Automakers trying to prevent hackers from commandeering cars

  • By Tom Krisher The Associated Press
  • Thursday, August 6, 2015 12:01am
  • News

By Tom Krisher

The Associated Press

DETROIT — When researchers at two West Coast universities took control of a General Motors car through cellular and Bluetooth connections in 2010, they startled the auto industry by exposing a glaring security gap.

Five years later, two friendly hackers sitting on a living room couch used a laptop computer to commandeer a Jeep from afar over the Internet, demonstrating an even scarier vulnerability.

“Cars don’t seem to be any more secure than when the university guys did it,” said Charlie Miller, a security expert at Twitter who, along with well-known hacker and security consultant Chris Valasek, engineered the attack on the Jeep Cherokee.

Fiat Chrysler, the maker of Jeeps, is now conducting the first recall to patch a cybersecurity problem, covering 1.4 million Jeeps.

And experts and lawmakers are warning the auto industry and regulators to move faster to plug holes created by the dozens of new computers and the growing number of Internet connections in today’s automobiles.

The average new car has 40 to 50 computers that run 20 million lines of software code, more than a Boeing 787, a recent KPMG study found.

Miller and Valasek are known as “white hat,” or ethical, hackers and reported their findings to the company.

But the episode raised the prospect that someone with malicious intent could commandeer a car with a laptop and make it suddenly stop, accelerate or turn, injuring or killing someone.

After the 2010 hack, the auto industry plugged access holes and tried to isolate entertainment and driver information systems from critical functions such as steering and brakes.

But in each subsequent model year, it added microchips and essentially turned cars into rolling computers. The introduction of Internet access has created a host of new vulnerabilities.

Adversary vs. defender

“The adversary only needs to find one way to compromise the system, where a defender needs to protect against all ways,” said Yoshi Kohno, associate professor of computer science at the University of Washington, who was part of the 2010 hack.

Mark Rosekind, who heads the National Highway Traffic Safety Administration, has urged the industry to set cybersecurity standards and avoid government regulation.

But two Democratic senators, Edward Markey of Massachusetts and Richard Blumenthal of Connecticut, have introduced a bill that would force the industry to seal off critical computers and add technology to stop hackers in real time.

Security experts say automakers should have systems that recognize rogue commands and stop them from taking control of a car. Some already do.

They also say car companies must behave more like the personal computer industry, instantaneously updating software via the Internet to stay ahead in a perpetual cat-and-mouse game.

Tesla and BMW already can do this, and nearly all automakers are planning for it.

Even so, experts say it’s nearly impossible to stop all cyberattacks, as the U.S. government and major retailers have discovered.

In the 2010 incident, the hackers worked near the car. In the recent Jeep attack, Miller and Valasek used a laptop in Pittsburgh to control the vehicle in St. Louis.

They used the Cherokee’s cellular connection to access its radio. From there, they penetrated the vehicle’s controls, changing its speed and taking over the brakes and the transmission.

Just last week, another hacker revealed that he placed a small electronic box on a car to steal information from GM’s OnStar system so he could open doors and start the vehicle.

GM: Loopholes shut

GM said the hack was isolated to one car and that it has closed the loopholes.

Miller said Fiat Chrysler did implement some security measures. The hackers at first got to a radio chip that was isolated from critical computers. It took them three months, but they got that chip to talk to another one and give them access to the Jeep’s controls. All told, the hack took about a year.

Miller said that because so few people have the expertise and motivation, a large-scale hacking attack on cars is unlikely.

Still, there is reason to question whether the industry is ready for a cyberattack.

Stefan Savage, a computer science and engineering professor at the University of California, San Diego, participated in the 2010 hack.

He said radios and other devices often have software owned by the outside supplier. As a result, the software can have vulnerabilities an automaker may not know about.

He also said it’s difficult to isolate radios, locks and other features from computers that move and stop the car.

For instance, after a crash, cars are programmed to unlock their doors.

The Alliance of Automobile Manufacturers, which represents a dozen major companies, said the industry is working with security firms and universities to prevent attacks.

Earlier this month, companies formed a group to share information. Some companies such as Audi offer rewards to outside experts who find vulnerabilities in their systems.

Savage predicts all automakers will accelerate plans for instant Internet software updates.

“I’d be shocked if everyone doesn’t deploy this stuff in the next few months,” he said. “They can’t afford not to.”

________

Technology Reporter Brandon Bailey contributed from San Francisco.

More in News

Ty Coone. (Clallam County Sheriff's Office)
Search suspended for kayaker missing in Strait

The U.S. Coast Guard suspended its search Wednesday morning for… Continue reading

Clallam County and Astound are partnering with assistance from Clallam County PUD on a $22 million project that will extend Astound’s existing fiber network near Laird’s Corner to almost 100 miles of new above ground and underground infrastructure that will reach more than 1,500 homes in the Highway 112 corridor.
High-speed internet coming to Highway 112 corridor

Clallam County, PUD and Astound involved in $22M project

State leaders discuss budget

Importance of gas tax explained

Conservation measures requested on water system west of Sekiu

Clallam County Public Utility District No. 1 has issued a… Continue reading

Supreme Court justice addresses law day event

Clallam-Jefferson Pro Bono Lawyers hosted an observance of Law… Continue reading

Charter Review Commission to consider seven issues

The Clallam County Charter Review Commission has launched a… Continue reading

Chimacum Elementary School sixth-grade students jump on a rotating maypole as they use the new playground equipment on Monday during recess. The playground was redesigned with safer equipment and was in use for the first time since inspections were completed last Thursday. (Steve Mullensky/for Peninsula Daily News)
New equipment

Chimacum Elementary School sixth-grade students jump on a rotating maypole as they… Continue reading

Microsoft purchases Peninsula credits

Carbon removal will come from area forests

Port Angeles School District to reduce budget by $1.9M

Additional cuts could come if government slashes Title 1 funding

Jefferson County discussion centers on fireworks

Potential future bans, pathway to public displays discussed

Natalie Maitland.
Port Townsend Main Street hires next executive director

Natalie Maitland will start new role with organization May 21