Notices
991 Turbo 2012-2019 Turbo and Turbo S
Sponsored by:
Sponsored by: Road Spy

Motec, TCM, PSM, and the rest of the acronym soup

Thread Tools
 
Search this Thread
 
Old 07-26-2024, 12:30 AM
  #1  
TurboSlipNot
Advanced
Thread Starter
 
TurboSlipNot's Avatar
 
Join Date: Sep 2023
Location: Somewhere green
Posts: 98
Received 23 Likes on 15 Posts
Default Motec, TCM, PSM, and the rest of the acronym soup

My car is finally off of a locked-out cyvecs and on a proper motec setup running the 12inj flex-fueled 4L. Its night and day in terms of both normal driving and getting into the boost/RPMs but given the whole "ZF locked even Porsche out of the transmission" thing, the interaction between ECU and TCM is still a bit of an approximation which produces unpleasant traction control pushback under some conditions or outright spark cut when it should just give me a bit of rotation around the middle. PSM is far more than TC and i'm not sure how the interactions with all of those parts play out and i'm wondering if anyone is.
I've started outreach to the various commercial entities in this space, but with a background in infosec going back to the 90s i can be a bit more proactive than the average person waiting for a proper solution.

The technology being called "AI" in the market is actually just a deeply nested set of reentrant pattern encoders and decoders which "looks" like pattern recognition/awareness when nested and complex enough... techniques which can be used to analyze the IO between a Porsche ECU and ZF TCM to either assist in the actual reverse-engineering of function or just precisely approximate the outputs produced by inputs observed (and as many other conditions recorded from adjacent systems as possible). Since ZF really don't want anyone's pillaging their IP, they decided to encrypt the communications on the bus between the TCM and ECU. Encryption however requires either storing or deriving key materiel for the session which can either be dumped from endpoint memory or extracted by similar analyses of the initial key exchange/negotiation and internal state of each side.

I'm not quite at the point of being able to procure a test mule for something like this, so wondering if anyone else is working the problem set and might have IO intermediation/intercept capability to capture the traffic between TCM and a factory ECU (putting a factory one in my car isn't feasible at this level) or made headway on the decryption of the datapath/understanding the protocols involved "out in the open" (vs behind commercially-closed doors which preclude collaboration). It might be feasible to actually extract and decompile the TCM firmware but that seems like an ethical boundary i'd rather not cross - however we do have a right to repair our own vehicles as we see fit, so at least having the ability to communicate with ZFs TCM seems like a prerequisite for building fully informed maps to take advantage of all of the car's capabilities when replacing factory parts with (improved) aftermarket ones.
Old 07-26-2024, 01:18 AM
  #2  
worf928
Addict
Rennlist Member
 
worf928's Avatar
 
Join Date: Oct 2003
Location: Gone. On the Open Road
Posts: 16,537
Received 1,675 Likes on 1,087 Posts
Default

Originally Posted by TurboSlipNot
… so wondering if anyone else is working the problem set and might have IO intermediation/intercept capability to capture the traffic between TCM and a factory ECU…
I wish.

Old 07-26-2024, 02:25 PM
  #3  
B Russ
Rennlist Member
 
B Russ's Avatar
 
Join Date: Aug 2017
Location: 91North/75South
Posts: 2,512
Received 854 Likes on 560 Posts
Default

Originally Posted by TurboSlipNot
My car is finally off of a locked-out cyvecs and on a proper motec setup running the 12inj flex-fueled 4L. Its night and day in terms of both normal driving and getting into the boost/RPMs but given the whole "ZF locked even Porsche out of the transmission" thing, the interaction between ECU and TCM is still a bit of an approximation which produces unpleasant traction control pushback under some conditions or outright spark cut when it should just give me a bit of rotation around the middle. PSM is far more than TC and i'm not sure how the interactions with all of those parts play out and i'm wondering if anyone is.
I've started outreach to the various commercial entities in this space, but with a background in infosec going back to the 90s i can be a bit more proactive than the average person waiting for a proper solution.

The technology being called "AI" in the market is actually just a deeply nested set of reentrant pattern encoders and decoders which "looks" like pattern recognition/awareness when nested and complex enough... techniques which can be used to analyze the IO between a Porsche ECU and ZF TCM to either assist in the actual reverse-engineering of function or just precisely approximate the outputs produced by inputs observed (and as many other conditions recorded from adjacent systems as possible). Since ZF really don't want anyone's pillaging their IP, they decided to encrypt the communications on the bus between the TCM and ECU. Encryption however requires either storing or deriving key materiel for the session which can either be dumped from endpoint memory or extracted by similar analyses of the initial key exchange/negotiation and internal state of each side.

