Thursday, March 24, 2011

The day innocents won't be killed by maniacs in high speed police pursuits is not far off ...



The answer was not Toyota's electronics systems.

The mystery that the National Highway Transportation Safety Administration was investigating was "unintended acceleration" in the Toyota Prius and some other Toyota models. The NHTSA's conclusion is that the problem was "improperly installed floor mats, sticky pedals, and driver error."

Yet the unintended consequence of this inquiry will be the solution to a serious danger in all urban areas: high speed police chases.

I'll get to that in a moment. Here is what Discover magazine reports about a finding of the NHTSA:

It wasn’t too surprising when scientists first hacked into a car using its own onboard diagnostic port—sure, it’s easy to get into a car’s electronic brain if you’re already inside the car. Now the science of car-hacking has received a digital upgrade: Researchers have have gained access to modern, electronics-riddled cars from the outside. And in so doing, they’ve managed to take control of a car’s door locks, dashboard displays, and even its brakes.

Imagine for a moment the California Highway Patrol is chasing a car driven by a murder suspect. Instead of racing at over 100 miles per hour through heavy traffic, the CHP can simply take control of the suspect's car and shut down its electronics, stopping the car and locking the driver inside.

The oddest part of these findings, which were presented this week to the National Academy of Science’s Committee on Electronic Vehicle Controls and Unintended Acceleration, is that they weren’t entirely intentional: It was all part of an investigation prompted by the Toyota acceleration problems, and was meant to probe the safety of electronic automotive systems. But testing those system’s safety also uncovered some flaws.

Insofar as this gives police agencies the power to stop a vehicle without a high speed chase, I don't see this as being a flaw at all. It should be designed into every car.

Here is how they did it:

The researchers took a 2009 sedan (they declined to identify the make and embarrass the manufacturer) and methodically tried to hack into it using every trick they could think of. They discovered a couple good ones.

PC World reported this trick:

By adding extra code to a digital music file, they were able to turn a song burned to CD into a Trojan horse. When played on the car’s stereo, this song could alter the firmware of the car’s stereo system, giving attackers an entry point to change other components on the car. This type of attack could be spread on file-sharing networks without arousing suspicion, they believe. “It’s hard to think of something more innocuous than a song,” said Stefan Savage, a professor at the University of California.

Discover notes that "built-in cellular services that provide safety and navigational assistance, like GM’s OnStar, can also be used to upload malicious code."

Technology review reports:

The researchers found that they could take control of this system by breaking through its authentication system. First, they made about 130 calls to the car to gain access, and then they uploaded code using 14 seconds of audio.

The obvious fear is that some malicious outsiders could get ahold of this sort of remote control and mess with an innocent person's vehicle. However, Discover notes that is not likely:

In the wrong hands, the technology could certainly be harmful; once a hacker gains access, they can do anything from sabotage brakes to monitor car movements (by forcing the car to send GPS signals). But the engineers say the “wrong” hands wouldn’t have the know-how to undertake these complicated procedures—at least for now. As Stefan Savage, a computer scientist at the University of California, San Diego, told Technology Review: “This took 10 researchers two years to accomplish,” Savage adds. “It’s not something that one guy is going to do in his garage.”

No comments: