Skip to main content

Karamba’s Carwall thwarts mass hacks

Karamba Security’s Carwall software is said to prevent ‘mass hacks’ of vehicles’ on-board systems including those for connected and autonomous driving. Carwall sits in the vehicle ECUs and ‘learns’ the factory settings. If hackers breach the manufacturer’s cyber security and tries to infect the ECUs of in-service vehicles, Karamba’s software detects the impending change to factory settings and blocks activation. David Barzilai, the company’s chairman and co-founder, said with tens of millions of l
September 13, 2016 Read time: 2 mins
8519 Karamba Security’s Carwall software is said to prevent ‘mass hacks’ of vehicles’ on-board systems including those for connected and autonomous driving.  

Carwall sits in the vehicle ECUs and ‘learns’ the factory settings. If hackers breach the manufacturer’s cyber security and tries to infect the ECUs of in-service vehicles, Karamba’s software detects the impending change to factory settings and blocks activation.
 
David Barzilai, the company’s chairman and co-founder, said with tens of millions of lines of code in car software, it is impossible to guarantee all security bugs are eliminated. Carwall does not stop a hacker exploiting a security bug to transmit malware to a vehicle’s ECUs but it does prevent that malware being activated.

When Carwall detects foreign activity or code on an ECU it sends an alert to the manufacturer and system providers’ details on security bugs the hackers exploited, the code they attempted to run and the function it would execute. According to Barzilai, as the factory settings are definitive, Carwall does not produce false positives.

The software can be installed retrospectively to in-service vehicles by authorised distributers but cannot prevent individual hacks where the hacker can physically connect the vehicle’s CANbus architecture.

Related Content

  • March 28, 2014
    RedSpeed offers schools automated no-cost stop arm enforcement
    School authorities in the US are turning to automated school bus stop arm enforcement to curb an astonishing number of violations. It is estimated that every year nearly 17,000 American children are sent to emergency rooms as a result of school bus related crashes. And when surveyed, 99% of school bus drivers reported that the most dangerous behaviour they encounter is drivers passing a school bus with its stop sign arm extended. Every day these drivers who violate the extended stop arm signs put at risk
  • March 21, 2022
    The benefits of Lidar

    While Lidar is gaining ground in the ITS industry, it has not yet reached the level of mass adoption where it shows up frequently in requests for proposals (RFPs) from cities and DoTs.

  • August 10, 2016
    Technologies to protect connected cars ‘not being utilised’
    A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe
  • January 31, 2012
    Intersection collision avoidance system trial
    Although much of the emphasis of research into intersection management has tended to concentrate on the needs of urban locations, there remain specific issues pertaining to rural intersections which need to be addressed. Here, Rebecca Szymkowski and Greg Helgeson, Wisconsin DOT, Todd Szymkowski, University of Wisconsin-Madison, and Craig Shankwitz and Arvind Menon, University of Minnesota detail progress on an intersection collision avoidance system for more remote locations.