Toronto Star

Can your car be hacked?

- Gerry Malloy

The mainstream press has been filled recently with news of software systems in various cars being hacked. Which naturally raises the question: “Can your car be hacked?”

The answer to that question is, it’s unlikely, but with the strong caveat that it’s not impossible.

The concern first arose back in 2010, when two university researcher­s gained partial control of a General Motors car via cellular and Bluetooth connection­s in its OnStar system, prompting GM to develop cybersecur­ity patches for that system.

This year, two other hackers took over control of a Jeep Cherokee remotely, via a laptop, exploiting a weakness in that vehicle’s Uconnect telematics system.

As a result, Fiat Chrysler issued a recall of 1.4 million vehicles to correct that vulnerabil­ity.

Since then, Tesla, considered by some to be closer to the cutting edge of electronic­s technology than traditiona­l automakers, also proved vulnerable to hackers, who were able to shut down the car when it was being driven at low speed.

Tesla responded by issuing an over-the-air computer update to Model S vehicles in service.

The good news in all those cases is that the people involved were considered “white-hat” hackers.

They shared their exploits with the automakers involved, allowing them to take corrective action.

The bad news is that there were vulnerabil­ities that could be exploited if they searched hard enough and long enough — two years in one case.

So, the same may be the case for other software and other vehicles.

“Today, an average mid-size vehicle has approximat­ely 40 to 50 individual microproce­ssor-driven systems, which require approximat­ely 20-plus million lines of code,” this, according to a recent report by KPMG.

“A larger, high-end luxury vehicle might have as many as 100 million lines of code.”

That’s a lot of potential vulnerabil­ity.

For that reason, most automakers have stepped up their cybersecur­ity activities significan­tly, in some cases adding new department­s and staff dedicated to that effort.

It’s the very systems and functions that buyers now demand and expect that make vehicles more susceptibl­e to hacks.

Things like remote access to door locks and climate controls, and the ability to start the vehicle remotely.

Add in a connection to the Internet and the potential for hacking expands exponentia­lly.

Still, there’s the question of why anyone would hack into your car.

What’s the return on the investment of time and intellect applied to such a problem?

Until now, it seems to be just the challenge of doing it; of outsmartin­g the manufactur­ers, and in some cases, earning money from them for doing so.

Apart from the sheer mischief value, there seems to be little payback for hacking an individual car. Unless, for example, that car is connected to your phone, which is connected to personal informatio­n such as your bank account; the possibilit­ies get scary.

For such reasons, the U.S. National Highway Traffic Safety Administra­tion (NHTSA), has advised the industry to establish cybersecur­ity standards on its own before government regulation is deemed necessary.

Sounds like good advice!

 ?? MICHAEL SHORT/BLOOMBERG ?? Tesla issued an over-the-air computer update to Model S vehicles in service after hackers shut one down while being driven at low speed.
MICHAEL SHORT/BLOOMBERG Tesla issued an over-the-air computer update to Model S vehicles in service after hackers shut one down while being driven at low speed.
 ??  ?? Telematics systems such as GM’s OnStar may serve as a conduit for hacking into vehicle computer systems. With OnStar’s 4G LTE connection, the vehicle acts as a mobile hub.
Telematics systems such as GM’s OnStar may serve as a conduit for hacking into vehicle computer systems. With OnStar’s 4G LTE connection, the vehicle acts as a mobile hub.
 ??  ??

Newspapers in English

Newspapers from Canada