Skip to main content

Michigan researchers show how easy it is to hack trucks

Cybersecurity researchers have already shown how easy it is to hack a Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected. At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking. They plan to show how the openness of the SAE J1939 standard used across
August 5, 2016 Read time: 2 mins
Cybersecurity researchers have already shown how easy it is to hack a 1957 Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected.

At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking.

They plan to show how the openness of the SAE J1939 standard used across all US heavy vehicle industries gives easy access for safety-critical attacks and that these attacks aren't limited to one specific make, model, or industry.

They will test their attacks on a 2006 Class-8 semi tractor and 2001 school bus and demonstrate how simple it is to replicate the kinds of attacks used on consumer vehicles and that it is possible to use the same attack on other vehicles that use the SAE J1939 standard.

They will also show safety critical attacks that include the ability to accelerate a truck in motion, disable the driver's ability to accelerate, and disable the vehicle's engine brake. Their presentation concludes with a discussion of the possibilities of additional attacks and potential remote attack vectors.

Related Content

  • July 27, 2012
    Give offending drivers credit for good behaviour
    Andrew Rooke and Dave Marples of Technolution B.V. take a look at what can be done to address a long-standing problem: the all-or-nothing approach of automated enforcement. To start, a brief history of speeding: on 14 November 1896, the first Veteran Car Run was staged in England from London to Brighton. It was organised to celebrate new British legislation to raise the maximum speed of vehicles from four to 14mph while also removing the need for a person waving a red flag to walk in front of the car and wa
  • May 1, 2014
    Traffic control systems ‘vulnerable to hacking’
    Devices used by traffic control systems are vulnerable to being hacked, according to computer security specialist IOActive. Hackers could gain complete control of these devices and cause traffic issues for the cities in the US, UK, France, Australia, China and beyond.
  • September 8, 2014
    Michigan to lead way on V2V and V2I system
    The world’s largest vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) system will be put in place in Michigan by 2017.
  • February 6, 2012
    Enforceable distracted driving solution
    Cellcontrol says it has adapted its technology to Class A (SAE J1939), an industry standard that will allow its Cellcontrol system to operate within a variety of fleet vehicles, including commercial vehicles, big rigs, school buses, heavy equipment and other Class A vehicles. Utilising the vehicle's onboard computer, Cellcontrol determines when the vehicle is moving at any speed and, based on a company's distracted driving policy, instantly blocks the use of a driver's cell phone, laptop computer or other m