselves  was can we actually also inject? Because the  

charging cable is a perfect antenna, right?  We can receive, it emits the signal. So can   we also inject into the antenna? We looked at  what can someone do, like a threat model about   active attacks. How can you actually interact with  this communication and what can you do? Since CCS,   or in general, electric vehicles, are becoming  part of critical infrastructure, so they will be   acting as battery buffers for renewable energies.  We will have vehicle-to-grid communication and   feed electricity back into the grid. It's  kind of important that they are available.   So we need this communication otherwise  we will not be able to use these services.   We looked at can we disrupt an individual vehicle?  This actually is probably the weakest motivation,   but we just had it yesterday actually when we  drove here from LA. We wanted to charge our car,  

and all of the chargers were occupied.  Could you interrupt actually one of   the chargers and get the cable? No one  would notice, right? Most of the cars,   I don't know if you're aware of that, but most  of the cars actually unlock the charging cable   if the charging has stopped or is interrupted. We  assume it's a safety feature. But yeah, most of   the cars we tested, actually all of the cars,  I believe, implemented this feature. So yeah,   you could just disrupt a single vehicle, get  the charging cable, charge yours, and be happy.  

But of course there could be another motivation, a  financial motivation, for example. Back in Oxford   in the UK, DPD has fully electric fleet now,  I believe 40 to 50 vehicles fully electric.   So if you can just knock out their entire fleet  so they can't charge let's say during the night,   you could just blackmail them. They will turn  up in the morning and the cars are not charged.   Another motivation could be unspecific  disruption. You try to disrupt as many   cars as possible or as many charging  parks as possible to for example,   disrupt supply chain. We saw earlier buses are  getting electrified, ferries and trucks. If you  

just cause widespread disruption, that's going  to be an issue, especially if we then go a few   years further and look at vehicle-to-grid  communication and bi-directional charging.   Oh yeah, I should mention maybe for this threat  model, for these goals, we assume exactly the   same capabilities. Just access to software-defined  radio or a transmitter off the shelf you can get   from Amazon, and a little bit of knowledge about  digital signal processing. We found Brokenwire,   and Brokenwire exploits the CSMA/CA  mechanism used by HomePlug Green Phy.   How did we actually find this? Well again, we had  this, there is an unintentional wireless channel.  

Can we inject? And then we looked at the standard,  actually, and we found this interesting phrase,   and this phrase basically says that the modem  should consider someone else communicating if   they receive a preamble with two dB above noise.  What this means is basically the receiver or the   transmitter would actually stop transmitting when  someone else is already transmitting to make sure   there is no interference happening. For some  of you who might not be familiar with CSMA/CA,   here's just a diagram how this usually works. Let's assume you have a car and a charger,   and they don't have or wouldn't have CSMA/CA,  the car would send a message, charger replies,   all are happy, but if they send at the same time,  you would have interference. So instead, actually  

the HomePlug Green Phy modem checks.  If the channel is clear to send,   and if it is clear to send, it would send a  message and so on, and if it is actually not   clear to send, and you can see it here, it waits  for a random period of time. So it backs off and   then tries again and checks is the channel now  clear. And if it is, it sends the message.  

On the previous slide I just showed you, the  standard says someone is communicating or the   channel is busy if we see a preamble two dB above  noise. And so what someone could do, actually,   if we now have an attacker, someone could  just, during a communication which is happening   just fine, start sending a signal to make the  channel look busy. So in our case actually,   that is the preamble. So here you can see a  HomePlug Green Phy frame we collected by just   plugging a modem into a software defined radio.  So this is in the time domain, and the first bit  

you can see is the preamble. That is used to  detect if someone is communicating and also do   frequency offset correction and timing. Then you have the frame control and the   legacy frame control and the AV frame control,  and then you have the payload. As I said, this  

was collected while plugging the modem actually  into our receiver, and there is also some noise,   of course. You might have already spotted it,  but there's also another preamble in there.   This is a preamble which is two dB above noise.  This preamble actually already caused the modems   to back off, because they consider this as "Oh,  someone is communicating. I need to stop, I need  

