Automotive Hacking and the Future of Technology

Kinja'd!!! "shpuker" (shpuker)
07/23/2015 at 20:15 • Filed to: Hacking, Cherokee, Jeep, FCA, Chrysler, Hack, clusterfuck, CAN, Network, WiFi, wireless

Kinja'd!!!1 Kinja'd!!! 18
Kinja'd!!!

Recent hacks have sparked a renowned interest into the idea of automotive security and leaves the average consumer with a nearly universal question. “What makes a car safe?!” Well Here goes nothing...

While perhaps the question more accurately on the mind of the average consumer is rather “What car is safe and where’s the closest dealership?!”, I figure that this topic would turn into a pile of research into the control systems of varried manufacturers who, upon probing, would kindly tell me to fuck off. And that doesn’t sound fun.

Disclaimer: Shpuker is an “anonymous” (not that ^ anonymous) source on the internet that happens to be a student of mechanical/control systems engineering and thinks he has a respectable grasp on the concepts at play. He also pulled a play from DeMuro’s playbook and wrote this all in the third person (and half drunk).

Before anything else it’s important that you know how vehicles communicate between various controllers (computers). However I’ll attempt to dive as shallow as possible into the intricacies of vehicle communications for the sake of not boring you to death.

Currently automobiles communicate over an inter-controller communication network known as the Controller Area Network (CAN) which is essentially a system of wires that pass signals from one controller to one or many others (AKA it’s a two way communication). This allows a vehicle to place sensors at one end of a vehicle and send them to one controller (that will typically control all of the resident functions in the area) which then talks back and forth with all other controllers connected to the same network by sending signals with different messages and priorities and if a controller gets two signals with the same message then it will pick the one with the higher priority and pass it on.

What are priorities and messages??

Well lets start with priorities. Each message sent over the CAN network has an identifier/priority associated with it, and once it’s picked up by other controllers on the network it is then unpacked and gives certain parameters in the controller a specified value. Well then what could these messages possibly be then?! Messages contain these identifiers/priorities as well as a limited amount of other data.

This is neat and all but how does this impact automotive hacking?

Well I’m glad you asked! In short CAN communications on their own don’t contribute much at all to the hacking of a vehicle. You didn’t read that wrong, the CAN network on its own as a closed network is incredibly secure due to the fact that the only way into it is via physical connection. Where a network can become vulnerable rather lies in the nature of the components attached to it. Think of the security comparison like this:

A secured CAN network is like setting up a typewriter on your desk and knocking out a few pages while an unsecured network is more like hoping onto reddit at midnight on a Friday and clicking on everything in sight. (Bad analogy I know but close enough for this argument)

Kinja'd!!!

But what makes a network insecure?!

As with most things it requires a collection of circumstances to be true. First and foremost you have to think about what’s actually connected to the CAN network of your particular vehicle, but this isn’t always easy to figure out. The biggest sign that something is likely transmitted over the CAN network is to look at any sort of adaptive controls on the system. For example ABS and traction control would both fall under this criteria.

Up to this point though the entire system is still based on physical connection, which leads us into our next circumstance, vehicles that transmit a wireless signal. Regardless of whether your vehicle is sending out a signal via OnStar, Bluetooth, of WiFi this puts it at a vastly elevated risk for hacking attacks in comparison to a fully wired vehicle. BUT THIS ALONE IS NO MEANS TO PANIC (yes that was necessary).

Well then when should I panic?

The Chrysler hack is a clear indicator that panic is quite the appropriate response to how modern vehicles set up with WiFi capabilities are configured. If this system were hard wired then they could only receive signals from the vehicle, and thus would present no risk for external attacks (essentially you can’t shit on something that you aren’t in the same continent as). Automakers are getting into trouble with their attempts to combine this capability with the ability to send simple signals to the vehicle over wireless signals however, and that is precisely what leaves a vehicle open to attack.

What makes the Cherokee so special?

Not much really. Jeep is by no means the only auto manufacturer offering a WiFi hotspot as a vehicle option and many other automakers even have remote access as a security benefit (think OnStar).

Warning, speculation ahead.

What I imagine Jeep failed to do was create a separation between the central CAN network of the vehicles but also a distinct failure to de-rate the priority of messages sent over wireless signal.

What this would create is a direct link over a simple WiFi connection to any system that is associated with the CAN network, typically including ABS, stability control, traction control, and on an increasing number of vehicles automated parking (all of which were compromised on the Cherokee and used to control the vehicle).

What can be done to separate these systems?

