{"id":160,"date":"2014-12-30T10:19:57","date_gmt":"2014-12-30T10:19:57","guid":{"rendered":"http:\/\/dawilson.co.uk\/blog\/?p=160"},"modified":"2017-03-08T18:41:17","modified_gmt":"2017-03-08T18:41:17","slug":"how-to-disable-your-cars-firewall","status":"publish","type":"post","link":"https:\/\/dawilson.co.uk\/blog\/how-to-disable-your-cars-firewall\/","title":{"rendered":"How to disable your car&#8217;s firewall"},"content":{"rendered":"<h1>The power and perils of OBD-II<\/h1>\n<p>In 2010, <a href=\"http:\/\/www.autosec.org\/\" target=\"_blank\">the Centre for Automotive Embedded Systems Security<\/a> demonstrated the devastating consequences that could arise should malicious attackers gain access to\u00a0the on-board diagnostics port (OBD-II)\u00a0that has been fitted to most vehicles since the mid 1990s.<\/p>\n<p>This collaborative group of\u00a0academic researchers from the University of California San Diego and the University of Washington developed a tool\u00a0dubbed &#8220;CarShark&#8221; which, when plugged into the OBD-II port of a\u00a02009 car, gave them almost total control of the vehicle.<\/p>\n<p>While\u00a0some of the effects of their activities could be deemed as only mildly annoying, for example turning the audio equipment volume to maximum, sounding the horn, or even spoofing the dashboard\u00a0speed display, others are nothing short of life threatening.<\/p>\n<p>The team demonstrated that by transmitting correct commands (and even random bit streams in some cases), it was possibly to shut down the engine, prevent the brakes from functioning, and cause the brakes to lock unevenly, all during a typical driving scenario with speeds up to 40mph.<\/p>\n<figure style=\"width: 911px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/ql00lg.dm2302.livefilestore.com\/y2p8-Mj6m03yIXZdmBVcdjuGwNNFdUXOKB5HplsqUWT5imSY356W9htEzRqYjCpQE9xuIsn3le5Q4p0MBZTCdwRQRe9g-EMmZlwX9iDqFkDJzCU2P38EWwZONDVKU1jL5tZgNj1UZV_HI25SwZ3n2IstA\/cs1.jpg\" alt=\"CarShark demonstration in 2010\" width=\"911\" height=\"689\" \/><figcaption class=\"wp-caption-text\">CarShark demonstration in 2010<\/figcaption><\/figure>\n<p>&nbsp;<\/p>\n<figure style=\"width: 663px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/p700lg.dm2302.livefilestore.com\/y2pfZaQeQ-e4x_dybD5sYTrt-STK-bkVNKYuZPg4wVjcHVPBuCNyA37g3cf0E_IkrEUFTUFMACSGUttK-reZ3hJF5-f7MlRkMc1S2FzqW3eZT4iHmzSTTexwG5dD1nmYkhKREOPAr3i3nfVV9-H4fykPw\/cs2.jpg?psid=1\" alt=\"Dashboard speed and RPM spoofing demonstrated in 2010\" width=\"663\" height=\"657\" \/><figcaption class=\"wp-caption-text\">Dashboard speed and RPM spoofing demonstrated in 2010<\/figcaption><\/figure>\n<h1>Interest from independent researchers and hobbyist hackers<\/h1>\n<p>At the Black Hat Asia conference in May 2014, two Spanish security researchers <a href=\"http:\/\/youtu.be\/Y1YmJ0ZYMic\" target=\"_blank\">demonstrated how their CAN Hacking Tool<\/a>, based\u00a0on a \u00a320 Arduino, puts a similar degree of power into the hands of the average hobbyist or hacker. However, <a href=\"http:\/\/www.forbes.com\/sites\/andygreenberg\/2014\/02\/05\/this-iphone-sized-device-can-hack-a-car-researchers-plan-to-demonstrate\/\" target=\"_blank\">when the story was covered by Forbes<\/a>, Toyota&#8217;s safety manager dismissed the viability of this type of\u00a0attack due to the need for physical access to the vehicle.<\/p>\n<figure style=\"width: 1116px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/qr00lg.dm2302.livefilestore.com\/y2pGlcZu-lrsnaYFRi0U5JUry_TySR8tdL5dn0vMDYV3wW1wbqLhhm00wGXhEtmRNO2-aoNvf3Z0Tyuf6jMec3S5kMcB5jWJVVcUOXWPpwU3phgjPESiuDj30IWOWtfKiEVxQjac7jjD3KtBWuVx9eqFQ\/cs3.png?psid=1\" alt=\"A \u00a320 tool for attacking a vehicle's communication network.\" width=\"1116\" height=\"627\" \/><figcaption class=\"wp-caption-text\">A \u00a320 tool for attacking a vehicle&#8217;s communication network.<\/figcaption><\/figure>\n<p>When I forwarded details of the CarShark tool to one of the researchers, it was\u00a0apparent that they had not been influenced by this or any other similar previous work. Their \u00a320 hacking tool was purely a product of their own ingenuity and desire to discover the limits of what\u00a0is possible with the vehicles they own.<\/p>\n<blockquote><p>Toyota&#8217;s safety manager however dismissed the viability of this type of\u00a0attack due to the need for physical access to the vehicle.<\/p><\/blockquote>\n<h1>Removing the firewall<\/h1>\n<p>According to the following tweet that appeared in my feed this morning, some drivers may soon be\u00a0about to\u00a0remove the single layer of\u00a0network security provided by the vehicle&#8217;s locked doors, when they connect their OBD-II\u00a0interface directly to the\u00a0internet.