Skip to main content

Michigan researchers show how easy it is to hack trucks

Cybersecurity researchers have already shown how easy it is to hack a Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected. At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking. They plan to show how the openness of the SAE J1939 standard used across
August 5, 2016 Read time: 2 mins
Cybersecurity researchers have already shown how easy it is to hack a 1957 Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected.

At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking.

They plan to show how the openness of the SAE J1939 standard used across all US heavy vehicle industries gives easy access for safety-critical attacks and that these attacks aren't limited to one specific make, model, or industry.

They will test their attacks on a 2006 Class-8 semi tractor and 2001 school bus and demonstrate how simple it is to replicate the kinds of attacks used on consumer vehicles and that it is possible to use the same attack on other vehicles that use the SAE J1939 standard.

They will also show safety critical attacks that include the ability to accelerate a truck in motion, disable the driver's ability to accelerate, and disable the vehicle's engine brake. Their presentation concludes with a discussion of the possibilities of additional attacks and potential remote attack vectors.

Related Content

  • March 16, 2015
    US updates ITS strategy for Connected Vehicle deployment
    Jon Masters looks at the USDOT’s new ITS Strategic Plan for the next five years. Emphasis and direction for the next five years of Government led ITS research in the United States has been framed within a new ITS Strategic Plan. The US Department for Transportation’s (USDOT) ITS Joint Program Office (JPO) published the report at the tail end of 2014 after concluding a two-year ITS industry consultation process. The Plan identifies a vision to transform the way society moves and the ITS JPO’s aim of advancin
  • June 29, 2021
    Can AV mapping rely on crowds?
    Mapping tech companies need to expand their data inputs beyond crowdsourcing in order to maintain temporally accurate maps at scale, says Ro Gupta at Carmera
  • February 23, 2021
    CVs vulnerable to ‘low skill’ cyberattacks: report
    17% of potential attack scenarios on connected vehicles identified as high-risk, finds Trend Micro 
  • January 31, 2012
    Wireless traffic data in real time
    The effect of moving objects on the electromagnetic landscape set up by cellular telephony networks can be detected and interpreted to give real-time traffic data across large geographical areas at low cost. Here, we revisit the Celldar concept. Global economic downturn has pushed public-sector agencies, transport administrations among them, to push even harder for cost efficiencies. Unfortunately, when it comes to transport safety and efficiency the public sector often has to work up to a cost rather than