www.wired.com Open in urlscan Pro
151.101.2.194  Public Scan

URL: https://www.wired.com/2017/04/ubers-former-top-hacker-securing-autonomous-cars-really-hard-problem/
Submission: On April 29 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

Skip to main content

Open Navigation Menu
Menu
Story Saved

To revisit this article, visit My Profile, then View saved stories.

Close Alert


Securing Driverless Cars From Hackers Is Hard. Ask the Ex-Uber Guy Who Protects
Them
 * Security
 * Politics
 * Gear
 * Backchannel
 * Business
 * Science
 * Culture
 * Ideas
 * Merch

Story Saved

To revisit this article, visit My Profile, then View saved stories.

Close Alert

Sign In

SUBSCRIBE


GET WIRED


FOR JUST $29.99 $5

SUBSCRIBE


Search
Search
 * Security
 * Politics
 * Gear
 * Backchannel
 * Business
 * Science
 * Culture
 * Ideas
 * Merch

 * Podcasts
 * Video
 * Newsletters
 * Magazine
 * Events
 * WIRED Insider
 * WIRED Consulting
 * Jobs
 * Coupons

Chevron
ON SALE NOWGet WIRED - now only $29.99 $5This is your last free article. See the
future here first with 1 year of unlimited access.SUBSCRIBE NOW
Already a subscriber? Sign in

Get WIRED - now only $29.99 $5. SUBSCRIBE NOW




Andy Greenberg

Security
Apr 12, 2017 7:00 AM


SECURING DRIVERLESS CARS FROM HACKERS IS HARD. ASK THE EX-UBER GUY WHO PROTECTS
THEM

In his Uber exit interview, top car hacker Charlie Miller warns of the dangers
of insecure autonomous vehicles.
An Uber driverless car during a test drive in San Francisco.Eric Risberg/AP

Save this storySave
Save this storySave

Two years ago, Charlie Miller and Chris Valasek pulled off a demonstration that
shook the auto industry, remotely hacking a Jeep Cherokee via its internet
connection to paralyze it on a highway. Since then, the two security researchers
have been quietly working for Uber, helping the startup secure its experimental
self-driving cars against exactly the sort of attack they proved was possible on
a traditional one. Now, Miller has moved on, and he's ready to broadcast a
message to the automotive industry: Securing autonomous cars from hackers is a
very difficult problem. It’s time to get serious about solving it.

Last month, Miller left Uber for a position at Chinese competitor Didi, a
startup that’s just now beginning its own autonomous ridesharing project. In his
first post-Uber interview, Miller talked to WIRED about what he learned in those
19 months at the company---namely that driverless taxis pose a security
challenge that goes well beyond even those faced by the rest of the connected
car industry.

Miller couldn't talk about any of the specifics of his research at Uber; he says
he moved to Didi in part because the company has allowed him to speak more
openly about car hacking. But he warns that before self-driving taxis can become
a reality, the vehicles' architects will need to consider everything from the
vast array of automation in driverless cars that can be remotely hijacked, to
the possibility that passengers themselves could use their physical access to
sabotage an unmanned vehicle.

Charlie Miller

Whitney Curtis for WIRED

“Autonomous vehicles are at the apex of all the terrible things that can go
wrong,” says Miller, who spent years on the NSA’s Tailored Access Operations
team of elite hackers before stints at Twitter and Uber. “Cars are already
insecure, and you’re adding a bunch of sensors and computers that are
controlling them...If a bad guy gets control of that, it’s going to be even
worse.”

At A Computer's Mercy

In a series of experiments starting in 2013, Miller and Valasek showed that a
hacker with either wired or over-the-internet access to a vehicle---including a
Toyota Prius, Ford Escape, and a Jeep Cherokee---could disable or slam on a
victim's brakes, turn the steering wheel, or, in some cases, cause unintended
acceleration. But to trigger almost all those attacks, Miller and Valasek had to
exploit vehicles' existing automated features. They used the Prius' collision
avoidance system to apply its brakes, and the Jeep's cruise control feature to
accelerate it. To turn the Jeep's steering wheel, they tricked it into thinking
it was parking itself---even if it was moving at 80 miles per hour.

More Car Hacks
Hackers Remotely Kill a Jeep on the Highway—With Me in ItArrow
The Jeep Hackers Are Back to Prove Car Hacking Can Get Much WorseArrow
Android Phone Hacks Could Unlock Millions of CarsArrow

Their car-hacking hijinks, in other words, were limited to the few functions a
vehicle's computer controls. In a driverless car, the computer controls
everything. "In an autonomous vehicle, the computer can apply the brakes and
turn the steering wheel any amount, at any speed," Miller says. "The computers
are even more in charge."



An alert driver could also override many of the attacks Miller and Valasek
demonstrated on traditional cars: Tap the brakes and that cruise control
acceleration immediately ceases. Even the steering wheel attacks could be easily
overcome if the driver wrests control of the wheel. When the passenger isn't in
the driver's seat---or there is no steering wheel or brake pedal---no such
manual override exists. "No matter what we did in the past, the human had a
chance to control the car. But if you’re sitting in the backseat, that’s a whole
different story," says Miller. "You’re totally at the mercy of the vehicle."

