Skip to main content

Michigan researchers show how easy it is to hack trucks

Cybersecurity researchers have already shown how easy it is to hack a Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected. At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking. They plan to show how the openness of the SAE J1939 standard used across
August 5, 2016 Read time: 2 mins
Cybersecurity researchers have already shown how easy it is to hack a 1957 Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected.

At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking.

They plan to show how the openness of the SAE J1939 standard used across all US heavy vehicle industries gives easy access for safety-critical attacks and that these attacks aren't limited to one specific make, model, or industry.

They will test their attacks on a 2006 Class-8 semi tractor and 2001 school bus and demonstrate how simple it is to replicate the kinds of attacks used on consumer vehicles and that it is possible to use the same attack on other vehicles that use the SAE J1939 standard.

They will also show safety critical attacks that include the ability to accelerate a truck in motion, disable the driver's ability to accelerate, and disable the vehicle's engine brake. Their presentation concludes with a discussion of the possibilities of additional attacks and potential remote attack vectors.

Related Content

  • January 25, 2012
    Connected vehicle technology the solution to safety?
    A series of 'driver clinics' is under way across five states, as vehicle manufacturers and the US Government pin their hopes on connected vehicles becoming the next big advance in road safety. Pete Goldin reports. What would a car say if it could talk? Its first words might be: "Here I am". Many vehicles are communicating that very message to each other right now. Admittedly, this is in controlled environments of US Department of Transportation (USDoT) tests, but within the next few years 'connected vehicle
  • November 27, 2013
    Advanced Driver Assistance Systems: a solution or another problem?
    Do Advanced Driver Assistance Systems represent a positive step forward for safety, or something of a safety risk? Jason Barnes discusses the issue with leading industry figures. Advanced Driver Assistance Systems (ADAS) are already common. Anti-lock brakes or electronic stability control are well understood and are either fitted as standard or frequently requested by new vehicle buyers. More advanced ADAS features are appearing on many top-end vehicles and the trickle-down has already started. Adaptive
  • June 10, 2021
    Robotic Research: harnessing AV potential
    Robotic Research is leading in AV R&D, from work with the US Army to enabling the first automated BRT line in North America: Gordon Feller assesses what the company is doing
  • August 10, 2016
    Technologies to protect connected cars ‘not being utilised’
    A three-year study by IOActive’s Cybersecurity Division has found half of vehicle vulnerabilities could allow cyber attackers to take control of a vehicle - and 71 per cent are ‘easy to exploit’. The research, detailed in a whitepaper, Commonalities in Vehicle Vulnerabilities, is based on real-world security assessments. Technologies which could be exploited include cellular radio, Bluetooth, wi-fi, companion apps, vehicle to vehicle (V2V) radio, onboard diagnostic equipment, infotainment media and Zigbe