Could Someone Hack Into Your Car?

Edward Niedermeyer
by Edward Niedermeyer

Most car enthusiasts bemoan the rise of electronic systems in automobiles because they create a layer of interference between ourselves and the direct, mechanical control of our cars. Sure, electronic controls are cheaper, lighter and allow for easier diagnostics, but they rob automobiles of the elemental simplicity which is so often fundamental to their appeal. And, as a study by researchers from the Universities of Washington and San Diego [in PDF format here, via ArsTechnica] shows, the various electronic systems in your car actually makes it vulnerable to hackers who could disable key systems remotely. Titled Experimental Security Analysis of a Modern Automobile, the study explains that the electronic complexity of modern cars actually leaves them extremely vulnerable to all kinds of attack, raising serious concerns about how safe we really are in our cars (especially if we happen to have an enemy or two).


The study focused on accessing on-board computers via the federally mandated OBD-II on-board-diagnostics port, and the study shows that physical access to this port for even a brief period is sufficient to upload “malware” programs, which could compromise on-board systems. Physical access could also be granted by installing something as innocuous as an aftermarket stereo system embedded with malware. And though it’s easy enough for anyone to access these ports or install malware-infected components, there need not even be a physical link to the car to compromise its safety and privacy.

The other vector is via the numerous wireless interfaces implemented in the modern automobile. In our car we identified no fewer than five kinds of digital radio interfaces accepting outside input, some over only a short range and others over indefinite distance. While outside the scope of this paper, we wish to be clear that vulnerabilities in such services are not purely theoretical. We have developed the ability to remotely compromise key ECUs in our car via externally-facing vulnerabilities, amplify the impact of these remote compromises using the results in this paper, and ultimately monitor and control our car remotely over the


Internet.

Through these vectors to the OBD-II port, researchers were able to access the Controller Area Network bus, a protocol standard to all new vehicles sold in the US after 2008. The researchers developed “CAR SHARK,” a “custom CAN bus analyzer and packet injection tool,” and were able to identify several serious security issues with the protocol.

Broadcast Nature. Since CAN packets are both physically and logically broadcast to all nodes, a malicious component on the network can easily snoop on all communications or send packets to any other node on the network. CAR SHARK leverages this property, allowing us to observe and reverse-engineer packets, as well as to inject new packets to induce various actions.

Fragility to DoS. The CAN protocol is extremely vulnerable to denial-of-service attacks. In addition to simple packet flooding attacks, CAN’s priority-based arbitration scheme allows a node to assert a “dominant” state on the bus indefinitely and cause all other CAN nodes to back off. While most controllers have logic to avoid accidentally pairs: breaking the network this way, adversarially-controlled hardware would not need to exercise such precautions.

No Authenticator Fields. CAN packets contain no authenticator fields — or even any source identifier fields — meaning that any component can indistinguishably send a packet to any other component. This means that any single compromised component can be used to control all of the other components on that bus, provided those components themselves do not implement defenses; we consider the security of individual components in Section V.

Weak Access Control. The protocol standards for our car specify a challenge-response sequence to protect ECUs against certain actions without authorization…Under the hood, ECUs are supposed to use a fixed challenge (seed) for each of these challenge-response pairs; the corresponding responses (keys) are also fixed and stored in these ECUs. The motivation for using fixed seeds and keys is to avoid storing the challenge-response algorithm in the ECU firmware itself (since that firmware could be read out if an external flash chip is used). Indeed, the associated reference standard states “under no circumstances shall the encryption algorithm ever reside in the node.” (The tester, however, does have the algorithm and uses it to compute the key.) Different ECUs should have different seeds and keys… Furthermore, as described in the protocol standards, the challenges (seeds) and responses (keys) are both just 16 bits. Because the ECUs are required to allow a key attempt every 10 seconds, an attacker could crack one ECU key in a little over seven and a half days.CAN. Given the weaknesses with the CAN access control sequence, the role of “tester” is effectively open to any node on the bus and thus to any attacker.

Moreover, numerous failsafes were easily evaded. Researchers were able to remove all CAN communications from the ECU while the vehicle was moving, and even reflashed the ECU while the vehicle was moving. Moreover, experimenters were able to remove a vehicle’s entire telematics memory, including their keys without authentication, and even cause a car’s Device Control system to disable key components like brakes. And if it seems like any of these attacks would require a deep and intimate knowledge of the inner workings of our cars’ electronic brains, think again.

