Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

Related Content

  • February 28, 2013
    The cloud - the future of in-car telematics?
    Fiat Chrysler product concept and infotainment director Pierpaolo Tona told the conference that the big car manufacturers need to organise their telematics approach around three key pillars – and the first one of those is people. “OEMs need to understand consumers and their needs better than they understand them themselves,” he commented. The second pillar, suggested Tona, is technology. “Technology is never for the sake of it. Choose the right technology with the right performance to fulfil every consumer’
  • May 10, 2019
    Wi-SUN: here’s why mesh networking works
    There are several networking options available for smart city planners. Phil Beecher of Wi-SUN Alliance makes the case for wireless mesh networks when it comes to rolling out IoT solutions The Internet of Things (IoT) is growing fast. Connecting thousands of sensors and control systems in bi-directional networks is paving the way for a new generation of smart city and transport infrastructures. For many of these applications, wireless connectivity is essential where cable installation is not practical.
  • April 18, 2012
    EV charging will require increased investment in cyber security systems
    The technology architecture associated with electric vehicle (EV) charging is continuing to evolve as utilities and other key players in the industry ecosystem identify business requirements and risks associated with adding significant new demands on the electrical grid. One of the most pressing challenges is related to securing financial transactions and end-to-end communications throughout the EV charging infrastructure, and a recent report from Pike Research indicates that these areas will be the focus o
  • November 2, 2016
    Prevention is better than cure says Antaira’s David Zaveski
    Antaira’s David Zaveski looks at how to improve the resilience of Ethernet systems. Detection and monitoring, and the subsequent management of transport systems, is becoming ever more sophisticated and also integrated as ITS spreads wider across cities and along highways and rail corridors.