Wednesday, December 4, 2013

Hackers Find Weaknesses In Car Computer Systems
Tue, 09/03/2013 - 9:40am
Tom Krisher, AP Auto Writer





DETROIT (AP) -- As cars become more like PCs on wheels, what's to stop a hacker from taking over yours?

In recent demonstrations, hackers have shown they can slam a car's brakes at freeway speeds, jerk the steering wheel and even shut down the engine — all from their laptop computers.

The hackers are publicizing their work to reveal vulnerabilities present in a growing number of car computers. All cars and trucks contain anywhere from 20 to 70 computers. They control everything from the brakes to acceleration to the windows, and are connected to an internal network. A few hackers have recently managed to find their way into these intricate networks.

In one case, a pair of hackers manipulated two cars by plugging a laptop into a port beneath the dashboard where mechanics connect their computers to search for problems. Scarier yet, another group took control of a car's computers through cellular telephone and Bluetooth connections, the compact disc player and even the tire pressure monitoring system.

To be sure, the "hackers" involved were well-intentioned computer security experts, and it took both groups months to break into the computers. And there have been no real-world cases of a hacker remotely taking over a car. But experts say high-tech hijackings will get easier as automakers give them full Internet access and add computer-controlled safety devices that take over driving duties, such as braking or steering, in emergencies. Another possibility: A tech-savvy thief could unlock the doors and drive off with your vehicle.

"The more technology they add to the vehicle, the more opportunities there are for that to be abused for nefarious purposes," says Rich Mogull, CEO of Phoenix-based Securosis, a security research firm. "Anything with a computer chip in it is vulnerable, history keeps showing us."

In the last 25 years, automakers have gradually computerized functions such as steering, braking, accelerating and shifting. Electronic gas pedal position sensors, for instance, are more reliable than the old throttle cables. Electronic parts also reduce weight and help cars use less gasoline.

The networks of little computers inside today's cars are fertile ground for hackers.

Charlie Miller, a St. Louis-based security engineer for Twitter, and fellow hacker Chris Valasek, director of intelligence at a Pittsburgh computer security consulting firm, maneuvered their way into the computer systems of a 2010 Toyota Prius and 2010 Ford Escape through a port used by mechanics.

"We could control steering, braking, acceleration to a certain extent, seat belts, lights, horn, speedometer, gas gauge," said Valasek. The two used a federal grant to expose the vulnerability of car computers. Even with their expertise, it took them nine months to get in.

Valasek and Miller released a report, including instructions on how to break into the cars' networks, at a hacker convention in August. They said they did so to draw attention to the problems and get automakers to fix them. The pair say automakers haven't added security to the ports.

Ford wouldn't comment other than a statement saying it takes security seriously, and that Miller and Valasek needed physical access to the cars to hack in.

Toyota said it has added security and continually tests it to stay ahead of hackers. The company said its computers are programmed to recognize rogue commands and reject them.

Two years ago, researchers at the University of Washington and University of California, San Diego did more extensive work, hacking their way into a 2009 midsize car through its cellular, Bluetooth and other wireless connections — even the CD player.

Stefan Savage, a UCSD computer science professor, said he and other researchers could control nearly everything but the car's steering. "We could have turned the brakes off. We could have killed the engine. We could have engaged the brakes," he said.

Savage wouldn't identify which manufacturer made the car they hacked into. But two people with knowledge of the work said the car was from General Motors and the researchers compromised the OnStar safety system, best known for using cellular technology to check on customers and call for help in a crash. The people didn't want to be identified because they were not authorized to speak publicly on the matter.

GM wouldn't comment on the research, but the company issued a statement saying it takes security seriously and is putting strategies in place to reduce risk.

One of the people said GM engineers initially dismissed the researchers' work, but after reading the report, quickly moved to close holes that allowed access to the car's computers.

Savage doesn't think common criminals will be able to electronically seize control of cars anytime soon. Currently it would take too much time, expertise, money and hard work to hack into the multitude of computer systems.

