Secret Fresh with RAMN and CARLA: The Journey For Autonomous Driving Research on a Miniature Board and Network
Date: September 26, 2025 (GMT +8)
Time: 14:30
Car Hacking Village
TRACK 4
VILLAGE TALK
RAMN (Resistant Automotive Miniature Network) is a credit-card-sized ECU testbed for safely studying and researching automotive systems. It is good hardware for learning about the CAN Bus, as it simulates a CAN/CAN-FD network of 4 ECUs, and has interactive add-on pods for vroom vroom. It has been used in CTF competitions, particularly in the Car Hacking Village. In this talk, the researchers will discuss how to play with it effectively, demonstrate known CAN Bus attacks, and how to integrate it into a closed-loop with the open-source autonomous driving simulator CARLA. Values from the virtual world, such as car speed and throttle control, take a physical form on the CAN/CAN-FD bus and inside the ECUs. You can drive the car yourself, or let a self-driving algorithm do the job with RAMN.
Speaker
Jay TurlaJay Turla is a Principal Security Researcher at VicOne and one of the goons of ROOTCON. He has presented at international conferences such as ROOTCON, HITCON, Nullcon, and DEFCON, among others. He previously worked for HP Fortify and Bugcrowd in the area of appsec. His primary research interest at present is car hacking, and he is currently one of the main organizers of the Car Hacking Village at ROOTCON Philippines, a community recognized and supported by the Car Hacking Village. He is an exploit developer and found some zero days in Modbus and CAN Bus systems. He is also the leader of the hacking team “Peenoise,” which is one of the top teams during the SPIRITCYBER-24 Hackathon, an IoT / ICS / OT Hacking competition in Singapore.
Florengen Arvin Parula
Florengen Arvin Parula is an Auto Threat Researcher at VicOne, where he focuses on Automotive Cybercrime and tinkering with CAN Bus systems. He used to work for Lear Corporation, where he gained experience in automotive testing and QA. He is new to the cybersecurity field but has adapted to the world of automotive security and has even blogged about replicating RAMN (Resistant Automotive Miniature Network) using a Single STM32 Board.
« Back