SlideShare a Scribd company logo
Hacked Vehicles
Alejandro Chang
Alejandro Chang
Introduction
All vehicles include some WEP.
InfoSec is not a priority for
manufacturers.
Inconsistency in the industry.
Large amount of information being
stored.
Data being transmitted to third-
parties.
Customers are not being informed.
Alejandro Chang
1.4 millionVehicles recalled by Fiat Chrysler Automobiles in 2015
(Souppouris, 2015)
50%Manufacturers that transmit and store data outside vehicles
(Markey, 2015)
$59.95Price of CANtact
Alejandro Chang
Most ‘hackable’ vehicles
(Speiser, 2015)
2014
Jeep Cherokee
2014
Toyota Prius
2014
Ford Fusion
2014
Infiniti Q35
2015
Cadillac Escalade
Alejandro Chang
Potential hacking capabilities
(Cathers, 2015)
Movement
Such as sudden acceleration, kill the brakes or activate the
horn and more.
Indicators
Speedometer and gas gauge readings
Data
Intercept driver information such as location and driving
habits.
Power
Disable the vehicle completely
Alejandro Chang
Government
National Highway Traffic Safety Administration (NHTSA) and the Federal Trade
Commission (FTC) must address these privacy issues by establishing new standards
to protect the data, security and privacy of drivers (Markey, 2015)
Alejandro Chang
“When you drive a modern vehicle, you are
driving a big electronic information system
with a motor and four wheels. There is
almost nothing that is not controlled by its
system. That leaves about a 100% of
vehicles vulnerable to attacks.
Stefan Savage, UC San Diego
Alejandro Chang
Conclusion
Alejandro Chang
Alejandro Chang
Thank you
Works Cited
Cathers, Tristan (2014). Are you SCARED of your car? You should be.. Mojo Motors
Blog. Retrieved 1 October 2015, from http://www.mojomotors.com/blog/are-
you-scared-of-your-car-you-should-be/
Greenberg, A. (2015). Hackers Remotely Kill a Jeep on the Highway—With Me in It.
WIRED. Retrieved 1 October 2015, from
http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/
Linklayer.github.io,. (2015). CANtact - The Open-Source Car Tool. Retrieved 1
October 2015, from http://linklayer.github.io/cantact/
Markey, E. (2015). Tracking & Hacking: Security & Privacy Gaps Put American
Drivers at Risk. US Senate.
Souppouris, A. (2015). Fiat Chrysler recalls 1.4 million vehicles after remote hack.
Engadget. Retrieved 1 October 2015, from
http://www.engadget.com/2015/07/24/fiat-chrysler-recall/
Speiser, M. (2015). These are the most hackable cars on the road today. Business Insider.
Retrieved 1 October 2015, from http://www.businessinsider.com/the-most-
hackable-cars-on-the-road-today-2015-8

More Related Content

Viewers also liked

Portfolio PPT version
Portfolio PPT versionPortfolio PPT version
Portfolio PPT version
HalfAmazingAtelier
 
Fall Newsletter
Fall NewsletterFall Newsletter
Fall Newsletter
PCIMediaImpact
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer Accounts
Abbie Olson
 
1.3 Evolución Historica
1.3 Evolución Historica1.3 Evolución Historica
1.3 Evolución Historica
lupita zume
 
Sig
SigSig
Dn13 u3 a2_mzg
Dn13 u3 a2_mzgDn13 u3 a2_mzg
Dn13 u3 a2_mzg
tavochiva17
 
Slideshare
SlideshareSlideshare
Slideshare
yanethpalcarazh
 
1.5 clasificación de los s.o
1.5 clasificación de los s.o1.5 clasificación de los s.o
1.5 clasificación de los s.o
lupita zume
 
Acción interdicto
Acción interdictoAcción interdicto
Acción interdicto
Babalawo Odara
 
HERRAMIENTAS PARA LA GESTIÓN CULTURAL LOCAL
HERRAMIENTAS PARA LA GESTIÓN CULTURAL LOCAL HERRAMIENTAS PARA LA GESTIÓN CULTURAL LOCAL
HERRAMIENTAS PARA LA GESTIÓN CULTURAL LOCAL
Daniela Silva Vidal
 
