Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

For more information on companies in this article

Related Content

  • Traveller experience study identifies key themes for improving transport network
    October 14, 2015
    The UK’s Transport Systems Catapult has identified key areas of development in the transport network in its traveller experience study, Traveller Needs, which comprised of 10,000 online questionnaire respondents, 50 company interviews, and 100 expert interviews. The research found that 75 per cent of journeys are characterised by pain-points, with 57 per cent of travellers always looking for ways to optimise their journey. Public transport is considered to be poor value for money with the ‘high cost
  • Open data gives new lease of life to public travel information screens
    March 4, 2014
    David Crawford finds resurgent interest in travel information screens for buildings. With city governments worldwide increasingly opening up and sharing their public transport data for general use, attention is focusing on the potential financial benefits – to transit operators and businesses more widely. Professor Stephen Goldsmith, who directs the US’ Harvard University’s Data-Smart City Solutions Project says: “Amid nationwide public-sector budget cuts, open data is providing a road map for improving tra
  • Weathering the elements: how weather affects the network
    July 29, 2013
    Weather-related problems can render cost-cutting counter productive, according to CommScope’s Philip Sorrells. When severe weather conditions make headlines every winter, motorists and travellers seem willing to accept the impact on the trains and roads and yet take for granted that the communications networks will continue uninterrupted. They often appear far more upset that the information system does not give them an update on road conditions, train services or bus arrival times than they are about the a
  • Irdeto and Conjure promote Keystone vehicle access solution
    March 19, 2018
    Irdeto and Conjure are using Intertraffic to present what they claim is the most secure, policy-based vehicle access and safety solution in the connected transport industry. Using a mobile device with a companion application, the solution eliminates the need for physical keys to a car while also providing car and fleet owners with the ability to securely and intuitively provision and manage a host of new car sharing/car riding experiences. Keystone combines secure, tamper-proof policy management that