Skip to main content

Michigan researchers show how easy it is to hack trucks

Cybersecurity researchers have already shown how easy it is to hack a Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected. At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking. They plan to show how the openness of the SAE J1939 standard used across
August 5, 2016 Read time: 2 mins
Cybersecurity researchers have already shown how easy it is to hack a 1957 Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected.

At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking.

They plan to show how the openness of the SAE J1939 standard used across all US heavy vehicle industries gives easy access for safety-critical attacks and that these attacks aren't limited to one specific make, model, or industry.

They will test their attacks on a 2006 Class-8 semi tractor and 2001 school bus and demonstrate how simple it is to replicate the kinds of attacks used on consumer vehicles and that it is possible to use the same attack on other vehicles that use the SAE J1939 standard.

They will also show safety critical attacks that include the ability to accelerate a truck in motion, disable the driver's ability to accelerate, and disable the vehicle's engine brake. Their presentation concludes with a discussion of the possibilities of additional attacks and potential remote attack vectors.

For more information on companies in this article

Related Content

  • Adopting universal technology platforms for tolling
    July 16, 2012
    Dave Marples of Technolution argues that the continuing development of tolling-specific onboard equipment is leading us up a blind alley. We should, he says, be looking to realise universal platforms with universal application. The near-future automobile contains information systems of a sophistication to rival a jet airliner of only a few years ago, yet is 'piloted' by a considerably less well-trained individual of highly variable mental and physical capacity, and operated in a hostile, unpredictable and p
  • Development of cooperative driving applications for work zones
    July 17, 2012
    The German AKTIV project is researching several cooperative driving applications for use in work zones. PTV's Michael Ortgiese details progress. The steep increases in traffic volumes predicted back in the early 1990s have unfortunately been proven to be more than accurate. In Germany, the AKTIV project continues to look into cooperative technologies' potential to reduce the impact of those increased traffic volumes and keep traffic moving despite limitations in infrastructure capacity.
  • Transport Systems Catapult boss: ‘We can’t build our way out of congestion’
    March 4, 2019
    The UK Transport Systems Catapult’s CEO Paul Campion talks to Colin Sowman about helping companies develop tomorrow’s solutions – and explains why you can never build your way to empty roads The future of mobility is going to be driven by services.” That’s the opening position of Paul Campion, CEO of the Transport Systems Catapult (TSC) – the UK government organisation set up to help boost transport-related employment and the economy. Campion was previously with IBM and describes himself as a ‘techno o
  • Need for secure approach to connected vehicle technology
    January 7, 2013
    Accidental or malicious issue of false messages to connected vehicles could result in dire consequences, so secure systems of authentication and certification are likely to be necessary, write Paul Avery and Sandra Dykes. Connectivity among vehicles in urban traffic systems will provide opportunity for beneficial impacts such as congestion reduction and greater safety. However, it also creates security risks with the potential for targeted disruption. Security algorithms, protocols and procedures must take