Software experts attack cars, to release code as hackers meet
BOSTON (Reuters) – Car hacking is not a fresh field, but its secrets have long been closely guarded. That is about to switch, thanks to two well-known computer software hackers who got bored finding bugs in software from Microsoft and Apple.
Charlie Miller and Chris Valasek say they will publish detailed blueprints of technologies for attacking critical systems in the Toyota Prius and Ford Escape in a 100-page white paper, following several months of research they conducted with a grant from the U.S. government.
The two «white hats» – hackers who attempt to uncover software vulnerabilities before criminals can exploit them – will also release the software they built for hacking the cars at the Def Con hacking convention in Las Vegas this week.
They said they devised ways to force a Toyota Prius to brake abruptly at eighty miles an hour, wank its steering wheel, or accelerate the engine. They also say they can disable the brakes of a Ford Escape traveling at very slow speeds, so that the car keeps moving no matter how hard the driver presses the pedal.
«Imagine what would happen if you were near a crowd,» said Valasek, director of security intelligence at consulting rock-hard IOActive, known for finding bugs in Microsoft Corp`s Windows software.
But it is not as scary as it may sound at very first redden.
They were sitting inwards the cars using laptops connected directly to the vehicles` computer networks when they did their work. So they will not be providing information on how to hack remotely into a car network, which is what would typically be needed to launch a real-world attack.
The two say they hope the data they publish will encourage other white-hat hackers to uncover more security flaws in autos so they can be immobile.
«I trust the eyes of one hundred security researchers more than the eyes that are in Ford and Toyota,» said Miller, a Twitter security engineer known for his research on hacking Apple Inc`s App Store.
Toyota Motor Corp spokesman John Hanson said the company was reviewing the work. He said the carmaker had invested intensely in electronic security, but that bugs remained – as they do in cars of other manufacturers.
«It`s entirely possible to do,» Hanson said, referring to the freshly exposed hacks. «Absolutely we take it gravely.»
Ford Motor Co spokesman Craig Daitch said the company takes earnestly the electronic security of its vehicles. He said the fact that Miller`s and Valasek`s hacking methods required them to be inwards the vehicle they were attempting to manipulate mitigated the risk.
«This particular attack was not performed remotely over the air, but as a very aggressive direct physical manipulation of one vehicle over an elongated period of time, which would not be a risk to customers and any mass level,» Daitch said.
‘TIME TO SHORE UP DEFENSES`
Miller and Valasek said they did not research remote attacks because that had already been done.
A group of academics described ways to infect cars using Bluetooth systems and wireless networks in 2011. But unlike Miller and Valasek, the academics have kept the details of their work a closely guarded secret, refusing even to identify the make of the car they hacked. (reut.rs/NWOPjq)
Their work got the attention of the U.S. government. The National Highway Traffic Safety Administration has begun an auto cybersecurity research program.
«While enhanced use of electronic controls and connectivity is enhancing transportation safety and efficiency, it brings a fresh challenge of safeguarding against potential vulnerabilities,» the agency said in a statement. It said it knew of no consumer incident where a vehicle was hacked.
Still, some experts believe malicious hackers may already have the capability to launch attacks.
«It`s time to shore up the defenses,» said Tiffany Strauchs Rad, a researcher with Kaspersky Lab, who previously worked for an auto security research center.
A group of European computer scientists had been scheduled to present research on hacking the locks of luxury vehicles, including Porsches, Audis, Bentleys and Lamborghinis, at a conference in Washington in mid-August.
But Volkswagen AG obtained a restraining order from a British high court prohibiting discussion of the research by Flavio D. Garcia of the University of Birmingham, and Roel Verdult and Baris Ege of Radboud University Nijmegen in the Netherlands.
A spokeswoman for the three scientists said they would pull out of the prestigious Usenix conference because of the restraining order. Both universities said they would hold off on publishing the paper, pending the resolution of litigation. (See FACTBOX by clicking)
Volkswagen declined to comment.
Reporting by Jim Finkle in Boston; Extra reporting by Joseph Lichterman in Detroit and Christine Murray in London; Editing by Tiffany Wu and Peter Cooney