Skip to main content

Michigan researchers show how easy it is to hack trucks

Cybersecurity researchers have already shown how easy it is to hack a Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected. At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking. They plan to show how the openness of the SAE J1939 standard used across
August 5, 2016 Read time: 2 mins
Cybersecurity researchers have already shown how easy it is to hack a 1957 Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected.

At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking.

They plan to show how the openness of the SAE J1939 standard used across all US heavy vehicle industries gives easy access for safety-critical attacks and that these attacks aren't limited to one specific make, model, or industry.

They will test their attacks on a 2006 Class-8 semi tractor and 2001 school bus and demonstrate how simple it is to replicate the kinds of attacks used on consumer vehicles and that it is possible to use the same attack on other vehicles that use the SAE J1939 standard.

They will also show safety critical attacks that include the ability to accelerate a truck in motion, disable the driver's ability to accelerate, and disable the vehicle's engine brake. Their presentation concludes with a discussion of the possibilities of additional attacks and potential remote attack vectors.

For more information on companies in this article

Related Content

  • Digital Light Processing transforms travel information
    July 19, 2012
    David Crawford investigates the potential of new projection technology. Fifty years on from its invention of the microchip, US company Texas Instruments (TI) has compressed the technology into a surface area of just 4.3mm. As such, it forms the heart of a new Pico Digital Light Processing (DLP) system that is set to transform travel information delivery for millions of users on the move - by making it projectable.
  • Temporary traffic monitoring with Bluetooth and wi-fi
    May 31, 2013
    David Crawford reviews developments in temporary ITS. Widespread take-up of technologies such as Bluetooth and wi-fi are encouraging the emergence of more sophisticated, while still cost effective, ITS responses to the traffic issues posed by temporary road situations such as work zones and special events. Andy Graham of traffic solutions specialists White Willow Consulting says: “A machine-to-machine radio link is far easier and cheaper than reading characters on a plate.” There can be other plusses. Tech
  • Debating the future development of ANPR
    July 31, 2012
    What future is there for automatic number plate recognition? Will it be supplanted by electronic vehicle identification, or will continuing development maintain the technology's relevance? In recent years, digitisation and IP-based communication networks have allowed Automatic Number Plate Recognition (ANPR) to achieve ever-greater utility and a commensurate increase in deployments. But where does the technology go next - indeed, does it have a future in the face of the increasing use of, for instance, Dedi
  • Bringing V2I and V2V communications to workzone safety
    January 26, 2012
    Imran Hayee of the University of Minnesota Duluth's Department of Electrical and Computer Engineering talks about efforts to bring V2I and V2V communications into work zones. With USDOT backing and under the auspices of the ITS Joint Program Office Connected Vehicle Research (formerly IntelliDrive) research programme, M. Imran Hayee of the University of Minnesota Duluth's Department of Electrical and Computer Engineering along with team of his students, have been conducting research into the application of