www.wired.com
Open in
urlscan Pro
151.101.2.194
Public Scan
URL:
https://www.wired.com/2017/04/ubers-former-top-hacker-securing-autonomous-cars-really-hard-problem/
Submission: On April 29 via api from US — Scanned from DE
Submission: On April 29 via api from US — Scanned from DE
Form analysis
0 forms found in the DOMText Content
Skip to main content Open Navigation Menu Menu Story Saved To revisit this article, visit My Profile, then View saved stories. Close Alert Securing Driverless Cars From Hackers Is Hard. Ask the Ex-Uber Guy Who Protects Them * Security * Politics * Gear * Backchannel * Business * Science * Culture * Ideas * Merch Story Saved To revisit this article, visit My Profile, then View saved stories. Close Alert Sign In SUBSCRIBE GET WIRED FOR JUST $29.99 $5 SUBSCRIBE Search Search * Security * Politics * Gear * Backchannel * Business * Science * Culture * Ideas * Merch * Podcasts * Video * Newsletters * Magazine * Events * WIRED Insider * WIRED Consulting * Jobs * Coupons Chevron ON SALE NOWGet WIRED - now only $29.99 $5This is your last free article. See the future here first with 1 year of unlimited access.SUBSCRIBE NOW Already a subscriber? Sign in Get WIRED - now only $29.99 $5. SUBSCRIBE NOW Andy Greenberg Security Apr 12, 2017 7:00 AM SECURING DRIVERLESS CARS FROM HACKERS IS HARD. ASK THE EX-UBER GUY WHO PROTECTS THEM In his Uber exit interview, top car hacker Charlie Miller warns of the dangers of insecure autonomous vehicles. An Uber driverless car during a test drive in San Francisco.Eric Risberg/AP Save this storySave Save this storySave Two years ago, Charlie Miller and Chris Valasek pulled off a demonstration that shook the auto industry, remotely hacking a Jeep Cherokee via its internet connection to paralyze it on a highway. Since then, the two security researchers have been quietly working for Uber, helping the startup secure its experimental self-driving cars against exactly the sort of attack they proved was possible on a traditional one. Now, Miller has moved on, and he's ready to broadcast a message to the automotive industry: Securing autonomous cars from hackers is a very difficult problem. It’s time to get serious about solving it. Last month, Miller left Uber for a position at Chinese competitor Didi, a startup that’s just now beginning its own autonomous ridesharing project. In his first post-Uber interview, Miller talked to WIRED about what he learned in those 19 months at the company---namely that driverless taxis pose a security challenge that goes well beyond even those faced by the rest of the connected car industry. Miller couldn't talk about any of the specifics of his research at Uber; he says he moved to Didi in part because the company has allowed him to speak more openly about car hacking. But he warns that before self-driving taxis can become a reality, the vehicles' architects will need to consider everything from the vast array of automation in driverless cars that can be remotely hijacked, to the possibility that passengers themselves could use their physical access to sabotage an unmanned vehicle. Charlie Miller Whitney Curtis for WIRED “Autonomous vehicles are at the apex of all the terrible things that can go wrong,” says Miller, who spent years on the NSA’s Tailored Access Operations team of elite hackers before stints at Twitter and Uber. “Cars are already insecure, and you’re adding a bunch of sensors and computers that are controlling them...If a bad guy gets control of that, it’s going to be even worse.” At A Computer's Mercy In a series of experiments starting in 2013, Miller and Valasek showed that a hacker with either wired or over-the-internet access to a vehicle---including a Toyota Prius, Ford Escape, and a Jeep Cherokee---could disable or slam on a victim's brakes, turn the steering wheel, or, in some cases, cause unintended acceleration. But to trigger almost all those attacks, Miller and Valasek had to exploit vehicles' existing automated features. They used the Prius' collision avoidance system to apply its brakes, and the Jeep's cruise control feature to accelerate it. To turn the Jeep's steering wheel, they tricked it into thinking it was parking itself---even if it was moving at 80 miles per hour. More Car Hacks Hackers Remotely Kill a Jeep on the Highway—With Me in ItArrow The Jeep Hackers Are Back to Prove Car Hacking Can Get Much WorseArrow Android Phone Hacks Could Unlock Millions of CarsArrow Their car-hacking hijinks, in other words, were limited to the few functions a vehicle's computer controls. In a driverless car, the computer controls everything. "In an autonomous vehicle, the computer can apply the brakes and turn the steering wheel any amount, at any speed," Miller says. "The computers are even more in charge." An alert driver could also override many of the attacks Miller and Valasek demonstrated on traditional cars: Tap the brakes and that cruise control acceleration immediately ceases. Even the steering wheel attacks could be easily overcome if the driver wrests control of the wheel. When the passenger isn't in the driver's seat---or there is no steering wheel or brake pedal---no such manual override exists. "No matter what we did in the past, the human had a chance to control the car. But if you’re sitting in the backseat, that’s a whole different story," says Miller. "You’re totally at the mercy of the vehicle." Hackers Take Rides, Too A driverless car that's used as a taxi, Miller points out, poses even more potential problems. In that situation, every passenger has to be considered a potential threat. Security researchers have shown that merely plugging an internet-connected gadget into a car's OBD2 port---a ubiquitous outlet under its dashboard---can offer a remote attacker an entry point into the vehicle's most sensitive systems. (Researchers