Cuidado del planeta
Cuidado del planetaCuidado del planeta
Cuidado del planeta
fredygtrz
 
PCI Media Impact Health Note
PCI Media Impact Health NotePCI Media Impact Health Note
PCI Media Impact Health Note
PCIMediaImpact
 
Temario
TemarioTemario
Temario
JADSM11
 
Taller de memoria para adultos
Taller de memoria para adultosTaller de memoria para adultos
Taller de memoria para adultos
Oscar Grijalva Calero
 
ensayo de la importancia de la educacion moral en las empresas
ensayo de la importancia de la educacion moral en las  empresas ensayo de la importancia de la educacion moral en las  empresas
ensayo de la importancia de la educacion moral en las empresas
Universidad Nacional de Trujillo
 

Viewers also liked (16)

Portfolio PPT version
Portfolio PPT versionPortfolio PPT version
Portfolio PPT version
 
Fall Newsletter
Fall NewsletterFall Newsletter
Fall Newsletter
 
Hacked Customer Accounts
Hacked Customer AccountsHacked Customer Accounts
Hacked Customer Accounts
 
1.3 Evolución Historica
1.3 Evolución Historica1.3 Evolución Historica
1.3 Evolución Historica
 
Sig
SigSig
Sig
 
Dn13 u3 a2_mzg
Dn13 u3 a2_mzgDn13 u3 a2_mzg
Dn13 u3 a2_mzg
 
Slideshare
SlideshareSlideshare
Slideshare
 
MartukC
MartukCMartukC
MartukC
 
1.5 clasificación de los s.o
1.5 clasificación de los s.o1.5 clasificación de los s.o
1.5 clasificación de los s.o
 
Acción interdicto
Acción interdictoAcción interdicto
Acción interdicto
 
HERRAMIENTAS PARA LA GESTIÓN CULTURAL LOCAL
HERRAMIENTAS PARA LA GESTIÓN CULTURAL LOCAL HERRAMIENTAS PARA LA GESTIÓN CULTURAL LOCAL
HERRAMIENTAS PARA LA GESTIÓN CULTURAL LOCAL
 
Cuidado del planeta
Cuidado del planetaCuidado del planeta
Cuidado del planeta
 
PCI Media Impact Health Note
PCI Media Impact Health NotePCI Media Impact Health Note
PCI Media Impact Health Note
 
Temario
TemarioTemario
Temario
 
Taller de memoria para adultos
Taller de memoria para adultosTaller de memoria para adultos
Taller de memoria para adultos
 
ensayo de la importancia de la educacion moral en las empresas
ensayo de la importancia de la educacion moral en las  empresas ensayo de la importancia de la educacion moral en las  empresas
ensayo de la importancia de la educacion moral en las empresas
 

Similar to Hacked Vehicles - InfoSec

Braking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesBraking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle Vulnerabilities
Priyanka Aash
 
Braking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesBraking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle Vulnerabilities
Priyanka Aash
 
Automobile collision avoidance system
Automobile collision avoidance systemAutomobile collision avoidance system
Automobile collision avoidance system
Scope e-Knowledge Center
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
EC-Council
 
The Future is autonomous
The Future is autonomousThe Future is autonomous
The Future is autonomous
Erman Akyol
 
3030 1 copy
3030 1 copy3030 1 copy
3030 1 copy
Andrew Angoyar
 
Should Tata Motors go for Autonomous cars?
Should Tata Motors go for Autonomous cars?Should Tata Motors go for Autonomous cars?
Should Tata Motors go for Autonomous cars?
Manzoor Ul Akram
 
Connectivity levels of autonomy by Steve Surhigh
Connectivity levels of autonomy by Steve SurhighConnectivity levels of autonomy by Steve Surhigh
Connectivity levels of autonomy by Steve Surhigh
HARMAN Connected Services
 
Google's Driverless Car Project
Google's Driverless Car ProjectGoogle's Driverless Car Project
Google's Driverless Car Project
Ray Yip
 
