Heavy Vehicle Cyber Security
Home
Research
Reports
Resources
Data
Source Code
Contact
Resources
External Resources
Vulnerabilities & Attacks
Expanding the Attack Scenarios of SAE J1939: A Comprehensive Analysis of Established and Novel Vulnerabilities in Transport Protocol
Benchmarking Unsupervised Online IDS for Masquerade Attacks in CAN
Truck Hacking: An Experimental Analysis of the SAE J1939 Standard
(
Workshop Slides
)
Detecting CAN Attacks on J1939 and NMEA 2000 Networks
Security Shortcoming and Countermeasures for the SAE J1939 Commercial Vehicle Bus Protocol
Practical DoS Attacks on Embedded Networks in Commercial Vehicles
DSR-CAAP: A Novel Denial of Service Resilient Channel-Aware Authenticated Key Exchange Protocol Suite for SAE J1939
Security Concerns in CAN, CANopen, and J1939 Networks
Publicly Available SAE J1939 Resources
SS 1033423 : J-1939 Fault Code Source Address (SA), Suspect Parameter Number (SPN), and Failure Mode Indicator (FMI) Descriptions
Cybersecurity Research Considerations for Heavy Vehicles
Hacking Trucks--Cybersecurity Risks and Effective Cybersecurity Protection for Heavy-Duty Vehicles
Internal Resources
J1939 Documentation
Updated: Thu Aug 7 10:23:39 EDT 2025