Feeds

British boffin muzzled after cracking car codes

Meanwhile in the USA, DARPA funds similar research

Choosing a cloud hosting partner with confidence

Here is a tale of two security research presentations, both looking at motor vehicle security in a world in which even the humblest shopping trolley now has more brainpower than a moonshot.

Flavio Garcia, a University of Birmingham lecturer familiar with insecurity in car systems – here, for example, is a paper he co-authored with Roel Verdult and Josep Balasch for 2012 – has been blocked from presenting to Usenix 2013, thanks to a House of Lords injunction requested by Volkswagen.

Volkswagen took exception to Garcia's intended presentation to the long-running and respected conference, entitled Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer. As The Telegraph in the UK reports, Justice Birss of the Lords decided that publication of the paper would mean “car crime will be facilitated”.

Megamos is the family of RFID chips used by a number of vehicle makers. VW asked Garcia to publish a redacted version of the paper, which he declined to do.

Garcia's treatment is in stark contrast to the laurels being heaped on America's Charlie Miller and Chris Valasek ahead of the upcoming DefCon conference in Las Vegas. Their demonstration of how to interfere with on-board computers was accepted at the Vegas con.

Miller and Valasek connect a laptop to the diagnostic ports of a Prius and a Ford Escape, and from there, show that the laptop can issue instructions to the vehicles' ECU (electronic control unit), including steering, acceleration, braking and the horn.

As part of the leadup to DefCon, snippets of their work are getting previewed left right and centre, without a lawsuit in sight.

Even though the pair promise to release their source code after DefCon, they have a key advantage over Garcia: America's First Amendment. The fact that their work was funded by DARPA doesn't hurt, especially since Miller told the BBC the work involved destroying a few cars. ®

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
You really need to do some tech support for Aunty Agnes
Free anti-virus software, expires, stops updating and p0wns the world
Regin: The super-spyware the security industry has been silent about
NSA fingered as likely source of complex malware family
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
Privacy bods offer GOV SPY VICTIMS a FREE SPYWARE SNIFFER
Looks for gov malware that evades most antivirus
Patch NOW! Microsoft slings emergency bug fix at Windows admins
Vulnerability promotes lusers to domain overlords ... oops
HACKERS can DELETE SURVEILLANCE DVRS remotely – report
Hikvision devices wide open to hacking, claim securobods
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?