CAR HACKING: THINK NOT, WHY HACK A DESKTOP WHEN YOU HACK A CAR?. Murthy, A. S 7(2):6, 2020.
abstract   bibtex   
As time passes by the scale of technology grows larger and smarter, this applies to vehicles too. In the present-day cars are increasingly being implemented with computers or ECU’s which are driven by millions of lines of code and control most of the critical systems even to an extent where the cars could drive by themselves. Completely packed under a interconnected internal networks most of the modern ECU’s now come with a “socketCAN / CAN bus” which have given an added advantage for exploiters. In the past a car could only be hacked if it had an vulnerable ECU but with introduction of “socketCAN / CAN bus” as a few vulnerabilities closed new ones we’re discovered, even though there exist IDS or intrusion detection systems it is practically very difficult for them to detect such attacks. Here in this paper as a proof of concept we’re going to present multiple ways to exploit different vulnerabilities using the “socketCAN / CAN bus” in a car which would also show how the vulnerabilities are exploited and executed and what can be taken over and answer a few intriguing questions such as can the throttle, breaks and steering would be controlled?, is it viable to control the car while it’s moving? , is it possible to lock up a person inside the car? And many more. And we would also present how a computer/ECU that was designed for safety be used for destruction with a few lines of code and tiny modifications to the system. And finally we try to find the best possible counter measures to overcome such attacks.
@article{murthy_car_2020,
	title = {{CAR} {HACKING}: {THINK} {NOT}, {WHY} {HACK} {A} {DESKTOP} {WHEN} {YOU} {HACK} {A} {CAR}?},
	volume = {7},
	abstract = {As time passes by the scale of technology grows larger and smarter, this applies to vehicles too. In the present-day cars are increasingly being implemented with computers or ECU’s which are driven by millions of lines of code and control most of the critical systems even to an extent where the cars could drive by themselves. Completely packed under a interconnected internal networks most of the modern ECU’s now come with a “socketCAN / CAN bus” which have given an added advantage for exploiters. In the past a car could only be hacked if it had an vulnerable ECU but with introduction of “socketCAN / CAN bus” as a few vulnerabilities closed new ones we’re discovered, even though there exist IDS or intrusion detection systems it is practically very difficult for them to detect such attacks. Here in this paper as a proof of concept we’re going to present multiple ways to exploit different vulnerabilities using the “socketCAN / CAN bus” in a car which would also show how the vulnerabilities are exploited and executed and what can be taken over and answer a few intriguing questions such as can the throttle, breaks and steering would be controlled?, is it viable to control the car while it’s moving? , is it possible to lock up a person inside the car? And many more. And we would also present how a computer/ECU that was designed for safety be used for destruction with a few lines of code and tiny modifications to the system. And finally we try to find the best possible counter measures to overcome such attacks.},
	language = {en},
	number = {2},
	author = {Murthy, Anjana S},
	year = {2020},
	pages = {6}
}

Downloads: 0