Privacy on Wheels
Privacy on WheelsPrivacy on Wheels
Privacy on Wheels
DennisdeVries21
 
autonomous_vehicle_working_paper_01072020-_508_compliant.pdf
autonomous_vehicle_working_paper_01072020-_508_compliant.pdfautonomous_vehicle_working_paper_01072020-_508_compliant.pdf
autonomous_vehicle_working_paper_01072020-_508_compliant.pdf
PandurangGurakhe
 
Infotainment System Trend Tracking
Infotainment System Trend TrackingInfotainment System Trend Tracking
Infotainment System Trend Tracking
zmustafa
 
Autonomous Vehicles
Autonomous VehiclesAutonomous Vehicles
Autonomous Vehicles
Risk Education Strategies
 
2015 unit 3 driverless cars(2)
2015 unit 3 driverless cars(2)2015 unit 3 driverless cars(2)
2015 unit 3 driverless cars(2)
bigcobraa
 
sr5108
sr5108sr5108
sr5108
Kim Stewart
 
Autonomous vehicles
Autonomous vehiclesAutonomous vehicles
Autonomous vehicles
Rabiya Khalid
 
Autonomous cars
Autonomous carsAutonomous cars
Autonomous cars
Anmol Parimoo
 
Trends in Auto Tech
Trends in Auto TechTrends in Auto Tech
Trends in Auto Tech
Rafael Maranon
 
Drive less cars
Drive less carsDrive less cars
Drive less cars
AbhinavKumarDubey1
 
Entering a World Where We Don't Drive
Entering a World Where We Don't DriveEntering a World Where We Don't Drive
Entering a World Where We Don't Drive
10x Nation
 

Similar to Hacked Vehicles - InfoSec (20)

Braking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesBraking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle Vulnerabilities
 
Braking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesBraking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle Vulnerabilities
 
Automobile collision avoidance system
Automobile collision avoidance systemAutomobile collision avoidance system
Automobile collision avoidance system
 
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea AmicoData in cars can be creepy – Hacker Halted 2019 – Andrea Amico
Data in cars can be creepy – Hacker Halted 2019 – Andrea Amico
 
The Future is autonomous
The Future is autonomousThe Future is autonomous
The Future is autonomous
 
3030 1 copy
3030 1 copy3030 1 copy
3030 1 copy
 
Should Tata Motors go for Autonomous cars?
Should Tata Motors go for Autonomous cars?Should Tata Motors go for Autonomous cars?
Should Tata Motors go for Autonomous cars?
 
Connectivity levels of autonomy by Steve Surhigh
Connectivity levels of autonomy by Steve SurhighConnectivity levels of autonomy by Steve Surhigh
Connectivity levels of autonomy by Steve Surhigh
 
Google's Driverless Car Project
Google's Driverless Car ProjectGoogle's Driverless Car Project
Google's Driverless Car Project
 
Privacy on Wheels
Privacy on WheelsPrivacy on Wheels
Privacy on Wheels
 
autonomous_vehicle_working_paper_01072020-_508_compliant.pdf
autonomous_vehicle_working_paper_01072020-_508_compliant.pdfautonomous_vehicle_working_paper_01072020-_508_compliant.pdf
autonomous_vehicle_working_paper_01072020-_508_compliant.pdf
 
Infotainment System Trend Tracking
Infotainment System Trend TrackingInfotainment System Trend Tracking
Infotainment System Trend Tracking
 
Autonomous Vehicles
Autonomous VehiclesAutonomous Vehicles
Autonomous Vehicles
 
2015 unit 3 driverless cars(2)
2015 unit 3 driverless cars(2)2015 unit 3 driverless cars(2)
2015 unit 3 driverless cars(2)
 
sr5108
sr5108sr5108
sr5108
 
Autonomous vehicles
Autonomous vehiclesAutonomous vehicles
Autonomous vehicles
 
Autonomous cars
Autonomous carsAutonomous cars
Autonomous cars
 
Trends in Auto Tech
Trends in Auto TechTrends in Auto Tech
Trends in Auto Tech
 
Drive less cars
Drive less carsDrive less cars
Drive less cars
 
Entering a World Where We Don't Drive
Entering a World Where We Don't DriveEntering a World Where We Don't Drive
Entering a World Where We Don't Drive
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
Claudio Di Ciccio
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
Kumud Singh
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”“I’m still / I’m still / Chaining from the Block”
“I’m still / I’m still / Chaining from the Block”
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Mind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AIMind map of terminologies used in context of Generative AI
Mind map of terminologies used in context of Generative AI
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 