I'm not quite at the point of being able to procure a test mule for something like this, so wondering if anyone else is working the problem set and might have IO intermediation/intercept capability to capture the traffic between TCM and a factory ECU (putting a factory one in my car isn't feasible at this level) or made headway on the decryption of the datapath/understanding the protocols involved "out in the open" (vs behind commercially-closed doors which preclude collaboration). It might be feasible to actually extract and decompile the TCM firmware but that seems like an ethical boundary i'd rather not cross - however we do have a right to repair our own vehicles as we see fit, so at least having the ability to communicate with ZFs TCM seems like a prerequisite for building fully informed maps to take advantage of all of the car's capabilities when replacing factory parts with (improved) aftermarket ones.
Holey Fuch, What did he just say
Old 07-26-2024, 05:41 PM
  #4  
arkadyzv
Rennlist Member
 
arkadyzv's Avatar
 
Join Date: Feb 2016
Location: Philly
Posts: 461
Received 123 Likes on 93 Posts
Default

Originally Posted by TurboSlipNot
My car is finally off of a locked-out cyvecs and on a proper motec setup running the 12inj flex-fueled 4L. Its night and day in terms of both normal driving and getting into the boost/RPMs but given the whole "ZF locked even Porsche out of the transmission" thing, the interaction between ECU and TCM is still a bit of an approximation which produces unpleasant traction control pushback under some conditions or outright spark cut when it should just give me a bit of rotation around the middle. PSM is far more than TC and i'm not sure how the interactions with all of those parts play out and i'm wondering if anyone is.
I've started outreach to the various commercial entities in this space, but with a background in infosec going back to the 90s i can be a bit more proactive than the average person waiting for a proper solution.

The technology being called "AI" in the market is actually just a deeply nested set of reentrant pattern encoders and decoders which "looks" like pattern recognition/awareness when nested and complex enough... techniques which can be used to analyze the IO between a Porsche ECU and ZF TCM to either assist in the actual reverse-engineering of function or just precisely approximate the outputs produced by inputs observed (and as many other conditions recorded from adjacent systems as possible). Since ZF really don't want anyone's pillaging their IP, they decided to encrypt the communications on the bus between the TCM and ECU. Encryption however requires either storing or deriving key materiel for the session which can either be dumped from endpoint memory or extracted by similar analyses of the initial key exchange/negotiation and internal state of each side.

I'm not quite at the point of being able to procure a test mule for something like this, so wondering if anyone else is working the problem set and might have IO intermediation/intercept capability to capture the traffic between TCM and a factory ECU (putting a factory one in my car isn't feasible at this level) or made headway on the decryption of the datapath/understanding the protocols involved "out in the open" (vs behind commercially-closed doors which preclude collaboration). It might be feasible to actually extract and decompile the TCM firmware but that seems like an ethical boundary i'd rather not cross - however we do have a right to repair our own vehicles as we see fit, so at least having the ability to communicate with ZFs TCM seems like a prerequisite for building fully informed maps to take advantage of all of the car's capabilities when replacing factory parts with (improved) aftermarket ones.
I have no idea what you're actually trying to accomplish... but I can safely say no one in the 991 world thats not a legit shop nor tuner is trying to unlock the ZF software privately if thats what you're hinting at. The only Motec players in the 991 world that have any results that would lead me to believe they know what they are doing are Wayne Potts, Cicio and Fasil from Xperformance , I dont see any of them sharing their secret sauce just because.


Originally Posted by TurboSlipNot
putting a factory one in my car isn't feasible at this level)
Why?
Old 07-26-2024, 09:30 PM
  #5  
TurboSlipNot
Advanced
Thread Starter
 
TurboSlipNot's Avatar
 
Join Date: Sep 2023
Location: Somewhere green
Posts: 98
Received 23 Likes on 15 Posts
Default

Originally Posted by arkadyzv
I have no idea what you're actually trying to accomplish... but I can safely say no one in the 991 world thats not a legit shop nor tuner is trying to unlock the ZF software privately if thats what you're hinting at. The only Motec players in the 991 world that have any results that would lead me to believe they know what they are doing are Wayne Potts, Cicio and Fasil from Xperformance , I dont see any of them sharing their secret sauce just because.