to wait until this communication has ended." When we found this vulnerability, we initially   tested it in our lab. We got these development  boards. These boards have exactly the same   Qualcomm chip as you can find it in charging  stations. It's a QCA 7000. And yeah, as I said,   it's exactly the same chip. We connected one to  Raspberry Pi, and this was our electric vehicle,   and then the other one which was our  charging station. So the Raspberry Pi  

was actually just providing some traffic so  we can measure packet loss and the quality or   examine the quality of the channel, basically. We connected them with a charging cable, and   then we had an attacker, which you can see in the  lower part. We used just a super simple antenna.   It's a very low frequency. So PLCs communicating  at around 2 to 28 megahertz in this band. So we  

set a center frequency to 17 megahertz. We have a  pretty high or large wavelengths, so our antenna   was actually just a bunch of wires, and I have  a photo later where you can see it. We connected   this to a small amplifier and the LimeSDR. This setup cost you maybe... Now the LimeSDR   actually got quite expensive, but it was maybe  250, 300 dollars, before the chip prices, yeah.   We did some experiments in our lab, like in the  university. You can see the HomePlug Green Phy   modems in the back. Our attacker set up in the  front, and this was roughly, I don't know, maybe  

eight, nine meters, and we successfully disrupted  it. So we plotted some graphs. We basically tested   for a given distance how much power do we  need to disrupt this charging communication,   just a HomePlug Green Phy communication. As you  can see, so it's plotted in DBM and milliwatts.   On the left, DBM, you can see that  for distance of 10 meters, we actually   were able to disrupt this communication  with less than 10 DBM or 10 milliwatts.   Your wifi router is probably transmitting at  around a hundred milliwatts. Just to give you   an idea, this is very, very low output power, and  this was from 10 meters away. So we also wanted  

to test, can we actually disrupt between floors  just for the sake of it? And yeah, we were able   to do it. So you can see, on the first floor,  we put the modems there. We didn't even stretch   out the charging cable, so it was like a bunch  of wires or just like a pile of wires. Then we   were the floor below, and we had the antenna lined  up and just transmitted. I can't remember exactly   how much power we had for this experiment, but it  was on the order of 70 to a hundred milliwatts.  

Of course we were curious. Actually, we only  tested this so far in the lab. Can we actually   target stations out in the wild? Can we test this  on real cars? So we got all of our equipment into   the boot of a car. Here actually you can see  in our antenna, which is just a bunch of wires   I mentioned, amplifier, LimeSDR, bench power  supply, which we powered with a UPS. But we   changed the setup, so now we actually just use  a power bank with the step up converter, because   we need 12 volts for the amplifier. So you can  easily fit this in your backpack, for example.   We tested different scenarios. For example, can  I just attach the antenna to the side of the car   or just in the boot and then drive or pass by a  charger? Can we do a scenario where I'm behind   some bushes and disrupt the charging? I  would say scenario two, three, and four   are commonly seen at supermarkets, for example.  Then we did another one which was just focusing  

on distance. So we wanted to see how far can we  actually go, given our power budget of one watt,   which was limited by government regulations.  So we couldn't transmit higher than one watt.   I also want to say we don't reveal which cars we  tested and which chargers, just because we want   to stress it's a standards issue. It's not an  individual car manufacturer who implemented it   wrong. They followed the standard and the standard  like HomePlug Green Phy is just vulnerable.   So these were the cars we tested. This overview  just shows you it's not just cheap cars, it goes  

up to $150,000 cars. So it was actually quite  sad. We had to drive all these cars for quite   a while and then run down the batteries,  charge them again, run down the battery.   So it was quite fun driving the shooting brake.  As you can see, all of them are vulnerable. It  

also doesn't matter what the charging capacity  is. So of course if you charge with a higher   capacity, you might have more noise, but  didn't really matter, it still worked.   We did the distance experiment.  Again, one watt of amplification,  

so roughly one watt, it was just below, and we  were able to disrupt it from around 50 meters.   What can we do to prevent this? To prevent leaking  the signal or actually having the antenna or the   charging cable acting as an antenna, of course  shielding would be the way to go. But actually   shielding doesn't work here very well because the  cable is already quite stiff and heavy. Adding   shielding might reduce the vulnerability  or susceptibility to EMI, but actually in   the end you just increase the power. Since we're  talking about super low transmission power here,   you can buy a 10 watt, 70 watt or  600 watt amplifier in this band and   you would still be good and then you would need  to add more shielding, so it's an arms race.  

