Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

Related Content

  • October 27, 2016
    The downside of driverless vehicles
    Driverless cars will have a detrimental effect on congestion and security while the road safety benefits can be achieved sooner and cheaper using ADAS, argues Colin Sowman. Many Governments are consulting about the introduction of driverless vehicles and even running trials. As 70% or 80% of crashes are caused by human error, the promise of a crash-free future of driverless, self-driving or autonomous vehicles (call them what you will) is alluring, as are the claims of reduced congestion and lower emissions
  • April 17, 2012
    Seoul building cyber attack-resistant traffic and transport control system
    According to a report in the Korea Times today, Seoul city officials are city urgently undertaking the development and of an integrated traffic information and operation system resistant to cyber terrorism to guard the city's traffic network from outside attacks. The Seoul Metropolitan Government said it plans to build an advanced transport management system that monitors the total traffic network around the clock by the end of this year, as part of efforts to vigilantly respond against any security threat.
  • January 22, 2019
    Access and Irdeto partner to protect in-car data and services
    Security specialist Irdeto has teamed up with Access Co to develop protection for the increasing amount of personal data that is generated by Wi-Fi, Bluetooth and Vehicle to Everything (V2X) communication. As cars are increasingly turned into open environments due to advances in connectivity, the threat of data theft has risen. Niels Haverkorn, general manager of connected transport at Irdeto, says: “We are partnering with Access to create a complete and secure ecosystem, which means that V2X communicatio
  • January 7, 2013
    Need for secure approach to connected vehicle technology
    Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes. Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take