Security

Say what you will about self-driving cars – the security is looking 'OK'

Miller, Valasek discuss today and tomorrow's robo-ride defenses


Black Hat Car hacking wizards Charlie Miller and Chris Valasek have turned their attention to autonomous vehicles – and reckon the security is surprisingly good.

The duo, who work for General Motors’ robo-automaker offshoot Cruise, told this year's Black Hat USA conference on Thursday while self-driving vehicles are much less hackable than you may think, there are still serious issues that need to be shored up. Given this is an emerging and fledgling market, it's in every manufacturer's interest to get security right, to avoid one PR nightmare crashing them all.

“This is everyone’s problem,” Valasek told the crowd. “We want a competitive advantage but we also want everything in the sector to be secure. An incident with our competitors will hurt us too.”

First, the good news. Because these vehicles are still being developed, and virtually no one is using them yet, there are lots of opportunities to get things right. That means building encryption and cryptographic code signing into a car’s system, minimizing the attack surface hackers can abuse, and tightly locking down communications with the outside world.

Junk in the trunk

More than any other kind of vehicle on the road, autonomous cars are going to be “data centers on wheels,” Valasek said. The two showed off the trunk, or boot, of Audi’s forthcoming computer-controlled motor, and it’s packed with multiple GPUs and processors, cooling systems, and sensor arrays.

Good L'Audi ... Not much room for a suitcase

The vast increase in the amount of data being processed means that the usual internal controller area networks (CANs) can't cope, so instead manufacturers are installing Ethernet to spread the load. Devices on these fatter networks still have to eventually communicate with the sensor and control CANs, and the gateways between the CANs and the general-purpose network could be points of weakness.

The Ethernet itself is also an issue, since it’s so basic: at Layer two in the OSI stack, encryption is not built in. That has to be improved if these cars are going to be secure, preventing one subsection from screwing around with another, they said.

The other serious weak point is external communications. Autonomous vehicles are going to be updating their code, neural network models, and other datasets daily, chatting to their backend servers frequently for new information to improve their driving. Ideally, the robo-cars should not accept incoming connections, and verify everything their pick up from HQ.

Get lost

One area of hacking that is a complete non-starter is hijacking one of these cars via GPS tricks, such as spoofing signals to get the machines lost. Why? Because autonomous cars barely use the satellite-based positioning system. The resolution of GPS isn't high enough, so instead they rely on maps and LIDAR sensors, which are accurate within an inch or so.

Sad Nav: How a cheap GPS spoofer gizmo can tell drivers to get lost

READ MORE

“Self driving cars do have GPS but don’t rely on it as it’s not accurate enough,” Miller explained. “For now, they take detailed maps of where they are going to drive so they know where every tree and curb and stop signs are. It then takes readings from its LIDAR sensors so it can find out where it is.”

You don’t own it

The other big advantage of autonomous vehicles is that, initially at least, only the rich will own one.

Miller and Valasek envisage autonomous autos being introduced mainly as taxi services, such as Waymo is rolling out in Arizona; the cars won’t be sitting in driveways and public lots, but will return to base when not in use. This sharply limits the ability for hackers to get physical access to the computer, and install malware or add electronics.

In terms of design, manufacturers also have the opportunity to remove physical ports to the vehicle’s data systems – since why would you let someone patch into a taxi? – and to cut down on features. For example, in a taxi, there’s no need to include a Bluetooth link to the car’s entertainment system: the passenger will only be on board for a short time.

The robo-rides will also be in constant contact with the biz operating them. This means at the first sign that things are awry, the car can be remotely ordered to pull to the side of the road, shut down, and await pickup.

The two researchers made one final point. Most existing autonomous vehicles are made by strapping sensor pods to a non-autonomous vehicle. One thing the manufacturers will need to check is that the base vehicle doesn't have a simpler vulnerability that could be leveraged to take over the bolted-on self-driving technology. ®

Send us news
29 Comments

DEF CON is canceled! No, really this time – but the show will go on

Longtime host Caesars ends relationship at short notice

It's that time of the year again: The trinity of infosec conferences

A quick guide to Hacker Summer Camp

Inside the Black Hat network operations center, volunteers work in geek heaven

NOC, NOC ... Who's there?

DARPA tells AI world: Make a model that secures software, there's $25M in it for you

If you're so smart, prove it by safeguarding our infrastructure

Tesla hackers turn to voltage glitching to unlock paywalled features

Oh, this old thing? Yeah, it's got an AMD processor. Why?

Bomb scare causes mass evacuation at DEF CON

Summer Camp is over and what has been done? Have aspirations shriveled in the Sun?

Microsoft 365 guest accounts + Power Apps = security nightmare

A login, a PA trial license, and some good old hacking are all that's needed to nab SQL databases

Ukraine's Victor Zhora: Russia's cyber 'war crimes' will continue after ground invasion ends

International laws needed 'to bring accountability' govt chief tells The Reg

Want to pwn a satellite? Turns out it's surprisingly easy

PhD student admits he probably shouldn't have given this talk

Infosec imposter syndrome is real. Here's something that can help

Talk about an insider threat

CISA boss says US alliance with Ukraine over past year is closer than Five Eyes

And maybe shore up that critical infrastructure some more, America

Microsoft OneDrive a willing and eager 'ransomware double agent'

No one will suspect such a trustworthy executable