Skip to main content

Karamba’s Carwall thwarts mass hacks

Karamba Security’s Carwall software is said to prevent ‘mass hacks’ of vehicles’ on-board systems including those for connected and autonomous driving. Carwall sits in the vehicle ECUs and ‘learns’ the factory settings. If hackers breach the manufacturer’s cyber security and tries to infect the ECUs of in-service vehicles, Karamba’s software detects the impending change to factory settings and blocks activation. David Barzilai, the company’s chairman and co-founder, said with tens of millions of l
September 13, 2016 Read time: 2 mins
8519 Karamba Security’s Carwall software is said to prevent ‘mass hacks’ of vehicles’ on-board systems including those for connected and autonomous driving.  

Carwall sits in the vehicle ECUs and ‘learns’ the factory settings. If hackers breach the manufacturer’s cyber security and tries to infect the ECUs of in-service vehicles, Karamba’s software detects the impending change to factory settings and blocks activation.
 
David Barzilai, the company’s chairman and co-founder, said with tens of millions of lines of code in car software, it is impossible to guarantee all security bugs are eliminated. Carwall does not stop a hacker exploiting a security bug to transmit malware to a vehicle’s ECUs but it does prevent that malware being activated.

When Carwall detects foreign activity or code on an ECU it sends an alert to the manufacturer and system providers’ details on security bugs the hackers exploited, the code they attempted to run and the function it would execute. According to Barzilai, as the factory settings are definitive, Carwall does not produce false positives.

The software can be installed retrospectively to in-service vehicles by authorised distributers but cannot prevent individual hacks where the hacker can physically connect the vehicle’s CANbus architecture.

For more information on companies in this article

Related Content

  • Audi Urban Intelligent Assist research programme launched
    May 21, 2012
    A new research initiative launched by Audi, its electronics research laboratory in Silicon Valley and four top US universities aims to develop technologies focused on easing the congestion, dangers and inconveniences that often confront drivers in the world's biggest cities. The new three-year Audi Urban Intelligent Assist research initiative aims to take connected car, driver assistance and infrastructure electronics to the next level of providing detailed information so motorists have a better sense of th
  • Priority boosts ridership and cuts congestion
    May 4, 2016
    Transit priority is proving a win-win in Europe and Australia. David Crawford reports. Technology that integrates with the Australian-originated Sydney Coordinated Adaptive Traffic System (SCATS) is driving bus signal priority and performance analysis initiatives on both sides of the world; in its homeland, with a major deployment in 2015, and in the capital of the Republic of Ireland.
  • Connected Signals aims to improve mass transit in Arcadia
    July 8, 2019
    Connected Signals has introduced a smart signal priority system to manage mass transit in the US city of Arcadia, California. The company says its Vehicle to Infrastructure (V2I) technology will to help reduce traffic signal delays by using artificial intelligence to anticipate users’ arrivals at signalised intersections and then request priority. Connected Signals’ Transit Signal Priority (TSP) is expected to help the city’s buses get in the ‘green wave’ of traffic, either by extending a green light or b
  • MIT researchers hack into traffic lights
    August 22, 2014
    With permission from a local road agency, researchers in from the University of Michigan hacked into nearly 100 wirelessly networked traffic lights, highlighting security issues that they say are likely to pervade networked traffic infrastructure around the country. More than 40 states currently use such systems to keep traffic flowing as efficiently as possible, helping to reduce emissions and delays. The team, led by University of Michigan computer scientist J. Alex Halderman, found three major weaknes