Why?
Not sharing of secret sauces is one thing - base interface semantics and peer unit logic is another. Without those common curves and comms protocols, all IO between components and aftermarket ones ends up being an approximation of the correct "language and grammar" between them (Zapf Brannagan style). Its the original GPL license argument of making systems software available to all for standardized use and common improvement while application software is sold for profit. Builders who perform full builds from a strengthened block on up have their own specific nuances for things like managing case pressure, blow-by, ethanol condensate, and more commonly for non megacar stuff the optimal timing/gapping/compression/fuel atomization/combustion temps/clearances/top ends/porting/so on; all of which play into the way they map AFRs and a thousand other parameters to optimize for those factors... I don't think youd have much luck running an ESMotors map on a motor built by someone else entirely since they optimize for VE in physical components and dimensions differently.

Most practicing hackers aren't buying these yet and ones who do are often burnt the hell out too much to dig into the guts especially given that the factory car is way too fast already for anyone with a shred of sanity left. That said, I can't be the only one here so I'm hoping some curious minds with electrical and digital skills roger up. My outfit has our own analysis and modeling capacity, but we lack the raw data between modules to parse out and assess

​​​​​
Old 07-27-2024, 07:52 AM
  #6  
akrapovic
Intermediate
 
akrapovic's Avatar
 
Join Date: Jul 2016
Posts: 42
Received 5 Likes on 2 Posts
Default

Originally Posted by B Russ
Holey Fuch, What did he just say
that’s engineer for i’m smarter than you😂😂😂
Old 07-27-2024, 08:28 AM
  #7  
CodyzWorld
Burning Brakes
 
CodyzWorld's Avatar
 
Join Date: Jan 2021
Posts: 1,029
Received 420 Likes on 270 Posts
Default

interesting. Ihave slight comprehension but wow..........
Old 07-27-2024, 11:39 AM
  #8  
B Russ
Rennlist Member
 
B Russ's Avatar
 
Join Date: Aug 2017
Location: 91North/75South
Posts: 2,512
Received 854 Likes on 560 Posts
Default

I was a hacker in 1999 but this Not sure what they hope to accomplish, thats what Im really trying to understand
Old 07-27-2024, 02:54 PM
  #9  
worf928
Addict
Rennlist Member
 
worf928's Avatar
 
Join Date: Oct 2003
Location: Gone. On the Open Road
Posts: 16,537
Received 1,675 Likes on 1,087 Posts
Default

Originally Posted by B Russ
I was a hacker in 1999 but this Not sure what they hope to accomplish, thats what Im really trying to understand
@TurboSlipNot wants to reverse-engineer the control algorithms between the engine and PDK by doing black-box analysis where “black-box” means that the functionality can only be inferred by presenting inputs in various combinations and observing system behavior. To do this, first the communication protocol must be determined, then encryption (if any) must be broken, and then, only, can the real work be done.

This involves - to start - putting a protocol analyzer (Or IOWs, a digital oscilloscope with data/signal storage capability) in between the PDK and engine to capture data on the bus (AFAIK, FlexRay, now an ISO bus standard) which is then subsequently analyzed.

It’s a tall order, but I proffer best wishes and luck.

The 928 community has accomplished similar goals, but we can pull EPROMs, read them out, decompile “by hand” and figure out what’s what. It’s about 1000 times more complicated to do that with modern stuff that’s also encrypted on-chip. Luckily tools have also progressed so maybe it’s only 10 or 50 times as hard.
The following users liked this post:
Payam (07-30-2024)
Old 07-27-2024, 03:00 PM
  #10  
worf928
Addict
Rennlist Member
 
worf928's Avatar
 
Join Date: Oct 2003
Location: Gone. On the Open Road
Posts: 16,537
Received 1,675 Likes on 1,087 Posts
Default

Now that I think about it, the easiest way to do this would be to run a Lolita Conn on a Porsche Motorsports software engineer, get credentials, hack the system and exfiltrate the source and encryption keys.

I hope TurboSlipNot looks good in a little black dress…
The following users liked this post:
Foosh (07-29-2024)
Old 07-27-2024, 03:47 PM
  #11  
TurboSlipNot
Advanced
Thread Starter
 
TurboSlipNot's Avatar
 
Join Date: Sep 2023
Location: Somewhere green
Posts: 98
Received 23 Likes on 15 Posts
Default

Originally Posted by akrapovic
that’s engineer for i’m smarter than you😂😂😂
Fields of engineering have progressed into full-fledged rabbit holes - pretty much every SME sounds like that in their domain . Decent chance most people who've made it to the point of owning these cars know quite a bit about their field i dont.

