Computer experts hack cars, exposing vulnerabilities
DETROIT — As cars become more like PCs on wheels, what's to stop a hacker from taking over yours?
In recent demonstrations, hackers have shown they can slam a car's brakes at freeway speeds, jerk the steering wheel and even shut down the engine — all from their laptops.
The hackers are publicizing their work to reveal vulnerabilities in a growing number of car computers. All cars and trucks contain anywhere from 20 to 70 computers. They control everything from the brakes to acceleration to the windows, and are connected to an internal network. A few hackers have recently managed to find their way into these intricate networks.
In one case, a pair manipulated two cars by plugging a laptop into a port beneath the dashboard where mechanics connect their computers to search for problems. Scarier yet, another group took control of a car's computers through cellular and Bluetooth connections, the compact disc player and even the tire pressure monitoring system.
To be sure, the “hackers” involved were well-intentioned computer security experts, and it took both groups months to break into the computers. And there have been no real-world cases of a hacker remotely taking over a car. But experts say high-tech hijackings will get easier as automakers give them full Internet access and add computer-controlled safety devices that take over driving duties, such as braking or steering, in emergencies. Another possibility: A tech-savvy thief could unlock the doors and drive off with your vehicle.
“The more technology they add to the vehicle, the more opportunities there are for that to be abused for nefarious purposes,” says Rich Mogull, CEO of Phoenix-based Securosis, a security research firm. “Anything with a computer chip in it is vulnerable, history keeps showing us.”
In the past 25 years, automakers have gradually computerized functions such as steering, braking, accelerating and shifting. Electronic gas pedal position sensors, for instance, are more reliable than the old throttle cables. Electronic parts also reduce weight and help cars use less gasoline.
The networks of little computers inside today's cars are fertile ground for hackers.
Charlie Miller, a St. Louis-based security engineer for Twitter, and fellow hacker Chris Valasek, director of intelligence at a Pittsburgh computer security consulting firm, maneuvered their way into the computer systems of a 2010 Toyota Prius and 2010 Ford Escape through a port used by mechanics.
“We could control steering, braking, acceleration to a certain extent, seat belts, lights, horn, speedometer, gas gauge,” Valasek said. The two used a federal grant to expose the vulnerability of car computers. Even with their expertise, it took them nine months to get in.
Valasek and Miller released a report, including instructions on how to break into the cars' networks, at a hacker convention in August. They said they did so to draw attention to the problems and get automakers to fix them. The pair say automakers haven't added security to the ports.
Ford wouldn't comment other than a statement saying it takes security seriously, and that Miller and Valasek needed physical access to the cars to hack them.
Toyota said it has added security and continually tests to stay ahead of hackers. The company said its computers are programmed to recognize and reject rogue commands.
Show commenting policy
TribLive commenting policy
You are solely responsible for your comments and by using TribLive.com you agree to our Terms of Service.
We moderate comments. Our goal is to provide substantive commentary for a general readership. By screening submissions, we provide a space where readers can share intelligent and informed commentary that enhances the quality of our news and information.
While most comments will be posted if they are on-topic and not abusive, moderating decisions are subjective. We will make them as carefully and consistently as we can. Because of the volume of reader comments, we cannot review individual moderation decisions with readers.
We value thoughtful comments representing a range of views that make their point quickly and politely. We make an effort to protect discussions from repeated comments either by the same reader or different readers.
We follow the same standards for taste as the daily newspaper. A few things we won't tolerate: personal attacks, obscenity, vulgarity, profanity (including expletives and letters followed by dashes), commercial promotion, impersonations, incoherence, proselytizing and SHOUTING. Don't include URLs to Web sites.
We do not edit comments. They are either approved or deleted. We reserve the right to edit a comment that is quoted or excerpted in an article. In this case, we may fix spelling and punctuation.
We welcome strong opinions and criticism of our work, but we don't want comments to become bogged down with discussions of our policies and we will moderate accordingly.
We appreciate it when readers and people quoted in articles or blog posts point out errors of fact or emphasis and will investigate all assertions. But these suggestions should be sent via e-mail. To avoid distracting other readers, we won't publish comments that suggest a correction. Instead, corrections will be made in a blog post or in an article.
- Rural communities can’t shake effects of subprime crisis
- Calgon Carbon poised for explosive growth
- Russian steel to lose duty shelter
- CMU spinoff’s CEO gets council honors
- Market sell-off offers opening
- Chevron puts $20M into educating, training Appalachian workers
- Amid struggles, top fiscal executive to leave EDMC
- Allegheny Technologies reports $700,000 loss in 3Q
- High pollution levels found near Ohio gas wells
- Stocks rally; S&P 500 has best day of 2014
- PPG Industries to buy Westmoreland Supply paint store chain