Skip to main content

Michigan researchers show how easy it is to hack trucks

Cybersecurity researchers have already shown how easy it is to hack a Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected. At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking. They plan to show how the openness of the SAE J1939 standard used across
August 5, 2016 Read time: 2 mins
Cybersecurity researchers have already shown how easy it is to hack a 1957 Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected.

At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking.

They plan to show how the openness of the SAE J1939 standard used across all US heavy vehicle industries gives easy access for safety-critical attacks and that these attacks aren't limited to one specific make, model, or industry.

They will test their attacks on a 2006 Class-8 semi tractor and 2001 school bus and demonstrate how simple it is to replicate the kinds of attacks used on consumer vehicles and that it is possible to use the same attack on other vehicles that use the SAE J1939 standard.

They will also show safety critical attacks that include the ability to accelerate a truck in motion, disable the driver's ability to accelerate, and disable the vehicle's engine brake. Their presentation concludes with a discussion of the possibilities of additional attacks and potential remote attack vectors.

Related Content

  • Sharing resources, reducing traffic management costs
    January 25, 2012
    Telematics Technology’s Peter Billington, Chair of the UTMC ANPR Working Group, on how common protocols can enhance local agency cooperation and significantly reduce costs
  • The ABC of CARTES 2014: Apple, Bitcoin and cloud security are all on the conference agenda
    October 28, 2014
    CARTES 2014, the global event for payment, identification and mobility, is fast approaching and the world’s experts in the sector are about to head to Paris for its biggest and most important annual gathering. The 2013 event welcomed more than 20,000 visitors, some 1,670 of whom attended the opening conference - the World Card Summit - while also visiting the 450 exhibitors at the venue.
  • A carbon free and accident free Europe by 2015?
    February 2, 2012
    By 2050, the Europe Commission aims to make transport in Europe carbon- and accident-free. Between now and then, however, a significant technological development and deployment effort is needed. Here, Neelie Kroes, European Commission Vice-President for the Digital Agenda, talks about what's being done. In many respects, COOPERS, CVIS and SAFESPOT, set up by the European Commission (EC) to explore the potential of cooperative infrastructure systems, are already legacy projects. Between them, the three devel
  • WIM system certification is a complex business
    February 21, 2018
    There are interesting moves afoot to create Germany’s first Weigh-In-Motion enforcement site in Hamburg – but Florian Weiss of Traffic Data Systems warns that WIM certification is a complex business. In the past, Weigh-In-Motion (WIM) was mainly used for statistical (WIM-S) and pre-selection (WIM-P) applications. These abbreviations - as well as WIM-E (enforcement) and WIM-T (tolling) - were created by Traffic Data Systems during Intertraffic 2006 in Amsterdam. This was also the year when we started the