Skip to main content

Trend Micro discovers 'indefensible' car security/CAN standard flaw

Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
August 18, 2017 Read time: 3 mins
Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral.


Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehicle networks and devices are made. Realistically, it would take an entire generation of vehicles for such a vulnerability to be resolved, not just a recall or an OTA (on-the-air) upgrade.

The researchers say it abuses the Controller Area Network, or CAN, network protocol that connects all in-vehicle equipment, parking sensors, airbag, active safety system and infotainment systems and allows them to communicate. The standard for this network is called a Controller Area Network, or CAN.

Trend Micro’s online blog says, “It’s not the car manufacturers’ fault, and it’s not a problem introduced by them. The security issue that we leveraged in our research lies in the standard that specifies how the car device network (i.e., CAN) works. Car manufacturers can only mitigate the attack we demonstrated by adopting specific network countermeasures, but cannot eliminate it entirely. To eliminate the risk entirely, an updated CAN standard should be proposed, adopted, and implemented. This whole process would likely require another generation of vehicles.”

David Barzilai, co-founder and chairman, automotive cyber-security firm 8519 Karamba Security, agrees with Trend Micro that the CAN protocol can be abused, causing it to disable devices on a CAN network, and that 7178 IDS systems will not be able to help against such an attack.
 
However, he says, In order to remotely launch Denial of Service (DoS) CAN attacks, a hacker must compromise an externally-connected electronic control unit (ECU) and interfere with its factory settings. Such interference enables the hackers to start sending CAN messages that generate errors leading to a device DoS.
 
“Instead of changing the legacy CAN protocol in all cars that use it (practically all vehicles), the industry should harden the externally-connected ECUs according to their factory settings, to prevent any unauthorised change to the ECU. Blocking such changes enables the industry to prevent cyber-attacks, including the DoS attack that Trend Micro reported on.”

For more information on companies in this article

Related Content

  • Motor insurance for autonomous vehicles ‘will shift from drivers to OEMs’
    October 19, 2015
    Autonomous vehicles are likely to increase insurance claims related to product parameters rather than driver liability New analysis from Frost & Sullivan, Impact of Automated Vehicles on Motor Insurance Market, finds that motor insurers will move away from the driver-centric strategy to follow one or a combination of three models as automated vehicles become common: product-centric evaluation; brand-centric evaluation; system-centric evaluation.
  • More openness - the simple answer to transport's data issues
    October 22, 2018
    Public transit agencies create a lot of data – but using it constructively to solve transportation issues has been a problem. Ben Winokur and Luke Segars think they have the answer: greater openness. Today, more people are connected through smartphones than ever before - and they’re using them for more than texting and calling. People are searching for jobs on their devices, dating, shopping and even managing their finances. But Forbes reports that only a select few companies leverage all the technology at
  • Developments in toll interoperability
    July 16, 2012
    The North Carolina Turnpike Authority's JJ Eden talks about developments within the Alliance for Toll Interoperability. The Alliance for Toll Interoperability grew out of the US State of North Carolina's moves to introduce modern, Open Road Tolling (ORT) and the identification of revenue 'holes' when it came to out-of-state customers. Initially, the Alliance looked to achieve some form of common ground when it came to the use of transponders used by different agencies but alighted on video-based tolling as
  • FASTR consortium releases Automotive Industry Guidelines for Secure Over-the-Air Updates
    November 9, 2017
    A non-profit research consortium dedicated to automotive cyber security, Future of Automotive Security Technology Research (FASTR), has announced the availability of the Automotive Industry Guidelines for Secure Over-the-Air Updates. These guidelines are intended to assist automotive manufacturers and others involved in evaluating platforms for secure updates, describing the threat models, providing recommended cryptographic algorithms and detailing a step-by-step checklist for evaluating state of the art