Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

For more information on companies in this article

Related Content

  • Connected vehicle security on display at World Congress
    August 3, 2015
    Against a background of increasing concern and instances of the threat of the potential danger of connected cars being hacked, the 2015 ITS World Congress will bring automotive thought-leaders together to separate fact from the hype and address the real challenges facing the increasingly connected vehicle.
  • Data goldmines offer rich pickings
    May 31, 2013
    Astronomical is not too grand a term to describe the current rate of growth in transportation-related data. Massive amounts of traffic related information, such as speed, volume, incidents and weather are being generated every second by road operators and users alike. Big data’ derives its name from the sheer amount and complexity of available raw data. Its potential value is starting to emerge among the intelligent transportation systems community. A gold rush is taking place to capture this value, with da
  • TRW showcases driver assist systems
    June 5, 2014
    TRW Automotive demonstrated its driver assist systems (DAS) and outlined expected trends in sensor technologies during the company's recent bi-annual Ride and Drive event at the Hockenheimring in Germany. According to Andrew Whydell, TRW Electronics’ director of product planning, DAS has and will continue to be a focal point for the automotive industry as governments and industry bodies strive to reduce road fatalities worldwide. For example, the European New Car Assessment Program (EuroNCAP) and the Ins
  • UK drivers want to be insured against hackers
    September 9, 2016
    According to a new survey of almost 1,200 people by road safety charity IAM RoadSmart, 74 per cent of drivers think insurers should provide cover for damage caused by hackers accessing control systems in driverless cars. The results of this survey have been used to guide IAM RoadSmart’s response to the Centre for Connected & Autonomous Vehicles’ consultation, Pathway to Driverless Cars.