Originally Posted by worf928
@TurboSlipNot wants to reverse-engineer the control algorithms between the engine and PDK by doing black-box analysis where “black-box” means that the functionality can only be inferred by presenting inputs in various combinations and observing system behavior. To do this, first the communication protocol must be determined, then encryption (if any) must be broken, and then, only, can the real work be done.

This involves - to start - putting a protocol analyzer (Or IOWs, a digital oscilloscope with data/signal storage capability) in between the PDK and engine to capture data on the bus (AFAIK, FlexRay, now an ISO bus standard) which is then subsequently analyzed.

It’s a tall order, but I proffer best wishes and luck.

The 928 community has accomplished similar goals, but we can pull EPROMs, read them out, decompile “by hand” and figure out what’s what. It’s about 1000 times more complicated to do that with modern stuff that’s also encrypted on-chip. Luckily tools have also progressed so maybe it’s only 10 or 50 times as hard.
Exactly, thanks for the disambiguation; and while the on-chip approach is far easier there's an ethical concern involved in my field since that would actually involve coming into contact what is proprietary "special sauce" which we would have to carefully separate from the IO stack. The more gray area involved in how we get the final outcome the harder it will be to build on that foundation. We're friendly with the firmware security companies and have one of their former RE engineers on our team which is part of the "capabilities puzzle" to getting this sort of work done.

That said, we do need to figure out how to get detailed contextual logging from a more or less factory car and i'm wondering if the piggyback users/vendors around here might have any insight into that part of the game.

Originally Posted by worf928
Now that I think about it, the easiest way to do this would be to run a Lolita Conn on a Porsche Motorsports software engineer, get credentials, hack the system and exfiltrate the source and encryption keys.
Porsche engineers do not have the credentials per se - there are individually negotiated encryption keys setup during the pairing of the transmission and ECU. Motec and Cyvecs have to have already solved for that just to be able to commune with these things but the specifics of that communication are approximations of function likely done by old-school oscilloscope analysis methods as opposed to feeding inhuman amounts of data into a machine learning model (full-bore debug logs of all the systems on board since chassis information has bearing on how PSM handles power delivery) or otherwise deriving the requisite adjustment of outputs from the ECU to the TCM to achieve smoother operation under all the varying operating conditions, allow the TC to understand delivering the result of a thousand lbft multiplied by low gear ratios from a stand-still while turning out into traffic, and so on.

Originally Posted by worf928

I hope TurboSlipNot looks good in a little black dress…
I look good in whatever avoids detection by the adversary, damned good at that, thankyouverymuch.
Old 07-27-2024, 04:00 PM
  #12  
B Russ
Rennlist Member
 
B Russ's Avatar
 
Join Date: Aug 2017
Location: 91North/75South
Posts: 2,512
Received 854 Likes on 560 Posts
Default

Wow this is bringing me back to my old Eprom days, great brain exercises here
Old 07-27-2024, 04:55 PM
  #13  
TurboSlipNot
Advanced
Thread Starter
 
TurboSlipNot's Avatar
 
Join Date: Sep 2023
Location: Somewhere green
Posts: 98
Received 23 Likes on 15 Posts
Default

Originally Posted by B Russ
Wow this is bringing me back to my old Eprom days, great brain exercises here
The closed loop nature of systems interop here means static analysis of one systems logic won't give us the whole picture. Dynamic analysis of input dependent outputs (which actuate functions downstream) and feedback between all the components is (hopefully) how we fill in all the blanks.
Old 07-27-2024, 05:27 PM
  #14  
B Russ
Rennlist Member
 
B Russ's Avatar
 
Join Date: Aug 2017
Location: 91North/75South
Posts: 2,512
Received 854 Likes on 560 Posts
Default

Understanding communication, k
Old 07-28-2024, 12:24 PM
  #15  
Angryinch
Drifting
 
Angryinch's Avatar
 
Join Date: Nov 2021
Location: Canada
Posts: 2,488
Received 1,161 Likes on 685 Posts
Default

How about just hold that traction control button down for 5 seconds and turn it off?

It was never designed to work with massive power and how fast that wheel spin and shifts will happen. It might not even have the speed to keep up.


Quick Reply: Motec, TCM, PSM, and the rest of the acronym soup



All times are GMT -3. The time now is 06:24 AM.