Hacked Vehicles - InfoSec

  • 2. Introduction All vehicles include some WEP. InfoSec is not a priority for manufacturers. Inconsistency in the industry. Large amount of information being stored. Data being transmitted to third- parties. Customers are not being informed. Alejandro Chang
  • 3. 1.4 millionVehicles recalled by Fiat Chrysler Automobiles in 2015 (Souppouris, 2015) 50%Manufacturers that transmit and store data outside vehicles (Markey, 2015) $59.95Price of CANtact Alejandro Chang
  • 4. Most ‘hackable’ vehicles (Speiser, 2015) 2014 Jeep Cherokee 2014 Toyota Prius 2014 Ford Fusion 2014 Infiniti Q35 2015 Cadillac Escalade Alejandro Chang
  • 5. Potential hacking capabilities (Cathers, 2015) Movement Such as sudden acceleration, kill the brakes or activate the horn and more. Indicators Speedometer and gas gauge readings Data Intercept driver information such as location and driving habits. Power Disable the vehicle completely Alejandro Chang
  • 6. Government National Highway Traffic Safety Administration (NHTSA) and the Federal Trade Commission (FTC) must address these privacy issues by establishing new standards to protect the data, security and privacy of drivers (Markey, 2015) Alejandro Chang
  • 7. “When you drive a modern vehicle, you are driving a big electronic information system with a motor and four wheels. There is almost nothing that is not controlled by its system. That leaves about a 100% of vehicles vulnerable to attacks. Stefan Savage, UC San Diego Alejandro Chang
  • 9. Alejandro Chang Thank you Works Cited Cathers, Tristan (2014). Are you SCARED of your car? You should be.. Mojo Motors Blog. Retrieved 1 October 2015, from http://www.mojomotors.com/blog/are- you-scared-of-your-car-you-should-be/ Greenberg, A. (2015). Hackers Remotely Kill a Jeep on the Highway—With Me in It. WIRED. Retrieved 1 October 2015, from http://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ Linklayer.github.io,. (2015). CANtact - The Open-Source Car Tool. Retrieved 1 October 2015, from http://linklayer.github.io/cantact/ Markey, E. (2015). Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk. US Senate. Souppouris, A. (2015). Fiat Chrysler recalls 1.4 million vehicles after remote hack. Engadget. Retrieved 1 October 2015, from http://www.engadget.com/2015/07/24/fiat-chrysler-recall/ Speiser, M. (2015). These are the most hackable cars on the road today. Business Insider. Retrieved 1 October 2015, from http://www.businessinsider.com/the-most- hackable-cars-on-the-road-today-2015-8