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"525\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">The <a href=\"https:\/\/twitter.com\/miaLinkup?ref_src=twsrc%5Etfw\">@mialinkup<\/a> is bringing the Internet of Things to that old car of yours: <a href=\"http:\/\/t.co\/YyHwcxjEqE\">http:\/\/t.co\/YyHwcxjEqE<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/IoT?src=hash&amp;ref_src=twsrc%5Etfw\">#IoT<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/Kickstarter?src=hash&amp;ref_src=twsrc%5Etfw\">#Kickstarter<\/a> <a href=\"http:\/\/t.co\/hmm0mtwZ44\">pic.twitter.com\/hmm0mtwZ44<\/a><\/p>\n<p>&mdash; Microchip Makes (@MicrochipMakes) <a href=\"https:\/\/twitter.com\/MicrochipMakes\/status\/549696857887490048?ref_src=twsrc%5Etfw\">December 29, 2014<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p><a href=\"https:\/\/www.kickstarter.com\/projects\/mialinkup\/mialinkup-a-new-direction-in-connected-car?ref=category_popular\" target=\"_blank\">This Kickstarter campaign<\/a>, which promises to allow drivers to monitor and control their car via a mobile phone application or web interface, has already exceeded the original $50,000 goal.<\/p>\n<p>Worryingly, while the Kickstarter page discusses regulation and certification regarding the wireless aspects of the product, there is no mention of the product&#8217;s safety and security aspects.<\/p>\n<p>Functional safety should be a primary concern when designing a device with such potential control over a moving vehicle.<\/p>\n<h1>Wider concerns with the Internet of Things<\/h1>\n<p>Earlier this year we saw the story of how <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-25780908\" target=\"_blank\">a fridge connected to the internet had been requisitioned by hackers<\/a> to take part in a spam campaign along with 100,000 other devices.<\/p>\n<p>To me, this demonstrates several important points:<\/p>\n<ul>\n<li>Manufacturers typically do not design against\u00a0attacks that their products will face in the real world;<\/li>\n<li>Hackers\u00a0are\u00a0indiscriminate\u00a0in the\u00a0types of\u00a0device that they attack;<\/li>\n<li>Average users\u00a0are not\u00a0aware of the way in which their devices could be compromised;<\/li>\n<li>Society in general has become so accustomed to connecting devices to the internet that this is now done blindly, without any thought.<\/li>\n<\/ul>\n<p>While a fridge sending spam is indeed a nuisance,\u00a0giving\u00a0malicious individuals the power to\u00a0cause road traffic accidents is an entirely different matter.<\/p>\n<p>For this reason, I hope\u00a0that all involved in this Kickstarter project will seriously consider the potential consequences that their product may have before it is released to the public.<\/p>\n<p>DW.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The power and perils of OBD-II In 2010, the Centre for Automotive Embedded Systems Security demonstrated the devastating consequences that could arise should malicious attackers gain access to\u00a0the on-board diagnostics port (OBD-II)\u00a0that has been fitted to most vehicles since the mid 1990s. This collaborative group of\u00a0academic researchers from the University of California San Diego and &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/dawilson.co.uk\/blog\/how-to-disable-your-cars-firewall\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;How to disable your car&#8217;s firewall&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[11,42],"tags":[17,9],"class_list":["post-160","post","type-post","status-publish","format-standard","hentry","category-assorted-musings","category-favourites","tag-automotive","tag-safety-critical-systems"],"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/dawilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/160","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dawilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dawilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dawilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/dawilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=160"}],"version-history":[{"count":25,"href":"https:\/\/dawilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/160\/revisions"}],"predecessor-version":[{"id":185,"href":"https:\/\/dawilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/160\/revisions\/185"}],"wp:attachment":[{"href":"https:\/\/dawilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=160"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dawilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=160"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dawilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=160"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}