Another idea would be upgrade the firmware of  the Qualcomm chip, and if anyone from Qualcomm   is here by any chance, we would be happy to chat  about this, because it would be quite interesting   to know if actually the preamble detection and  the two dB, if this is a threshold which is set   in firmware or if it's a hardware limitation. Then, finally, one thing we noticed, once you   disrupt the charging session, it stays disrupted.  So you would need to walk there, unplug the cable,   plug it in again, tap your card or activate  via the app, or if you have Plug and Charge, I   guess it would do it automatically, but you would  need to re-authenticate, which is a pain because   if you have a... like the DBD fleet I mentioned  earlier, you'd need to go there, disrupt it,   it takes 20 seconds, and then you leave and  it will be disrupted for the whole night. It   automatically doesn't reauthenticate  or recontinue the charging session.  

So we said "Redeploying the Same Vulnerabilities."  Why was this the title of our talk? Well, what is   next? That's the big question. Currently, there  is work going on on the megawatt charging system,   MCS, and interestingly, so it has almost four  megawatt of charging capacity, but interestingly,   it also uses power line communication again.  It uses differential PLC, which should be   not as easy to disrupt, but we haven't tested  it yet, because it's not widely... or it's not  

deployed yet. Just for your information, this is  like the plug. Compared to CCS, it looks quite   similar, but you now have a communication  interface in the middle for twisted pair.   The differential signaling should significantly  improve the EMC compatibility of the PLC   communication. But yeah, as I said, we haven't  tested this yet. And using unshielded twisted pair   UDP wire should also help to increase  noise immunity, roughly 40 dB higher   as CharIN saying on their website. So CharIN  is the standardization body of CCS and MCS.  

But I would like to highlight here that even  if you shield the cable, you use differential   PLC and you use twisted pair, the signal  could just couple into some other bits,   like onto the PCP directly, so you could modulate  your signal into a higher carrier, high frequency   carrier. If you just make the wire not attackable,  it doesn't mean the system is not attackable.   And now there is also the North American  charging standard. I guess you all know it's   the Tesla plug, and they say basically that for  DC charging, the electric vehicles should or NACS   should support power line communication  to make it compatible with DIN 70121,   and it should also support ISO-15118, which  means if it needs to support ISO-15118,   it needs to support PLC communication. So what is the conclusion? Well, CCS is   vulnerable to wireless attacks. We show that  we can eavesdrop on it, but we can also inject.  

Roughly 20 million vehicles are currently  vulnerable because CCS is mainly used or is the   DC charging standard in Europe. It's also widely  used in the US and in some parts of Asia, and we   just think PLC is just not a good technology  to use in such a critical communication.   So I just have a video for you. Just ignore the  Renault Zoe on the left. As I said, I didn't want  

to reveal which car we tested on, but yeah. So the  car was charging as you could see, and we put the   equipment, as you saw in one of the photos, in the  back of the car, and then as soon as we pass by,   you will see that the charging stopped.   This is the error where you need to go,  unplug it, plug it in again. It doesn't   go away automatically. Right. That's it. If you  have any questions, feel free to reach out to   us on brokenwire.fail. We have more information.  There is also the paper available, and there is  

also some information on NIST for the CVE we got.  But yeah, happy to take any questions. Thank you.   Oh yeah, sorry. There is a microphone  right here if you have any questions.   Hi. Hi.   Just a question. Were you able to also...  You mentioned about the billing. There is  

a communication between vehicle and the charging  station, and there is a billing associated with   it. Were you also able to get into the billing,  like able to manipulate the user to charge?   Sorry. If I understood you correctly, you're  asking about the identifier which is transmitted   between the car and the charger? Yeah.   There are different implementations, I would  say. There is one which is called auto charge,  

which is basically the MAC address  of your EV charging controller.   If you have the MAC address, you can... If  I eavesdrop on your communication and get   your MAC address, and spoof my MAC address, I  could charge and you would be paying for it.   Okay. So, basically we can sniff MAC a address  from the car between the charger during it's   session, and then we can use this to bill for  that user that we sniff. Is that correct?  