Hackers Take Rides, Too

A driverless car that's used as a taxi, Miller points out, poses even more
potential problems. In that situation, every passenger has to be considered a
potential threat. Security researchers have shown that merely plugging an
internet-connected gadget into a car's OBD2 port---a ubiquitous outlet under its
dashboard---can offer a remote attacker an entry point into the vehicle's most
sensitive systems. (Researchers at the University of California at San Diego
showed in 2015 that they could take control of a Corvette's brakes via a common
OBD2 dongle distributed by insurance companies---including one that partnered
with Uber.)



"There's going to be someone you don’t necessarily trust sitting in your car for
an extended period of time," says Miller. "The OBD2 port is something that's
pretty easy for a passenger to plug something into and then hop out, and then
they have access to your vehicle's sensitive network."



Permanently plugging that port is illegal under federal regulations, Miller
says. He suggests ridesharing companies that use driverless cars could cover it
with tamper-evident tape. But even then, they might only be able to narrow down
which passenger could have sabotaged a vehicle to a certain day or week. A more
comprehensive fix would mean securing the vehicle's software so that not even a
malicious hacker with full physical access to its network would be able to hack
it---a challenge Miller says only a few highly locked-down products like an
iPhone or Chromebook can pass.

Trending Now



Hackers Remotely Kill a Jeep on the Highway—With Me in It







"It's definitely a hard problem," he says.

Deep Fixes

Miller argues that solving autonomous vehicles' security flaws will require some
fundamental changes to their security architecture. Their internet-connected
computers, for instance, will need "codesigning," a measure that ensures they
only run trusted code signed with a certain cryptographic key. Today only Tesla
has talked publicly about implementing that feature. Cars' internal networks
will need better internal segmentation and authentication, so that critical
components don't blindly follow commands from the OBD2 port. They need intrusion
detection systems that can alert the driver---or rider---when something
anomalous happens on the cars' internal networks. (Miller and Valasek designed
one such prototype.) And to prevent hackers from getting an initial, remote
foothold, cars need to limit their "attack surface," any services that might
accept malicious data sent over the internet.

> Autonomous vehicles are at the apex of all the terrible things that can go
> wrong.

Car Hacker Charlie Miller

Complicating those fixes? Companies like Uber and Didi don't even make the cars
they use, but instead have to bolt on any added security after the fact.
"They're getting a car that already has some attack surface, some
vulnerabilities, and a lot of software they don’t have any control over, and
then trying to make that into something secure," says Miller. "That’s really
hard."

That means solving autonomous vehicles' security nightmares will require far
more open conversation and cooperation among companies. That's part of why
Miller left Uber, he says: He wants the freedom to speak more openly within the
industry. "I want to talk about how we’re securing cars and the scary things we
see, instead of designing these things in private and hoping that we all know
what we’re doing," he says.



Car hacking, fortunately, remains largely a concern for the future: No car has
yet been digitally hijacked in a documented, malicious case. But that means
now's the time to work on the problem, Miller says, before cars become more
automated and make the problem far more real. "We have some time to build up
these security measures and get them right before something happens," says
Miller. "And that’s why I’m doing this."




Andy Greenberg is a senior writer for WIRED covering hacking, cybersecurity, and
surveillance. He’s the author of the new book Tracers in the Dark: The Global
Hunt for the Crime Lords of Cryptocurrency. His last book was *Sandworm: A New
Era of Cyberwar and the Hunt for the Kremlin's Most... Read more
Senior Writer
 * X

TopicsCar HackingSelf-Driving CarsUberThreat Level




ONE YEAR FOR $29.99 $5

SUBSCRIBE
WIRED is where tomorrow is realized. It is the essential source of information
and ideas that make sense of a world in constant transformation. The WIRED
conversation illuminates how technology is changing every aspect of our
lives—from culture to business, science to design. The breakthroughs and
innovations that we uncover lead to new ways of thinking, new connections, and
new industries.

More From WIRED

 * Subscribe
 * Newsletters
 * FAQ
 * WIRED Staff
 * Editorial Standards
 * Archive
 * RSS
 * Accessibility Help

Reviews and Guides

 * Reviews
 * Buying Guides
 * Coupons
 * Mattresses
 * Electric Bikes
 * Fitness Trackers
 * Streaming Guides

 * Advertise
 * Contact Us
 * Customer Care
 * Jobs
 * Press Center
 * Condé Nast Store
 * User Agreement
 * Privacy Policy & Cookie Statement
 * Your California Privacy Rights

© 2024 Condé Nast. All rights reserved. WIRED may earn a portion of sales from
products that are purchased through our site as part of our Affiliate
Partnerships with retailers. The material on this site may not be reproduced,
distributed, transmitted, cached or otherwise used, except with the prior
written permission of Condé Nast. Ad Choices

SELECT INTERNATIONAL SITE

United StatesLargeChevron
 * Italia
 * Japón
 * Czech Republic & Slovakia

 * Facebook
 * X
 * Pinterest
 * YouTube
 * Instagram
 * Tiktok


Manage Preferences





WE CARE ABOUT YOUR PRIVACY

We and our 166 partners store and/or access information on a device, such as
unique IDs in cookies to process personal data. You may accept or manage your
choices by clicking below or at any time in the privacy policy page. These
choices will be signaled to our partners and will not affect browsing data.More
Information


WE AND OUR PARTNERS PROCESS DATA TO PROVIDE:

Use precise geolocation data. Actively scan device characteristics for
identification. Store and/or access information on a device. Personalised
advertising and content, advertising and content measurement, audience research
and services development. List of Partners (vendors)

I Accept
Show Purposes