How to Crack a Train

Thu 27Mar2025

Michał Kowalczyk (Dragon Sector / Invisible Things Lab)

From 11:00 until 12:30

At CAB H 52 (Seminar) + CNB/F/110 (Lunch) , ETH Zurich

CAB H 52 (Seminar) + CNB/F/110 (Lunch), ETH Zurich

Abstract:

You've probably already heard the story: we got contracted to analyze a bunch of trains breaking down after being serviced by third-party workshops. We reverse engineered them and found code which simulated failures when they detected servicing attempts. We presented our findings at 37C3 and then an update of the story at 38C3.

This talk will present the whole story, including:
- how modern electric trains (EMUs) work,
- reverse engineering a PLC based on a TriCore CPU,
- a real-world example of malicious code simulating failures in trains,
- media coverage after the publication,
- criminal investigations,
- getting sued for "copyright infringement" by the manufacturer, who claims they have no idea about the competitor-detecting logic,
- and many more!
 
Some parts of the talk will require deep technical knowledge to understand, but most of it should be comprehensible to anyone.
Join us in CAB H 52 (Seminar) + CNB/F/110 (Lunch).

Download Event to Calendar