Sorry, could you speak up a  bit? It's hard to hear.   Yeah, so the car connects to the charging  station. During the initial session,   we sniffed the MAC address. And then,  can we replay that to charge the user?   Right. If we can replay. Sorry, do we want to?  

Sorry. Yes. Yeah, you captured that MAC address,   you set your MAC address, that's associated  with someone's billing account, and then you   just go and charge until they cancel it because  they realize they're being charged. It's not the   same for Plug and Charge, and this is the gold  standard thing. Auto charge was just a couple   of industry players wanting to get in on this kind  of frictionless experience early. Plug and Charge,   no, there's certificates both sides. There's, as  far as we know, good crypto. It's not very widely  

deployed yet. But yeah, that's safe. Thanks a lot.   Dumb question. Will the slide deck  be available on the GitHub site?   This slide deck? That slide deck.   It could be, yes. It's not currently, but it  could be. There's certainly slides from other  

talks we've done on it. This one has  a little bit of extra on it. But yeah,   that paper code, you can get. Some appropriate slide deck. I know   some folks where the slide deck  would be great for explaining.  

Yeah, of course. I think you'll  find all the resources-   [inaudible 00:35:48]. No worries.   One question, please. The MAC address that you  identified, this is the MAC address of the vehicle  

or the charging system of the vehicle? There are two, and you get both of them in   different messages. So you get- Are you sure it's the same one.   So there's a modem one, and then there's one  for the... What is it, the charge controller.   We've observed different behavior in different  vehicles. Some of them have one bit different,  

some have the same MAC address in both. Some  have one of them blanks and one of them not.   It depends on which one you're looking at. Because it's totally different TCUs. The MAC   address usually will be part of the TCU,  and not part of the charging system.   I'm sorry, I missed that bit. The MAC address- The MAC address will come from the TCU.   From the controller on the EVCC? Yes. Not from the charging system.   But we have one from the modem, and one from that,  from the EVCC. I could show you in some captures,  

and it does, as I say, vary between, but yeah,  they establish a communication between the two   high-level entities, and then the very early  initialization messages are modem to modem. So   we have ones for those as well. Okay, thanks.   Hi. Thank you. You were talking about NACS and  similar vulnerabilities. Seeing as NACS is coming  

up, well CharIN is trying to standardize  it now, is this an opportunity to kind of   address some of the vulnerabilities  with some of your suggestions?   Yes, would be our opinion. Some things  are very difficult to change. You've got   a standard that has this communication, which  is possibly not the best choice baked into it.   That's probably going to be difficult to do. Some  changes are coming that are really good, like   MCS having this differential PLC, or changes that  you could deploy later, like firmware differences   or additional sort of detection systems for  just constant preamble something. But yeah,  

as a general rule, yes, let's try to fix  this, and hence why we're doing this talk now.   We'd be happy to engage with anyone that's  doing work on any new charging standards.   Thank you. Sorry, if you want me to...  

The question I have is the SDR you guys  use to do this attack is kind of unique,   because to do this you need something that  has at least 28 megahertz of RF bandwidth.   I'm sorry, I'm having difficulty hearing you.  Probably just close to the mic is fine.   Okay. So the SDR you guys used to do this is  somewhat unique, and the fact because you need   about 28 megahertz of RF bandwidth in order to do  this attack. So things like a HackRF won't work,   because they've only got 20 megahertz. Now the new  LimeSDRs don't have this nice wide band that the   original one did, and hence that's why the price  of these have gone up. But I'm kind of curious,  

have you guys found anything other  than a high-end USRP that will do this,   has a required RF bandwidth, because  I had love to hear about that?   Yeah. We played with a couple of different  ones. I mean I think prices went up a little   bit across the board. [inaudible 00:39:14].   At the time, the big LimeSDR was  what, a couple of hundred dollars,   and that was really good. That was why we had  it. And it also worked natively in that band.   The previous work, the eavesdropping, I was using  a Blade RF, which was reasonably inexpensive at   the time, but it didn't tune to that band, so  we had an up converter to bring it up to there.   And basically we've had pretty good success  with those. I'm not quite sure exactly what's   going to be the best buy at the moment,  but my gut feeling is probably still a   LimeSDR. They've got more expensive, but  they're still not quite USLP territory.  