Editor's Notes

  1. Teniendo en cuenta que muchos vehículos modernos ya ofrecen redes WiFi dentro del propio coche, con todo tipo de gadgets disponibles para usar en el interior,  y que ya están en marcha proyectos de vehículos que conducen solos, la seguridad de su software cobra aún más importancia.
  2. CANtact está diseñado para enviar comandos unificados de diagnóstico de Servicios, el protocolo CAN que los mecánicos de automóviles utilizan para comunicarse con unidades de control electrónico (ECU) o de todo un vehículo. Esto permite que cualquiera pueda escribir scripts python que pueden generar automáticamente comandos en la red digital de un automóvil, comandos que van desde apagar su luz, hasta para bombear automáticamente los frenos.
  3. Charlie Miller, Ingeniero de Seguridad de Twitter, y Chris Valasek, director de seguridad de IOActive, han intentado hackear los sistemas de navegación de un Ford Escape y un Toyota Prius de 2010, así como otros vehículos, para demostrar que son vulnerables. Para ello han conectado un ordenador MacBook directamente al cableado del vehículo, y han ejecutado un software de hackeo. Tras diferentes pruebas, consigueron entrar en el software de navegación hasta obtener un control total sobre el vehículo. Ambos expertos fueron capaces de realizar las siguientes acciones, pulsando teclas en el ordenador: Tocar el claxon a voluntad, incluso con el motor apagado Evitar que el coche se apague, hasta vaciar la batería Cambiar los indicadores de velocidad y nivel de gasolina a voluntad, para engañar al conductor Obligar al motor a acelerar Apagar y encender las luces cuando están en modo automático Desactivar los frenos
  4. Los fabricantes de automóviles argumentan que no tiene mucho sentido hackear un coche desde dentro, y que sus esfuerzos se centran en impedir que los hackers actúen desde fuera, mediante una comunicación inalámbrica. Sin embargo, investigadores de la Universidad de Washington y de la Universidad de California ya consiguieron acceder de forma inalámbrica a un sedan de marca anónima hace un par de años. En 2012, los científicos Flavio Garcia de la University of Birmingham y Roel Verdult y Bariş Ege de la Radbound University -en Holanda- detectaron un fallo de seguridad colosal relacionado al ‘robo sin llave’ en más de 26 marcas automotrices. Poco más de tres años después, su investigación por fin pudo ser expuesta. Los investigadores sostienen que encontraron numerosas debilidades en el sistema inmovilizador Megamos Crypto, un dispositivo que previene que el motor se inicie cuando el transpondedor correspondiente -incrustado, en este caso, la llave del carro- no esté presente. Pero el trío de científicos descubrió que era posible ‘escuchar’ e interceptar las señales enviadas entre la ‘llave’ y el sistema de seguridad de ciertos carros, haciéndolos vulnerables a ataques inalámbricos a corta distancia. El motor también estaría expuesto a terceros, de acuerdo con dos expertos de Estados Unidos, quienes apoyados por el centro de investigación Darpa, del Pentágono, demostraron cómo se puede tomar el control de dos modelos de carros mientras otra persona los está manejando. Este experimento llamó mucho la atención ya que se le relacionó con posibles prácticas delictivas.   Charlie Miller y Chris Valasek (los responsables) solamente utilizaron cables para conectar sus dispositivos a las unidades de control eléctrico de los vehículos a través del puerto de diagnóstico a bordo. Estos controles electrónicos, también conocidos como ECUs por sus siglas en inglés, están incorporados en la mayoría de los vehículos modernos y controlan funciones como la aceleración, frenado, dirección y bocina.   Claro, este trabajo incluyó una considerable inversión de dinero ya que se necesitaron varios ECUs para lograr los resultados esperados, y de hecho el sistema implica instalar una conexión dentro de los carros, sin embargo, se logró demostrar la vulnerabilidad de ambas máquinas.   Por último, y por demás evidente, el tablero. Gracias a un estudio de las universidades de Wisconsin y San Diego se descubrió que el ataque inalámbrico es posible a través de herramientas mecánicas, reproductores de CD, Bluetooth y señales de celular. Adicionalmente, se encontró que los canales de comunicaciones inalámbricas permiten el control del vehículo a larga distancia, permitiendo darle un seguimiento a su ubicación o filtrar audio en su sistema, incluso tocar la bocina, activar o desactivar los limpiaparabrisas y el aire acondicionado.
  5. Cuando hackean tu página web o tu ordenador, lo máximo que pueden conseguir es robarte dinero, o tus datos. Si hackean tu coche cuando vas conduciendo, pueden acabar con tu vida. Es un tema muy serio, y por eso el Pentágono ha financiado con 80.000 dólares un estudio que intenta descubrir si los ordenadores instalados en los vehículos son seguros. Según revela la revista Forbes, no lo son. Al menos, si alguien consigue conectar un ordenador al cableado de tu vehículo.
  6. Teniendo en cuenta que muchos vehículos modernos ya ofrecen redes WiFi dentro del propio coche, con todo tipo de gadgets disponibles para usar en el interior,  y que ya están en marcha proyectos de vehículos que conducen solos, la seguridad de su software cobra aún más importancia.