Driving away car computer hackers

FILE - In this Feb. 9, 2010 file photo, master diagnostic technician Kurt Juergens, of Foxborough, Mass., uses a laptop computer to diagnose and repair the brake system on a 2010 Toyota Prius in the repair shop of a Toyota dealership, in Norwood, Mass. A pair of hackers maneuvered their way into the computer systems of a 2010 Toyota Prius and 2010 Ford Escape through a port used by mechanics. The hackers showed that they could slam on the brakes at freeway speeds, jerk the steering wheel or even shut down the engine, all from their laptop computers. The work demonstrates vulnerabilities with the growing number of car computers, about 20 on older models and up to 70 on sophisticated luxury cars. (AP Photo/Steven Senne, File)

FILE - In this Feb. 9, 2010 file photo, master diagnostic technician Kurt Juergens, of Foxborough, Mass., uses a laptop computer to diagnose and repair the brake system on a 2010 Toyota Prius in the repair shop of a Toyota dealership, in Norwood, Mass. A pair of hackers maneuvered their way into the computer systems of a 2010 Toyota Prius and 2010 Ford Escape through a port used by mechanics. The hackers showed that they could slam on the brakes at freeway speeds, jerk the steering wheel or even shut down the engine, all from their laptop computers. The work demonstrates vulnerabilities with the growing number of car computers, about 20 on older models and up to 70 on sophisticated luxury cars. (AP Photo/Steven Senne, File)

Published Nov 26, 2014

Share

Los Angeles - Against the team of hackers, the poor car stood no chance.

Meticulously overwhelming its computer networks, the hackers showed that - given time - they would be able to pop the trunk and start the windshield wipers, cut the brakes or lock them up, and even kill the engine.

Their motives were not malicious. These hackers worked on behalf of the US military, which along with the motor industry is scrambling to fortify the cyber defenses of commercially available cars before criminals and even terrorists penetrate them.

“You're stepping into a rolling computer now,” said Chris Valasek, who helped catapult car hacking into the public eye when he and a partner revealed last year they had been able to control a 2010 Toyota Prius and 2010 Ford Escape by plugging into a port used by mechanics.

These days, when Valasek isn't working his day job for a computer security firm, he's seeing how Bluetooth might offer an entry point.

ELECTRONIC NEEDS

Carmakers are betting heavily that consumers will want not just the maps and music playlists of today but also Internet-enabled vehicles that stream movies and the turn dictation into email. The federal government wants to require cars to send each other electronic messages warning of dangers on the road.

In these and other connections, hackers see opportunity.

There are no publicly known instances of a car being commandeered outside staged tests. In those tests, hackers prevail.

One was the Defense Department-funded assault on a 2012 model American-made car, overseen by computer scientist Kathleen Fisher.

Hackers demonstrated they could create the electronic equivalent of a skeleton key to unlock the car's networks. That may take months, Fisher said, but from there it would be “pretty easy to package up the smarts and make it available online, perhaps in a black-market type situation.”

HACK-PROOF CARS

The project's goal is more than just to plug vulnerabilities - it is to reconceive the most critical lines of computer code that control the car in a way that could make them invulnerable to some of the major known threats. The model code would be distributed to carmakers, who could adapt it to their needs. That should take a few more years.

The industry is participating - and not waiting.

One major association representing brands including Honda and Toyota is helping establish an “information sharing and analysis center” patterned after efforts by big banks to try to thwart cyberattacks.

“Before, when you designed something, you looked at how might components fail,” said Michael Cammisa, director of safety for the Association of Global Automakers. “Now, you have to look at how would somebody maliciously attack the vehicle.”

Sapa-AP

Related Topics: