Defcon researchers reveal tricks behind their car hack
By Lucian Constantin
LAS VEGAS—Two security researchers at Defcon 21 here on Friday revealed the methods they used to hack into car computers and take over the steering, acceleration, brakes, and other important functions.
Charlie Miller, a security engineer at Twitter, and Chris Valasek, director of security intelligence at IOActive, spent ten months researching how they could hack into the network of embedded computer systems called electronic control units (ECUs) used in modern cars and see what they could do once they gained access to it.
Their test cars were a 2010 Ford Escape and a 2010 Toyota Prius.
Some of the things they were able to achieve by hooking a laptop to the ECU communications network and injecting rogue signals into it included disabling the breaks while the car was in motion, jerking the steering wheel, accelerating, killing the engine, yanking the seat belt, displaying bogus speedometer and fuel gauge readings, turning on and off the car’s lights, and blasting the horn.
The researchers also found a way to achieve persistent attacks by modifying the ECU firmware to send rogue signals even when they were no longer physically connected to the control units.
Tipped off car manufacturers
A research paper explaining how the hacking was done was shared with Ford and Toyota a few weeks before the Defcon presentation, the researchers said.
Toyota responded that it didn’t consider this to be car hacking and that the company’s security efforts are focused on preventing remote attacks from outside the car, not those that involve physically accessing the control system, Miller and Valasek said.
The goal of the research was to see what could be done when hackers gain access to the ECU network, known as the controller area network bus, the researchers said. It doesn’t matter if it’s done locally or remotely; access to a single ECU provides access to the whole network and gives the ability to inject commands, they said.
Miller is certain that other researchers will find ways to remotely attack the systems in the future. The software industry hasn’t figured out how to write secure software yet, so there’s no reason to believe car makers have figured it out either, he said.
The code in systems that can be accessed remotely—telematics units, tire sensors, those using Bluetooth and Wi-Fi—might have a lot of vulnerabilities, he said. “I’m sure that if people start looking, they would will start finding vulnerabilities.”
That’s part of the reason Miller and Valasek decided to make the details of their research public, including what kind of equipment, cables, and software they used.
The full research paper and the custom software tools that were written to interact with the ECUs, as well as the code used to inject particular commands, will be released this weekend, Miller said.
“We want other researchers to keep working on this; on other cars or on the same cars,” Miller said. “It took us ten months to do this project, but if we had the tools that we have now, we would have done it in two months. We want to make it easy for everyone else to get involved in this kind of research.”
More malicious hacks ahead?
Concerns that the tools could enable people to hack car systems for malicious purposes are valid, the researcher said. However, if it’s that easy to do, then they could do it anyway; it would just take them a bit more time, he said.
“If the only thing that keeps our cars safe is that no one bothers to do this kind of research, then they’re not really secure,” Miller said. “I think it’s better to lay it all out, find the problems and start talking about them.”
However, fixing the issues won’t be easy because most of them are there by design, according to Miller.
Car manufacturers won’t be able to just issue a patch, the researcher said. “They’ll have to change the way these systems are made.”
Right now, there’s no authentication when car computers communicate with each other, because they need to react and send signals quickly in potentially dangerous situations, the researcher said. Adding authentication will introduce latency, so the systems will need faster processors to make up for that. Those processors would cost more, so car prices would rise, he said.
Toyota Motor Sales and Ford Motor Co. in the U.S. did not immediately respond to requests for comments.
Note: When you purchase something after clicking links in our articles, we may earn a small commission. Read ouraffiliate link policyfor more details.