at the University of California at San Diego showed in 2015 that they could take control of a Corvette's brakes via a common OBD2 dongle distributed by insurance companies---including one that partnered with Uber.) "There's going to be someone you don’t necessarily trust sitting in your car for an extended period of time," says Miller. "The OBD2 port is something that's pretty easy for a passenger to plug something into and then hop out, and then they have access to your vehicle's sensitive network." Permanently plugging that port is illegal under federal regulations, Miller says. He suggests ridesharing companies that use driverless cars could cover it with tamper-evident tape. But even then, they might only be able to narrow down which passenger could have sabotaged a vehicle to a certain day or week. A more comprehensive fix would mean securing the vehicle's software so that not even a malicious hacker with full physical access to its network would be able to hack it---a challenge Miller says only a few highly locked-down products like an iPhone or Chromebook can pass. Trending Now Hackers Remotely Kill a Jeep on the Highway—With Me in It "It's definitely a hard problem," he says. Deep Fixes Miller argues that solving autonomous vehicles' security flaws will require some fundamental changes to their security architecture. Their internet-connected computers, for instance, will need "codesigning," a measure that ensures they only run trusted code signed with a certain cryptographic key. Today only Tesla has talked publicly about implementing that feature. Cars' internal networks will need better internal segmentation and authentication, so that critical components don't blindly follow commands from the OBD2 port. They need intrusion detection systems that can alert the driver---or rider---when something anomalous happens on the cars' internal networks. (Miller and Valasek designed one such prototype.) And to prevent hackers from getting an initial, remote foothold, cars need to limit their "attack surface," any services that might accept malicious data sent over the internet. > Autonomous vehicles are at the apex of all the terrible things that can go > wrong. Car Hacker Charlie Miller Complicating those fixes? Companies like Uber and Didi don't even make the cars they use, but instead have to bolt on any added security after the fact. "They're getting a car that already has some attack surface, some vulnerabilities, and a lot of software they don’t have any control over, and then trying to make that into something secure," says Miller. "That’s really hard." That means solving autonomous vehicles' security nightmares will require far more open conversation and cooperation among companies. That's part of why Miller left Uber, he says: He wants the freedom to speak more openly within the industry. "I want to talk about how we’re securing cars and the scary things we see, instead of designing these things in private and hoping that we all know what we’re doing," he says. Car hacking, fortunately, remains largely a concern for the future: No car has yet been digitally hijacked in a documented, malicious case. But that means now's the time to work on the problem, Miller says, before cars become more automated and make the problem far more real. "We have some time to build up these security measures and get them right before something happens," says Miller. "And that’s why I’m doing this." Andy Greenberg is a senior writer for WIRED covering hacking, cybersecurity, and surveillance. He’s the author of the new book Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency. His last book was *Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most... Read more Senior Writer * X TopicsCar HackingSelf-Driving CarsUberThreat Level ONE YEAR FOR $29.99 $5 SUBSCRIBE WIRED is where tomorrow is realized. It is the essential source of information and ideas that make sense of a world in constant transformation. The WIRED conversation illuminates how technology is changing every aspect of our lives—from culture to business, science to design. The breakthroughs and innovations that we uncover lead to new ways of thinking, new connections, and new industries. More From WIRED * Subscribe * Newsletters * FAQ * WIRED Staff * Editorial Standards * Archive * RSS * Accessibility Help Reviews and Guides * Reviews * Buying Guides * Coupons * Mattresses * Electric Bikes * Fitness Trackers * Streaming Guides * Advertise * Contact Us * Customer Care * Jobs * Press Center * Condé Nast Store * User Agreement * Privacy Policy & Cookie Statement * Your California Privacy Rights © 2024 Condé Nast. All rights reserved. WIRED may earn a portion of sales from products that are purchased through our site as part of our Affiliate Partnerships with retailers. The material on this site may not be reproduced, distributed, transmitted, cached or otherwise used, except with the prior written permission of Condé Nast. Ad Choices SELECT INTERNATIONAL SITE United StatesLargeChevron * Italia * Japón * Czech Republic & Slovakia * Facebook * X * Pinterest * YouTube * Instagram * Tiktok Manage Preferences WE CARE ABOUT YOUR PRIVACY We and our 166 partners store and/or access information on a device, such as unique IDs in cookies to process personal data. You may accept or manage your choices by clicking below or at any time in the privacy policy page. These choices will be signaled to our partners and will not affect browsing data.More Information WE AND OUR PARTNERS PROCESS DATA TO PROVIDE: Use precise geolocation data. Actively scan device characteristics for identification. Store and/or access information on a device. Personalised advertising and content, advertising and content measurement, audience research and services development. List of Partners (vendors) I Accept Show Purposes