A new study shows automotive software is as vulnerable to malicious hackers as the average PC. The report entitled,
"Experimental Security Analysis of a Modern Automobile,"
was presented in May at the 2010 IEEE Symposium on Security and Privacy by a team from the University of Washington and the University of California, San Diego.
The research paper demonstrated how a sophisticated hacker could wreak havoc on a vehicle by manipulating the in-vehicle computer network or remotely accessing it via its wireless connectivity to the Web. The 11-person research team pointed out all new cars are "pervasively computerized" and control a wide array of components, including the engine, brakes, heating and cooling, lights, instrument panel, radio, and locks.
The researchers tested two 2009-model-year cars, whose make and model were not identified. They were able to connect a laptop to a standard onboard diagnostic computer port, which allowed them to control the car's computer wirelessly using a second laptop in a separate car. The team didn't identify the test cars because they did not want to single out a particular automaker.
However, both vehicles had the controller area network (CAN) system, required as a diagnostic tool on all U.S. cars built since 2008. The team wrote a software utility program allowing them to listen to CAN traffic and insert their own network instructions. The paper demonstrated the ease in which a sophisticated attacker could control a wide range of automotive functions and completely bypass driver input.
For example, by accessing the various electronic control modules (ECM) or engine control module, the researchers were able to manipulate the fuel level gauge, falsify the speedometer reading, display arbitrary dashboard messages, dial-up the heat or A/C, lock passengers in the car, continuously blare the horn, pop the trunk, turn off the lights, activate the windshield wipers, disable the brakes, selectively brake individual wheels on demand, and stop the engine. In addition, after deploying these malicious software commands, the team successfully erased any evidence of their tampering.