Skip to main content

Michigan researchers show how easy it is to hack trucks

Cybersecurity researchers have already shown how easy it is to hack a Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected. At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking. They plan to show how the openness of the SAE J1939 standard used across
August 5, 2016 Read time: 2 mins
Cybersecurity researchers have already shown how easy it is to hack a 1957 Jeep Cherokee and take control of its brakes and steering, resulting in a recall for the vulnerability to be corrected.

At the Usenix Workshop on Offensive Technologies conference next week, a group of University of Michigan researchers plan to demonstrate how trucks, which have also begun adding similar electronic control system, can be vulnerable to hacking.

They plan to show how the openness of the SAE J1939 standard used across all US heavy vehicle industries gives easy access for safety-critical attacks and that these attacks aren't limited to one specific make, model, or industry.

They will test their attacks on a 2006 Class-8 semi tractor and 2001 school bus and demonstrate how simple it is to replicate the kinds of attacks used on consumer vehicles and that it is possible to use the same attack on other vehicles that use the SAE J1939 standard.

They will also show safety critical attacks that include the ability to accelerate a truck in motion, disable the driver's ability to accelerate, and disable the vehicle's engine brake. Their presentation concludes with a discussion of the possibilities of additional attacks and potential remote attack vectors.

Related Content

  • July 24, 2012
    Urban utility
    Steve Lane, Commercial Director at Triteq, talks about the successful deployment of ZigBee in Barcelona where a low-cost wireless metropolitan network for location and citizen services was established. The project, he says, demonstrates ZigBee's effectiveness as an urban communications system solution ZigBee is based on the IEEE radio frequency standard 802.15.4 - 2006 for Wireless Personal Area Networks (WPAN), which provides a license-free radio frequency for a flexible, robust private wireless network. Z
  • November 6, 2019
    AVs and bombs: a sinister possibility
    Vehicle-ramming attacks by terrorists on pedestrians – often involving multiple fatalities - are sobering reminders of how cars and vans can be used for ill. But a recent court case in the UK highlights a sinister use of newer technology
  • August 18, 2017
    Trend Micro discovers 'indefensible' car security/CAN standard flaw
    Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
  • October 17, 2019
    Getting C/AVs from pipedream to reality
    The UK government has suggested that driverless cars could be on the roads by 2021. But designers and engineers are grappling with a number of difficult issues, muses Chris Hayhurst of MathWorks Earlier this year, the UK government made the bold statement that by 2021, driverless cars will be on the UK’s roads. But is this an achievable reality? Driverless technology already has its use cases on our roads, with levels of autonomy ranked on a scale. At one end of the spectrum, level 1 is defined by th