Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

For more information on companies in this article

Related Content

  • StarTraq offers independent audit of traffic violations
    June 16, 2015
    StarTraq Audit provides authorities with an independent review of speed and red light enforcement violation patters in order to detect multiple errors or even fraud. The company receives notification of all logged offences in order that its Audit software can detect anomalies and trends. These may come as a result of an drifting calibration, erroneous recalibration or other faults and can be detected in near real-time and the notification stopped before the automated systems send out hundreds of tickets whi
  • Communication: the future of machine vision
    May 30, 2013
    Jason Barnes asks leading machine vision industry figures what they consider to be the educational barriers to the technology’s increased uptake by the ITS sector. The recent rush by some organisations within the ITS sector to associate themselves with the term ‘machine vision’ underlines just how important the technology has become in a relatively short space of time. However, despite the technology having been applied in certain traffic management applications for some years, there remains a significant s
  • Legalities of in-vehicle systems and cooperative infrastructures
    February 1, 2012
    Paul Laurenza of Dykema Gossett PLLC discusses the paths which lawmakers may go down on the route to making in-vehicle systems and cooperative infrastructures a reality. The question of whether or not to mandate in-vehicle systems for safety and other applications is a vexed one. There is a presumption on some parts that going down the road of forcing systems' fitment is somehow too domineering or restricting. Others would argue that it is the only realistic way of ensuring that systems achieve widespread d
  • Communications for cooperative infrastructures and safety
    February 2, 2012
    Scott Andrews of Cogenia Partners, LLC details the findings of the VII Proof Of Concept work carried out to verify the effectiveness of 5.9GHz-based communication for future US cooperative infrastructures