Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

For more information on companies in this article

Related Content

  • Cooperative systems and privacy not mutually exclusive
    February 6, 2012
    Are co-operative systems and personal privacy mutually exclusive? Not necessarily, says Neil Hoose. But the more advanced the application, the greater the concession of privacy may have to become
  • European tunnel safety steps up a gear
    September 19, 2017
    David Crawford reviews the latest safety systems installed in European tunnels. Blueprints for the safer road tunnels of the future are emerging fast as European operators invest in technologies to enhance travellers’ prospects of surviving an accident. Central to modern emergency planning is the principle that, following an incident, drivers should be enabled to rescue themselves and their passengers with the aid of prompt and correct identification and communication of the hazard. Roles for cooperativ
  • Mileage based charging offers secure future for funding
    August 10, 2016
    HNTB’s Matthew Click sets out why a move to mileage-based pricing is inevitable. Infrastructure is the most neglected yet the most critical engine of our society, and our continued indifference could lead to a dystopian future. Our roads, bridges and highways have been largely passed by in the digital age—marginalised in an era when funding is limited and stewardship of physical assets has given way to our preoccupation with technological innovation and data—the stuff of the virtual realm.
  • UK project demonstrates vehicle remote operation and autonomy for disabled drivers
    January 4, 2017
    The UK’s first demonstration of a remotely-operated autonomous vehicle service for people with reduced mobility has been successfully completed as part of the GATEway project (Greenwich Automated Transport Environment), led by TRL. Taking place at the InterContinental Hotel in the Royal Borough of Greenwich and completed using an autonomous-enabled Toyota Prius, the demonstration marked the end of a fortnight of testing in which GATEway partners Gobotix and O2 were able to successfully demonstrate remote