Skip to main content

Michigan researchers show how easy it is to hack trucks

Cybersecurity researchers have already shown how easy it is to hack a Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected. At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking. They plan to show how the openness of the SAE J1939 standard used across
August 5, 2016 Read time: 2 mins
Cybersecurity researchers have already shown how easy it is to hack a 1957 Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected.

At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking.

They plan to show how the openness of the SAE J1939 standard used across all US heavy vehicle industries gives easy access for safety-critical attacks and that these attacks aren't limited to one specific make, model, or industry.

They will test their attacks on a 2006 Class-8 semi tractor and 2001 school bus and demonstrate how simple it is to replicate the kinds of attacks used on consumer vehicles and that it is possible to use the same attack on other vehicles that use the SAE J1939 standard.

They will also show safety critical attacks that include the ability to accelerate a truck in motion, disable the driver's ability to accelerate, and disable the vehicle's engine brake. Their presentation concludes with a discussion of the possibilities of additional attacks and potential remote attack vectors.

Related Content

  • November 18, 2015
    Real-world testing is needed in wake of VW emissions scandal, says expert
    As vehicle manufacturers, regulators and governments around the world seek solutions to prevent another emissions cheating scandal similar to the Volkswagen case, a major vehicle emissions inspection company has compiled and analysed on-road emissions data indicating that emissions violations of vehicles under real-world driving conditions may well go far beyond VW diesels. Opus Inspection says a two-pronged approach that continuously monitors real-world emissions is the only effective remedy. Lothar Ge
  • July 16, 2012
    Developments in toll interoperability
    The North Carolina Turnpike Authority's JJ Eden talks about developments within the Alliance for Toll Interoperability. The Alliance for Toll Interoperability grew out of the US State of North Carolina's moves to introduce modern, Open Road Tolling (ORT) and the identification of revenue 'holes' when it came to out-of-state customers. Initially, the Alliance looked to achieve some form of common ground when it came to the use of transponders used by different agencies but alighted on video-based tolling as
  • April 26, 2013
    ITS asset management matters
    Maintenance of on-road ITS kit needs to become more sophisticated; while new technologies can deliver better road maintenance. David Crawford investigates both sides of the issue "Good information is key to effective ITS asset maintenance,” says Ian Routledge of the Ian Routledge Consultancy (IRC), whose Imtrac (Information Management for TRAffic Control) system is poised for European expansion. Developed as an ‘intelligent filing cabinet’ for storing information about on-road equipment, the online database
  • February 1, 2012
    Legalities of in-vehicle systems and cooperative infrastructures
    Paul Laurenza of Dykema Gossett PLLC discusses the paths which lawmakers may go down on the route to making in-vehicle systems and cooperative infrastructures a reality. The question of whether or not to mandate in-vehicle systems for safety and other applications is a vexed one. There is a presumption on some parts that going down the road of forcing systems' fitment is somehow too domineering or restricting. Others would argue that it is the only realistic way of ensuring that systems achieve widespread d