Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

For more information on companies in this article

Related Content

  • Nokia sells device business to Microsoft, but retains Here
    September 4, 2013
    Nokia Corporation has signed an agreement to sell substantially all of its devices and services business and licence its patents to Microsoft for US$7.1 billion in cash, payable at closing. Following the transaction, Nokia plans to focus on its three established businesses: NSN network infrastructure and services; Here mapping and location services; and Advanced Technologies technology development and licensing.
  • Car to car communications a step closer
    December 14, 2012
    Vehicle manufacturers have targeted 2015 for the first cars to roll off European assembly lines fitted with operational V2X technology. They and their partners in the Car 2 Car Communications Consortium are confident of meeting the target, reports Jon Masters. Around three years from now vehicles should be appearing in showrooms boasting the capability of communicating with each other. Manufacturers will have started fitting the first proprietary car-to-car driver-aid safety devices and deployment of ‘vehic
  • New opportunities in a data-rich future
    March 19, 2014
    Jason Barnes looks at where the detection and monitoring sector is heading. In the future, there will be no such thing as an un-instrumented road. Just a short time ago, that could have been a quote from a high-level policy document but with the first arrivals of vehicles with 802.11p connectivity – the door-opener to Vehicle-to-X (V2X) applications – it’s a statement which has increasing validity. The technology which uses our roads will also provide information on road conditions but V2X isn’t the only
  • Dynniq’s FlowSense gives green light for city mobility
    March 19, 2019
    Putting an end to traffic jams – including those involving freight - and improving the air people breathe are major goals for city authorities everywhere. With FlowSense, Dynniq thinks it may have some answers. Adam Hill asks how Sitting in traffic is top of the list of many commuters’ pet hates: a necessary evil, perhaps. But at least it doesn’t kill you - the same can’t be said of toxins in the air. Indeed, the World Health Organisation estimates that 4.2 million deaths worldwide are due to outdoor pol