Much to our surprise, significant attacks do not require a complete understanding or reverse-engineering of even a single component of the car. In fact, because the range of valid CAN packets is rather small, significant damage can be done by simple fuzzing of packets (i.e., iterative testing of random or partially random packets). In- deed, for attackers seeking indiscriminate disruption, fuzzing is an effective attack by itself. (Unlike traditional uses of fuzzing, we use fuzzing to aid in the reverse engineering of functionality.)

By now, your eyes have either glazed over with boredom, or you’re just starting to get interested. For those in the latter category, we suggest checking out the full 16-page report [in PDF format here], and taking a shot at explaining some of this information in a less technical manner.

Edward Niedermeyer
Edward Niedermeyer

More by Edward Niedermeyer

Comments
Join the conversation
2 of 37 comments
  • Windswords Windswords on May 17, 2010

    I guess this gives Toyota and excuse for their SUA. It was just these guys fooling around with some malware.

  • Redmondjp Redmondjp on May 17, 2010

    The CAN protocol was first designed for industrial machinery controls and it has gradually migrated over to vehicles of all types. It is heavily used in the off-highway and agricultural equipment sectors as well. It was never intended to be hacker-proof! The SAE publishes specifications for the CAN protocols used in vehicles should you care to read more. On a somewhat related note, searching the web a few years' back I came across a lawsuit against the federal gov't involving the FBI's use of Onstar to eavesdrop on potential suspects without their knowledge (IIRC it was a "warrantless wiretap"). The hands-free cell phone built into the car makes the perfect bug. It goes without saying that you need not be an Onstar subscriber for them to do this. If you don't use Onstar, you may consider introducing the antenna wiring to your diagonal cutters, if you are paranoid about such things (Big Brother may already be listening . . . SUPV: "Bill, anything from the car lately?" EMPL: "Well, they're listening to Glen Beck" SUPV: "Bring 'em in STAT for questioning!")

  • Kjhkjlhkjhkljh kljhjkhjklhkjh Elon hates bad press (hence TWITTER circus) So the press jumping up and down screaming ''musk fails cheap EV'' is likely ego-driving this response as per normal ..not to side with tesla or musk but canceling the 25k EV was a good move, selling a EV for barely above cost is a terrible idea in a market where it seems EV saturation is hitting peak
  • 1995 SC Wife has a new Ridgeline and it came with 2 years so I don't have to think about it for a while.My FIAT needed a battery (the 12V...not the drive battery), a replacement steering column cover and I had to buy a Tesla Charging adapter to use the destination charger at one of the places I frequent. Also had to replace the charge cable because I am an idiot and ran the stock one over and destroyed the connector. Around 600 bucks all in there but 250 is because of the cable.The Thunderbird has needed much the past year. ABS Pump - 300. Master Cylinder 100. Tool to bleed ABS 350 (Welcome to pre OBD2 electronics), Amp for Stereo -250, Motor mounts 150, Injectors 300, Airbag Module - 15 at the u pull it, Belts and hoses, 100 - Plugs and wires 100, Trans fluid, filter and replacement pan, 150, ignition lock cylinder and rekey - 125, Cassette Player mechanism - 15 bucks at the U Pull it, and a ton of time to do things like replace the grease in the power seat motots (it was hard and the seats wouldn't move when cold), Rear pinion seal - 15 buckjs, Fix a million broken tabs in the dash surround, recap the ride control module and all. My wife would say more, but my Math has me around 2 grand. Still needs an exhaust manifold gasket and the drivers side window acts up from time to time. I do it all but if I were paying someone that would be rough. It's 30 this year though so I roll with it. You'll have times like these running old junk.
  • 3-On-The-Tree Besides for the sake of emissions I don’t understand why the OEM’s went with small displacement twin turbo engines in heavy trucks. Like you guys stated above there really isn’t a MPG advantage. Plus that engine is under stress pulling that truck around then you hit it with turbos, more rpm’s , air, fuel, heat. My F-150 Ecoboost 3.5 went through one turbo replacement and the other was leaking. l’ll stick with my 2021 V8 Tundra.
  • Syke What I'll never understand about economics reporting: $1.1 billion net income is a mark of failure? Anyone with half a brain recognizes that Tesla is slowly settling in to becoming just another EV manufacturer, now that the legacy manufacturers have gained a sense of reality and quit tripping over their own feet in converting their product lines. Who is stupid enough to believe that Tesla is going to remain 90% of the EV market for the next ten years?Or is it just cheap headlines to highlight another Tesla "problem"?
  • Rna65689660 I had an AMG G-Wagon roar past me at night doing 90 - 100. What a glorious sound. This won’t get the same vibe.
Next