The current Lime, are you talking about the  old version and trying to get it off eBay?   Frankly, either. A V2 should work fine. We  haven't tested the V2 ourselves, but...   The V2 two does have the required bandwidth? Yes.   And it'll tune down the 2 to 22  [inaudible 00:40:13] megahertz?   Yes. Yeah. Depending on what attack you want  to do, whether you could just do up conversion,   down conversion, use something else,  that might be quite a good route.  

I mean if you wanted a recommendation for what to  buy, we could perhaps have a little offline chat,   but most of the things that are above an RTL  or something should work fine. I will also say,   you might have some success even  with the 20 megahertz from a HackRF,   for two reasons. One, we did test  Brokenwire with less of the preamble,   because some of this will get attenuated  anyway, and I can't remember how low we went,   but you could cut off a surprising amount and  still have the preambles register as accurate.   Although the preambles don't  use all the OFDM channels?   They do, but even if some of it is horribly  attenuated, there's enough signal for it to   correlate well and trigger as a preamble. Oh, sweet.   In theory, you should be able to even do some  eavesdropping because Green Phy replicates   all across the band. So there's five copies or  sometimes seven copies depending on which message  

you're talking about for exactly the same problem.  It's a very, very hostile network if you're...   hostile transmission environment on these wires.  So it's built to be robust against that and you   could lose a whole chunk of the subcarriers  and still recover messages. Of course, your   mileage may vary, but you might have some success  with the HackRF, if not, probably swapping for a   LimeSDR or the BladeRF and up converter. Very interesting. Thank you. I didn't know   that about... I thought I was using  all the [inaudible 00:41:39].  

Yeah, of course. It tries to, but it's  surprisingly resistant to loss or noise   or whatever. Okay.   Happy to talk more afterwards. Yeah. Okay. Okay, Cool.   Hi. I'm not really knowledgeable about the  protocol, but has Qualcomm implemented something   like a spread spectrum or something that can  mitigate the radiations? I mean whenever we do EMC   testing, we basically look for, if we have this  type of radiations, we reduce the speed, reduce   the slow rates, or also doing some spread spectrum  on the transceivers to mitigate the radiations.   Has this been already placed on the table? No. It's not FDM system, and there's certainly  

per-carrier control to stay under EMC limits.  So part of it was of course that distinctive   spectrum template that I showed, notching out the  amateur bands, and you could power control there   or notch more of them out if you needed to. And  for EMC purposes, fine. It is just under the   threshold for radiation. I think, realistically,  it's just if you turn up your LNA enough, you can   still pick it up, but it's still compliant.  And then there's plenty above that in terms   of varying modulation to try to get the best  rates and so on. But that's less of a compliance  

thing and more of a throughput issue. Okay. So only through differential wires   canceling the fields and that will be enough  for the mitigation on the second version?   Some implementations of this are a wire, at which  point it's just going to be leaking out all over   the place. The differential down a twisted pair,  yeah, that's probably going to be very helpful.   But bear in mind, this is a technology  that's coming from an in-home environment   and genuinely people's power wiring, which  is just wires randomly laid over 50 years   by different electricians and so on. It wasn't  really built as a communication protocol for a  

purpose-built environment, but rather making  the best use it could of the conditions it   had. And that's why it's not ideal there. And is the amount of information that you do   during the handshake really  needs the amount of speed,   or why not use lean or [inaudible 00:44:03]? Yeah. All the other charging standards do not.   I typically use a CAN bus link, and do fine. I  think a lot of it was a future-proofing idea,   and there was some really nice design  choices. Have an IP link, you can just do   whatever. You can deploy the same technology  you have, there's no reinventing the wheel.  

Personally, I'm not sure PLC was the best  underpinning for that, but no, it's hard to make   a case. It was more to just create the capability  to deploy whatever we might need in the future,   rather than because you needed that much data. Okay. Well, thanks.   Thanks very much. And thanks  everyone for coming.

2023-09-22 07:03

Show Video

Other news