Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

For more information on companies in this article

Related Content

  • Need to analyse risks of 5.9GHz spectrum sharing
    February 27, 2013
    Scott Belcher of ITS America explains why moves towards spectrum sharing in the 5.9GHz band should not be allowed to proceed until further analysis of the risks to road safety has been undertaken. The ability to move people and goods safely and efficiently has always had a direct impact on a country’s economic advantage and its citizens’ quality of life. It is estimated that by 2050, the number of vehicles around the world is set to double to two billion, placing enormous demands on the global transport
  • Cohda Wireless: 'New York has the best urban canyons'
    July 21, 2020
    Dr Paul Alexander, chief technical officer of Cohda Wireless, talks to Adam Hill about DSRC versus C-V2X, global connected vehicle take-up, the uses of WiFi – and, of course, seeing round the Big Apple's buildings...
  • Green requirements of traffic video systems
    February 2, 2012
    Traficon's Head of Product and Application Management Robin Collaert offers up a discussion of the likely future green requirements of traffic video systems. At the most basic levels, ITS has the potential to significantly reduce the amounts of time which vehicles spend waiting at intersections, and less time spent waiting means less in the way of vehicular emissions. All of that will hardly come as news to most laypeople, let alone transport professionals. However, the reality is that even today too many r
  • Tollers make way as NextNav muscles into 902-928MHz spectrum
    July 30, 2013
    Toll operators and Progeny trade claim and counter claim about the potential ramifications of operating in the 902-928MHz spectrum, as Jon Masters finds out. Two months after the Federal Communications Commission (FCC) determined that Progeny can start commercial operation of its NextNav location finding service, the dust has begun to settle. The tolling industry has had a chance to reflect on how this may impact its operations, in the knowledge that NextNav will share the 902-928MHz frequency band with RFI