As an ideal solution, having a separate CAN network for non-essential communications only would effectively designate a low priority network capable of communicating the proper signals to each leg of the network without compromising essential parameters. I would imagine over the next few years however that a new standard for vehicle communication will begin to emerge with more priority and safety/encryption capabilities than current systems. Until then its up to manufacturers to put in an investment towards the security of their communications and to develop their products with these risks in mind.


DISCUSSION (18)


Kinja'd!!! Mattbob > shpuker
07/23/2015 at 09:10

Kinja'd!!!0

there are possible security measures on CANbus as well. I know some systems use special security handshakes to get into specific modes where things can get dangerous. Simple checksums can also be helpful in this regard. I am really genuinely surprised that these systems on the cherokee were connected to the same CAN bus as the entertainment systems. Thats jsut being super cheap on Chryslers part. Frequently private buses are used for safety and engine control systems.


Kinja'd!!! You can tell a Finn but you can't tell him much > shpuker
07/23/2015 at 14:36

Kinja'd!!!2

Why are entertainment and external communication systems hooked into the CAN system in the first place? Outside of laziness there is no reason that entertainment/bluetooth/wifi/cellular systems aren’t air-gapped from the vehicle control systems.


Kinja'd!!! shpuker > You can tell a Finn but you can't tell him much
07/23/2015 at 20:02

Kinja'd!!!0

My guess would be to make potential future features easier to implement. AKA say you want to add a feature that requires you to pull the tire pressure data from CAN that wasn’t previously accounted for. Rather than having to go back and hard code the whole system to account for the change you can just pull that signal off CAN as well. As for why they made these communications physically capable of both read and write commands is a bit of a stretch. I’d say they probably did it for the same reasons, however if you want a vehicle that can recieve wireless commands then you better damn well develop your own protocol with unique security measures.


Kinja'd!!! shpuker > Mattbob
07/23/2015 at 20:07

Kinja'd!!!0

I imagine they left the door open intentionally for some sort of future capability. Now that doesn’t make it a good idea or even remotely ok but I imagine that’s their thought process. Then you get into the issue of why the hell they made their WiFi base read and write capable...


Kinja'd!!! AMGtech - now with more recalls! > You can tell a Finn but you can't tell him much
07/24/2015 at 01:42

Kinja'd!!!0

One reason is diagnostics, as entertainment systems become ever more complicated so do their problems. It’s a necessity these days to be able to communicate with almost every module, whether it be to read live data or install new software. There would have to be one “central gateway” where all networks merge.

What if you want to be able to see your vehicle speed displayed digitally in your instrument cluster, as well as your radio station and navigation directions? Wouldn’t those different networks all HAVE to merge in the instrument cluster, or elsewhere, for that to happen?


Kinja'd!!! AMGtech - now with more recalls! > shpuker
07/24/2015 at 01:57

Kinja'd!!!1

Don’t forget about:

-Flex-ray (CAN on steroids)

-MOST (media oriented system transport, fibre optics)

-LIN (local interconnect network, single wire master/slave setup)

All of these, including CAN, can be configured to operate at different speeds and capacities. Flex-ray is very fast and should have the highest priority because it is used almost entirely for safety systems. CAN is fast and comprises the vast majority of automotive communication with typical secondary priority, MOST operates at the speed of light but is only used for media and has low priority, LIN is typically used for very simple things like climate control actuators and alternators.

These are just general rules of thumb obviously, but having all of these definitely aids in security. Any manufacturer still using only CAN with Wi-Fi and Bluetooth is asking for a world of trouble. I mean come on, CAN has been around for about twenty years now!

Also see my reply to You can tell a Finn.


Kinja'd!!! AMGtech - now with more recalls! > Mattbob
07/24/2015 at 02:01

Kinja'd!!!0

All of these things should definitely never be on the same network, however they shouldn’t be completely separated from each other. There needs to be gateways between the dissent networks for various reasons. See my replies to You can tell a Finn and shpuker.


Kinja'd!!! BloodlessWeevil > shpuker
07/24/2015 at 08:31

Kinja'd!!!0

“What I imagine Jeep failed to do was create a separation between the central CAN network of the vehicles but also a distinct failure to de-rate the priority of messages sent over wireless signal.”

No, it is setup exactly like that, just like every other modern car. Jeep does not have a monopoly on this problem.


Kinja'd!!! BloodlessWeevil > You can tell a Finn but you can't tell him much
07/24/2015 at 08:36

Kinja'd!!!0

Key-less entry, push button start, remote start, changing vehicle settings. All these things require the radio module to communicate with the rest of the vehicle. Maybe you would be willing to buy a car without those features, but the vast majority of buyers would not tolerate it.


