Highway Robbery: Car Computer Controls Could Be Vulnerable to Hackers

Researchers claim to wirelessly break into automobile networks to take control of brakes and steering as the automobile industry shores up defenses


On supporting science journalism

If you're enjoying this article, consider supporting our award-winning journalism by subscribing. By purchasing a subscription you are helping to ensure the future of impactful stories about the discoveries and ideas shaping our world today.


As if worrying about the vulnerability of your PC and smart phone to hackers were not enough, could your car be the next target? Maybe not today, but engineers are transforming automobiles from a collection of mechanical devices crowded around a combustion engine to a sophisticated network of as many as 70 computers—called electronic control units (ECUs). These computers are linked to one another and to the Internet, making the car a mini mobile data center susceptible to many of the same digital dangers—viruses, denial-of-service attacks, etcetera—that have long plagued PCs and other networked devices.

ECUs manage supercritical, real-time systems such as steering, air bag deployment and braking as well as less critical components including the ignition, lights and infotainment console. Software (sometimes up to 100 million lines of code) tells these ECUs what to do and when to do it. ECUs tend to share networks when they communicate with one another. This makes it easier to control more networked gadgets (GPS, MP3 players and more) from the same place, such as the center of the steering wheel. The problem comes when infotainment and other nonessential components share the same network with the brakes, steering and other safety-critical devices.

So says a group of researchers who claim that earlier this year they proved a hacker could, among other things, conceivably use a cell phone to unlock a car's doors and start its engine remotely, so he or she could then get behind the wheel and drive away. Stefan Savage, a computer science professor at the University of California, San Diego, and Tadayoshi Kohno, an assistant computer science and engineering professor at the University of Washington in Seattle, inserted malicious software onto a car's computer system using its Bluetooth and cell phone connections. (They decline to specify which brand of car.) They presented their work in March at the National Academies Committee on Electronic Vehicle Controls and Unintended Acceleration.

Savage, Kohno and their colleagues have for the past few years studied cyber attacks against automobile networks. Earlier experiments used a laptop plugged into the federally mandated On-Board Diagnostic system (OBD–II) port under a test car's dashboard to take control of its ECUs to (among other things) disable the brakes, selectively brake individual wheels on demand, and stop the engine—all independent of the driver's actions (pdf).

This research "shows the need for security measures in vehicular onboard networks," says Olaf Henniger, a researcher at Germany's Fraunhofer Institute for Secure Information Technology. "Wireless communication can be eavesdropped, jammed or relayed, and automobile security measures are necessary."

Henniger and his colleagues are working to create just that. He is a member of Europe's E-Safety Vehicle Intrusion Protected Applications (EVITA) project, launched in July 2008 with the help of BMW Group, Fujitsu and others to develop a security blueprint that carmakers can follow to build more secure onboard networks. The project, scheduled to wrap up at the end of the year, is focused on protecting vehicle-to-vehicle and vehicle-to-infrastructure communication designed to prevent traffic accidents. Researchers have already created prototypes of specialized hardware security modules that would encrypt or authenticate data exchanged within the car, with other cars and with the equipment on the roadways themselves. A follow-up project launched in February called Preparing Secure Vehicle-to-X Communication Systems (PRESERVE) will use EVITA's specifications to create standardized security hardware that would be less expensive to implement.

Whether car companies are willing to invest in the additional security remains to be seen, says Anup Ghosh, a research professor and chief scientist at George Mason University's Center for Secure Information Systems. Automotive engineers have limited budgets just like everyone else, and it is easier and less expensive to have multiple devices plug into shared networks, he adds.

Many manufacturers say their vehicles are already safe. Ford, whose SYNC system was co-developed by Microsoft and introduced in 2007, has a built-in firewall to protect against network attacks and separates its vehicle control network from its infotainment network, says Rich Strader, director of Ford's Information Technology Security and Strategy practice. SYNC also uses encryption and wireless security protocols, and the car company encodes its software updates so that SYNC knows these updates are coming from a trusted source rather than a hacker, according to Strader.

Mobile apps that can be downloaded to smart phones for remotely starting a vehicle's ignition, unlocking doors and other functions are also seen by some as a potential cyber security threat. Once that phone is paired with the car via Bluetooth, it becomes a part of the car's network, Ghosh says. If a hacker were to get control of that phone (perhaps through a virus downloaded from the Web), that person might then be able to gain access to the vehicle to which the phone is paired, he adds.

As a security measure, GM's OnStar MyLink is a mobile application that never communicates directly with the car, says Vijay Iyer, director of public affairs and corporate communications for OnStar. Instead, the app connects to OnStar's network, which requests user authentication via a PIN. If approved, the network then communicates with the car to perform functions such as unlocking doors or starting the ignition.

Savage, Kohno and their colleagues have been careful to point out that their success was the work of several years of experimentation and does not mean that cars are suddenly vulnerable to network attacks. Still, it seems the unending chess match between hackers and security programmers has found a new playing field.

It’s Time to Stand Up for Science

If you enjoyed this article, I’d like to ask for your support. Scientific American has served as an advocate for science and industry for 180 years, and right now may be the most critical moment in that two-century history.

I’ve been a Scientific American subscriber since I was 12 years old, and it helped shape the way I look at the world. SciAm always educates and delights me, and inspires a sense of awe for our vast, beautiful universe. I hope it does that for you, too.

If you subscribe to Scientific American, you help ensure that our coverage is centered on meaningful research and discovery; that we have the resources to report on the decisions that threaten labs across the U.S.; and that we support both budding and working scientists at a time when the value of science itself too often goes unrecognized.

In return, you get essential news, captivating podcasts, brilliant infographics, can't-miss newsletters, must-watch videos, challenging games, and the science world's best writing and reporting. You can even gift someone a subscription.

There has never been a more important time for us to stand up and show why science matters. I hope you’ll support us in that mission.

Thank you,

David M. Ewalt, Editor in Chief, Scientific American

Subscribe