[SystemSafety] Hackers take over *control* of a car wirelessly
Mike Ellims
michael.ellims at tesco.net
Tue Jul 21 23:48:47 CEST 2015
It's been possible for a few years now, a couple of papers may be of
interest here;
http://static.usenix.org/events/sec11/tech/full_papers/Checkoway.pdf
http://feihu.eng.ua.edu/NSF_CPS/year1/w9_1.pdf
I did some work with Ross Anderson a few years back for a Tier 1, one of the
outputs was an ESCAR paper which I archived at,
http://www.skicambridge.com/papers/security_and_safety.pdf
The issue has also been discussed extensively in the IEEE Software and some
ACM publications.
The SAE has a new J standard coming out on vehicle security and I believe
the IET is looking at the issue as well.
-----Original Message-----
From: systemsafety-bounces at lists.techfak.uni-bielefeld.de
[mailto:systemsafety-bounces at lists.techfak.uni-bielefeld.de] On Behalf Of
Peter Bernard Ladkin
Sent: 21 July 2015 16:54
To: The System Safety List
Subject: [SystemSafety] Hackers take over *control* of a car wirelessly
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
.... and drive it into a ditch. Done during a demo, performed the day after
the fix was available from Fiat Chrysler. But it's real. As in, really real.
Thank heavens the good guys found it first.
http://www.theguardian.com/technology/2015/jul/21/jeep-owners-urged-update-c
ar-software-hackers-remote-control
I must admit I thought such an act was still a couple years in the future.
PBL
Prof. Peter Bernard Ladkin, Faculty of Technology, University of Bielefeld,
33594 Bielefeld, Germany Je suis Charlie
Tel+msg +49 (0)521 880 7319 www.rvs.uni-bielefeld.de
-----BEGIN PGP SIGNATURE-----
iQEcBAEBCAAGBQJVrmsbAAoJEIZIHiXiz9k+p1MIALMXcfMBljG+Y4bI/0z93ecs
yUhPihfyYbFKimooUD6xQQiq9A/sn1tEEsFlSBItyRSzL0UustVYhTk6CnM/cBEe
np8n5GY73P0qqo31th1USJUi6m4NZvvP5iJ2ojP43MrBv9zFz3KVfckaIjMt3tNU
OozHXeKjqTPhOl37youvU080lKG2Yw4RaidGah9o5d2fW4Us2uJtFgYdWG9VvBxF
eheEPj1iHCUu9t2Om/R9O+/Mmvocl+lu69YhRybhXqpKVJ6sXwtVS5423LOvCPzm
lzqX2RDeSj/TdjHSecy39Co4ue0O89dCxP6ay+doHWm5PDd4KEKveRVO/xQ4JZY=
=aBA5
-----END PGP SIGNATURE-----
_______________________________________________
The System Safety Mailing List
systemsafety at TechFak.Uni-Bielefeld.DE
---
This email has been checked for viruses by Avast antivirus software.
https://www.avast.com/antivirus
More information about the systemsafety
mailing list