Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

For more information on companies in this article

Related Content

  • US enforcement regulation to deliver clearer guidelines?
    February 2, 2012
    Jim Tuton of American Traffic Solutions looks at the evolution of automated enforcement in North America "Technological regulation will become more sophisticated at the federal level, giving states clearer guidelines" Jim Tuton In just 20 years, photo enforcement in North America has grown from a single speed camera in a small town in Arizona to thousands of photo traffic enforcement cameras which are now operating in 350 communities spread across 27 states and three Canadian provinces. Most of these p
  • Inertial sensors dramatically improve GNSS for ITS applications
    January 18, 2012
    Phil Harris, Thales UK, on how fused sensor data can significantly enhance GNSS-based positioning systems' performance in urban areas. Global Navigation Satellite System (GNSS)-based positioning is unique among available positioning technology due to its universal coverage and low equipment cost. By measuring the distances between an unknown position (such as a vehicle), and at least three known positions (GPS satellites), the unknown position can be calculated in three dimensions (latitude, longitude, and
  • Frequency changes threaten vehicle safety applications
    January 24, 2012
    The use of frequency spectrum at 5.9GHz for vehicle safety applications is at risk because of two draft bills currently before Congress. Here, we look at why and what’s being done to address the issue. In the US, the right of cooperative infrastructure to use frequency at 5.9GHz is under threat as a result of the proposal of two bills in Congress. The chronology of spectrum allocation for Dedicated Short- Range Communications (DSRC)-based Vehicle-to-Infrastructure (V2I) and Vehicle-to-Vehicle (V2V) safety a
  • Continental and IBM collaborate on connected vehicles
    September 11, 2013
    Continental and IBM are to collaborate on the joint development of fully-connected mobile vehicle solutions for the world’s car manufacturers. Central to the agreement is development of a highly scalable cloud platform that will enable automotive manufacturers to deliver a range of new mobile in-car services. Software updates and vehicle control device functionality will be delivered over the internet, removing costly and inconvenient workshop visits. The companies feel the solution may equally prove be