"You're talking about a rarefied group who has the resources and wherewithal," he said.

Instead, he believes basic theft is a more likely consequence of computerization, with criminals being able to unlock doors remotely and then start and drive the car by hacking through the diagnostic port. Remote door unlocking could also lead to theft of packages, phones and other items that are stored in a car.

10 comments:

  1. This article talks about the disadvantages of programming software technology into the automobile vehicles like cars,the more technology they add to the vehicle, the more opportunities there are for that to be abused for nefarious purposes. A tech-savvy thief could unlock the doors and drive off with your vehicle, if he knows how to unlock the remote keys.Thus the networks of little computers inside today's cars are fertile ground for hackers. Companies like Toyota said it has added security and continually tests it to stay ahead of hackers, they said its computers are programmed to recognize rogue commands and reject them. Hence their is no perfect solution still found by any automobile company to prevent automobile hacking but computer programmers are still working on various software to provide their customers automobiles from non-hacking.

    ReplyDelete
  2. This article is all about the drawbacks of programming software technology into the automobile vehicles like cars,the more technology they add to the vehicle, the more opportunities there are for that to be abused for nefarious purposes. A tech-savvy thief could unlock the doors and drive off with your vehicle, if he knows how to unlock the remote keys.Other companies like Toyota said it has added security. they test for hackers.Hence their is no perfect solution still found by any automobile company to prevent automobile hacking but computer programmers are still working on various software to provide their customers automobiles from non-hacking.

    ReplyDelete
  3. This comment has been removed by the author.

    ReplyDelete
  4. Hacking and hackers are increasing day by day. As there is a continuous improvement in technology. Hackers are creating menace using this technology. best example is, hackers have shown they can slam a car's brakes at freeway speeds, jerk the steering wheel and even shut down the engine — all from their laptop computers. To reduce this menace cyber crime should take necessary actions. even companies like Toyota said it has added security and continually tests it to stay ahead of hackers. The company said its computers are programmed to recognize rogue commands and reject them.

    ReplyDelete
  5. Just like a coin has two sides, even technology has both advantages and disadvantages so one has to be really careful with it. If one can get access to the brakes, steering, music player and everything in the vehicle not only through laptop or computer but even through cell phone and bluetooth connection it is very dangerous. The car companies need to be careful with it and they need to keep something like a security chip or something for the safety of the customer. Various big companies are telling that they take the safety of the customers very seriously. So, at least hopefully in the future such things can be avoided.

    ReplyDelete
  6. This article showcases the downside of using a programming software technology into automobiles. it is incredible how hackers find their way into vehicles and unlock remote keys. Security comes first therefore softwares are being created to stay ahead of hackers.

    ReplyDelete
  7. This technology is a next generation technology. One can never say that computers are used 100% in controlling cars and that no more improvements can be done. It improves every day and every attempt the security is compromised. Hackers are breaking in to those systems just because the technology is in it's budding stage. More protective firewalls and patches will be developed in the coming days. It will merely make it impossoble for the hackers to get in to our systems. This technology will not bring a big impact in developed nations but in developing and under-developed nations where a lot of lives are lost in accidents, this technology will make a huge difference.

    ReplyDelete
  8. The pace at which technology is advancing is amazing but it has some downsides as well.As seen in this article,a need has been recognized where automobile manufacturers need to look into car’s software security so that security issues do not arise.

    ReplyDelete
  9. The article gives information about the misuse of technology and one its examples here describes the automobile hacking.

    ReplyDelete
  10. This article is all about how an car is becoming more PCs on wheels its shows about the drawbacks of programming software technology into the automobile vehicles like cars though this is the good step in developing technology implementation of PCs in cars and controlling them. It has many disadvantages in it though more improvements may be done misuse of this technology may happen hackers are trying to break the system software just because the technology is in early developmental stage. so manufactures should look into security when this car's software is implemented so that no problems may not occur for the customer. This technology is in budding stage more improvements had to be done to reach the customer satisfaction and to overcome security issues.

    ReplyDelete