Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

For more information on companies in this article

Related Content

  • Joining the dots: four ways to help cities make the connection
    May 18, 2018
    Smoothing the path to connected transportation systems in urban areas all round the world takes a lot of planning: Cisco’s Kyle Connor lays out the four key areas on which he thinks cities should focus. Forward-thinking cities around the world are exploring innovative, new ways to leverage the Internet of Things (IoT) and related technologies to create more connected and efficient transportation systems. Through greater digitisation and connectivity, cities can optimise public transit routes, reduce
  • The benefits of combining enforcement and traffic management
    February 27, 2013
    Jason Barnes considers how combining enforcement equipment with other traffic management technologies might benefit our future – if only the will were really in place to do so. During the ITS World Congress in Vienna in October last year, Navtech Radar and Vysion­ics ITS announced a strategic partnership that would combine the expertise of Navtech in millimetre-wave wide-area surveillance technology with Vysionics’ machine vision-based automatic number plate recognition (ANPR) and average speed measurement
  • American drivers concerned about hacking of autonomous cars, says survey
    February 8, 2017
    An online survey by the University of Michigan Sustainable Worldwide Transportation Department asked American adults about their level of concern with cyber-security of personally owned autonomous vehicles (with and without driver controls) and current conventional vehicles looked at both vehicle security and data privacy. Within vehicle security, the issues examined were hacking vehicles to cause crashes, hacking by terrorists to use the vehicle as a weapon, disabling many vehicles simultaneously and di
  • TomTom banishes range anxiety
    March 16, 2021
    High-quality routing and weather information is going to be vital in persuading drivers that electric vehicles will not let them down, thinks TomTom’s Robin van den Berg