Kinja'd!!! You can tell a Finn but you can't tell him much > BloodlessWeevil
07/24/2015 at 09:33

Kinja'd!!!0

You have completely missed the point of my comment. I never said those convenience and luxury items should be removed in the name of safety. I simply stated that entertainment systems and vehicle control systems should be air-gapped. That means that if someone were to remotely access the vehicle through a bluetooth/wifi/cellular signal there would be no connection from the entertainment system that they got into and the control systems that keep the vehicle safely on the road.

Quite simply there is no reason that the entertainment systems and any associated cellular/wifi/bluetooth/gps communication systems should be able to communicate and control safety critical systems on a vehicle. With proper safety and security protocols in place there is no reason that someone should be able to hack into my car through a cellular connection and control the engine, brakes or steering system remotely. There is no reason that things like keyless entry, push button starting or any other features would need to be sacrificed to maintain local control of safety critical systems.


Kinja'd!!! You can tell a Finn but you can't tell him much > AMGtech - now with more recalls!
07/24/2015 at 09:49

Kinja'd!!!0

Regarding diagnostics, most entertainment systems now come with USB, so there is a built in, nearly universal connector that can be used to read and write data to the entertainment systems. There is no reason that couldn’t be used to perform diagnostics on entertainment system malfunctions without sending data to the OBD port through CAN. Sure, now you’ve got to use two different connections to get the different systems, but I’d be shocked if any shop level scan tool didn’t already have a USB port included in it.

As for getting data to a secondary dash display, from a security perspective the best way would be to have a small screen that is simply a repeater wired in to the entertainment system and not connected to the CAN.

Beyond that, it just seems that it wouldn’t be that unreasonable to put a firewall between the vehicle control systems and any external data sources. I’m not a computer security expert, so the difficulty of that isn’t something that I can speak to. From a laymans perspective though there is no reason that someone outside the car should be able to control braking, throttle or steering.


Kinja'd!!! BloodlessWeevil > You can tell a Finn but you can't tell him much
07/24/2015 at 10:08

Kinja'd!!!0

No, I got it. It’s just that those functions use wifi protocols (unlike earlier key-less entry systems.) Separating the transceiver for those functions from the one for entertainment functions does not buy you much from a security standpoint.


Kinja'd!!! AMGtech - now with more recalls! > You can tell a Finn but you can't tell him much
07/24/2015 at 10:08

Kinja'd!!!0

Good points for sure. The USB idea is already somewhat in use, at least on some of the latest Mercedes for programming. And I like the secondary display idea.

But utilizing different types of networks (see my response to shpuker) builds in some security. As far as I know (I’m no programmer) Mercedes at least writes their software so that things like navigation etc. have no authority to tell any critical system what to do.

I would be interested to sit in on a conversation where they decide how all of this stuff is going to be laid out and programmed.


Kinja'd!!! shpuker > AMGtech - now with more recalls!
07/24/2015 at 19:20

Kinja'd!!!0

My money’s on fiber taking the lead role within a few years. It’s an improvement on literally every flaw of the current CAN networks (aside from cost). Speed is un-real, security is boundless, message length/detail is incredible, etc.


Kinja'd!!! shpuker > BloodlessWeevil
07/24/2015 at 19:21

Kinja'd!!!0

I’m not saying they’re the only ones that have made, or will make, this mistake. I’m saying they should’ve known better.


Kinja'd!!! shpuker > You can tell a Finn but you can't tell him much
07/24/2015 at 19:25

Kinja'd!!!0

I’m at a loss as to why they didn’t. At the very least I would expect them to use hardware restrictions in order to keep the WiFi base from writing into the CAN. I imagine some engineer along the way left the door open on purpose for some imagined future capability? IDK I’m stretching a bit now.


Kinja'd!!! AMGtech - now with more recalls! > shpuker
07/24/2015 at 22:57

Kinja'd!!!0

Definite possibility. But flex-ray is also a huge improvement over CAN and seems to be the direction they’re headed for the moment. But moments are fleeting.


Kinja'd!!! shpuker > AMGtech - now with more recalls!
07/25/2015 at 00:42

Kinja'd!!!1

All too true. At least from the industrial side of CAN use I can say the majority of people that I’ve talked to or worked with are waiting for a new automotive standard before making any moves and that ideal seems to aim towards fiber. However the market is inherently hard to predict so who knows, maybe we’ll be introduced to some new inter-network communication style that makes everything else obsolete before then.