Researchers Find Vulnerabilities in Cars Connected to Smartphones
September 2, 2016 | NYU TandonEstimated reading time: 1 minute
Many of today's automobiles leave the factory with secret passengers: prototype software features that are disabled but that can be unlocked by clever drivers.
In what is believed to be the first comprehensive security analysis of its kind, Damon McCoy, an assistant professor of computer science and engineering at the NYU Tandon School of Engineering, and a group of students at George Mason University found vulnerabilities in MirrorLink, a system of rules that allow vehicles to communicate with smartphones.
MirrorLink, created by the Connected Car Consortium, which represents 80% of the world's automakers, is the first and leading industry standard for connecting smartphones to in-vehicle infotainment (IVI) systems. However, some automakers disable it because they chose a different smartphone-to-IVI standard, or because the version of MirrorLink in their vehicles is a prototype that can be activated later.
McCoy and his colleagues found that MirrorLink is relatively easy to enable, and when unlocked can allow hackers to use a linked smartphone as a stepping stone to control safety-critical components such as the vehicle's anti-lock braking system. McCoy explained that "tuners" - people or companies who customize automobiles - might unwittingly enable hackers by unlocking insecure features.
"Tuners will root around for these kinds of prototypes, and if these systems are easy to unlock they will do it," he said. "And there are publically available instructions describing how to unlock MirrorLink. Just one of several instructional videos on YouTube has gotten over 60,000 views." The researchers used such publically available instructions to unlock MirrorLink on the in-vehicle infotainment system in a 2015 vehicle they purchased from eBay for their experiments.
The automaker and supplier declined to release a security patch - reflecting the fact that they never enabled MirrorLink. McCoy pointed out that this could leave drivers who enable MirrorLink out on a limb.
The authors hope their research, presented at the 10th USENIX Workshop on Offensive Technologies (WOOT '16) in Austin, Texas, will raise the issue of drivers unlocking potentially insecure features before IVI protocols such as MirrorLink are even more widely deployed.
Suggested Items
Real Time with… IPC APEX EXPO 2024: Sigma Engineering's Recycling and Regeneration Systems for PCB Etching
05/02/2024 | Real Time with...IPC APEX EXPOEvan Howard of Schmoll America interviews Kristoffer Bjorklund, Sigma Engineering's supply chain manager. We learn about Sigma's recycling and regeneration systems for PCB industry etching and the benefits and challenges of implementing these systems in existing factories.
Boeing T-7A Red Hawk Triples Progress
05/01/2024 | BoeingThe Boeing T-7A Red Hawk achieved three recent milestones, propelling the advanced pilot trainer for the U.S. Air Force forward.
Merlin Flex invests in New Schmoll Direct Imaging System
04/30/2024 | Merlin Flex LtdMerlin Flex has fully installed and commissioned its 2nd Schmoll MDI Direct Imaging system. This new machine includes a twin bed, 4 head system which enhances Merlin Flex’s direct imaging capability for its 1.4M long flexible circuits.
Latest Test and Inspection Solutions from GOEPEL electronic at SMTconnect 2024
04/29/2024 | GOEPEL electronicGOEPEL electronic will be demonstrating automated test and inspection equipment at SMTconnect, taking place in Nuremberg from June 11 to 13, 2024.
TSMC Celebrates 30th North America Technology Symposium
04/29/2024 | TSMCTSMC unveiled its newest semiconductor process, advanced packaging, and 3D IC technologies for powering the next generation of AI innovations with silicon leadership at the Company’s 2024 North America Technology Symposium.