Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

For more information on companies in this article

Related Content

  • New technology revolution in urban traffic control?
    January 26, 2012
    Urban traffic control is a well-defined and practised art. Nevertheless, there are technologies here and on the horizon with the potential to revolutionise how we do things. By Gavin Jackman and Andrew Kirkham, TRL, and Jason Barnes. Distributed monitoring and control of urban traffic networks and flows is nothing new. PC-based Urban Traffic Control (UTC) is now well established and operating in many locations around the world. However, it is worth considering the effects of the huge growth in the use of sm
  • NTSB urges standards for connected vehicles
    July 24, 2013
    In response to fatal school bus accidents at intersections in New Jersey and Florida last year, the US National Transportation Safety Board (NTSB) has recommended that the government should set performance standards for new safety technology that allows cars and trucks to talk to each other and then require the technology be installed in all new vehicles. Vehicles equipped with the technology can continuously communicate over wireless networks, exchanging information on location, direction and speed ten tim
  • Alcohol interlocks aid drink drive adherence
    October 28, 2016
    The use of alcohol interlocks to prevent drink driving and change driver behaviour is gaining ground around the world but needs greater buy-in from authorities as Colin Sowman discovers. The often repeated mantra says that prevention is better than cure - and none more so than in the case of drink-driving. The introduction of the breathalyser provided an objective indication of alcohol consumption instead of having drivers touch their nose or walk in a straight line. Initially breathalysers were used as a r
  • Automation and connectivity on stage in Brussels
    September 21, 2015
    Automation and connectivity take centre stage in Brussels during a series of events to be held in the city during the week of 20-23 October. The week starts off with the FIA Policy Conference, Driving change, connecting mobility, on 20 October. FIA Region will host policymakers and stakeholders to discuss new trends in mobility, while also engaging with how these changes will impact areas such as data protection and liability. On 21 October, the plenary meeting of the iMobility Forum takes place unde