Skip to main content

Michigan researchers show how easy it is to hack trucks

Cybersecurity researchers have already shown how easy it is to hack a Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected. At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking. They plan to show how the openness of the SAE J1939 standard used across
August 5, 2016 Read time: 2 mins
Cybersecurity researchers have already shown how easy it is to hack a 1957 Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected.

At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking.

They plan to show how the openness of the SAE J1939 standard used across all US heavy vehicle industries gives easy access for safety-critical attacks and that these attacks aren't limited to one specific make, model, or industry.

They will test their attacks on a 2006 Class-8 semi tractor and 2001 school bus and demonstrate how simple it is to replicate the kinds of attacks used on consumer vehicles and that it is possible to use the same attack on other vehicles that use the SAE J1939 standard.

They will also show safety critical attacks that include the ability to accelerate a truck in motion, disable the driver's ability to accelerate, and disable the vehicle's engine brake. Their presentation concludes with a discussion of the possibilities of additional attacks and potential remote attack vectors.

Related Content

  • January 20, 2017
    Automotive software developers call on hackers to find its flaws
    A consortium of US researchers has announced the development of a universal, free, and open-source framework to protect wireless software updates in vehicles. The team issued a challenge to security experts everywhere to try to find vulnerabilities before it is adopted by the automotive industry. The new solution, called Uptane, evolves the widely used TUF (The Update Framework), developed by NYU Tandon School of Engineering Assistant Professor of Computer Science and Engineering Justin Cappos to secure
  • July 16, 2012
    Semi-autonomous hybrid vehicle trials show fuel, emission savings
    The Transport Research Laboratory has unveiled an innovative semi-autonomous vehicle prototype. It offers improves in environmental performance and safety but also displays some shortcomings. Mike Woof reports. The UK's Transport Research Laboratory (TRL) has been working on an innovative project to develop a prototype vehicle intended to reduce fuel consumption. Based on a Ford Escape hybrid model, TRL's Sentience vehicle uses a combination of mobile communications and mapping technologies to reduce fuel c
  • February 2, 2012
    Pioneering IntelliDrive technologies in Michigan
    Pete Goldin reports on upgrades to the USDOT's Michigan Test Bed, where IntelliDrive technologies are being pioneered
  • February 1, 2012
    Intersection management, cooperative infrastructures - what next?
    What do recent vehicle recalls mean for future cooperative infrastructures? Anthony Smith takes a look. As ITS industry stakeholders converge on Amsterdam for the 2010 Cooperative Mobility Showcase, an unprecedentedly wide range of technologies will be on display demonstrating what might be achievable in the future from innovations based on Vehicle-to-Vehicle (V2V) and Vehicle-to-Infrastructure (V2I) communications.