Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

For more information on companies in this article

Related Content

  • SafeRide and Irdeto partner on cybersecurity for C/AVs
    June 8, 2018
    Cybersecurity company SafeRide Technologies Ltd and Dutch firm Irdeto have launched a solution to help original equipment manufacturers and Tier-1 suppliers protect connected and autonomous vehicles (C/AVs). Called Vsentry, the device combines network security with software security of the engine control unit to allow users to detect anomalies and respond to attacks. Vsentry uses an artificial intelligence engine and provides multi-layer protection for securing the connectivity perimeter and the in-vehi
  • New research predicts growth of autonomous parking technology
    March 9, 2016
    New research by ABI Research forecasts that shipments of new cars featuring autonomous parking technologies to grow at 35 per cent CAGR between 2016 and 2026 and for revenues to likewise show growth at 29.5 per cent CAGR. ABI Research identifies three phases of autonomous parking, with each successive stage set to gradually displace the former and all three coexisting to some degree over the next decade. Ultimately, technology will reach a point in which the car parks itself entirely, with no driver assi
  • UTMC ANPR communications protocol aids traffic management
    January 30, 2012
    Telematics Technology's Peter Billington describes the effort to give English local authorities and police forces a UTMC ANPR open communication protocol. The story of the impact of communication protocols on the development and utilisation of intelligent equipment is a familiar one both inside and outside the ITS industry. At the outset, a company pioneering its latest technology invariably develops a proprietary protocol. This enables the company's products to talk to the customer systems which need to a
  • New solutions to old problems set to cut emergency response times
    April 30, 2015
    David Crawford looks at the latest developments in emergency response. Ensuring speedier reactions to transport and travel crises is becoming increasingly important. US statistics suggest that as many as 1,000 ‘saveable’ lives can be lost each year in major cities because of operational defects in their SOS operations.