Podcast
Root Causes 317: New Automotive CAN Bus Attacks Demand PKI


Hosted by
Tim Callan
Chief Compliance Officer
Jason Soroko
Fellow
Original broadcast date
July 13, 2023
In this episode we describe how physically accessing the CAN bus wires in a modern automobile can allow a thief to take over key fob functionality to unlock the doors, start the engine, and ultimately steal the vehicle. We explain how PKI can defeat this attack and what is necessary to get there.
Podcast Transcript
Lightly edited for flow and brevity.
But I think what's been going on is not really so much at the research level, at the automotive industry level, a lot of what's been going on is there's just been a whole pile of social media around, hey, my Lexus has been stolen. My Rav4 has been stolen. A bunch of cars have been stolen recently. Higher end late model cars, and a lot of people are starting to ask questions about it. And I just saw this article come up. It was a blog post. It was very detailed, and I want to explain what the progression has been and where we are at right now.
So, let's talk about the progression of attacks through time and how they've been mitigated and where we are now while you're starting to see these attacks come up more and more.
So, in the past, Tim, stolen cars, back in the old, old days, if you can get physical access to the key fob, this person presses the button, it remote access to the car, then of course, the bad guy can walk away. And the thing is, there were a lot of previous research and studies around the fact that the communication between the old key fobs and the new, they used to be completely unencrypted. Therefore, you could simply listen in.
So what you're seeing, Tim, and the article is actually bringing up the idea of what a lot of people are seeing on YouTube which is people walking up to cars, doing something physical to the car and then walking away with the car, driving away with the car. And the example used in the article is very interesting in that an owner of vehicle had caught on a security camera some bad guys trying to mess with the headlights of his car and the guy was like geez, he thought it was just vandalism. Like why in the world would somebody be attacking the headlights of my car and then a few nights later he went and got it fixed and then the bad guys came back and then started messing again with the headlights and I think it was on the third attempt or something like that where eventually the car was stolen. It was gone. And what the article is trying to explain in extreme detail, which is lovely for anybody in the computer industry or the automotive industry, what it's really trying to explain is the bad guys simply wanted to get to the CAN bus wires of which in this particular model of vehicle you can get to the CAN bus wires, the most exposed wires there are actually control the headlamps.
And so there is an ECU that literally controls the on and off of the headlamps as well as a tilting feature of the headlamp. So, this particular car had a feature that if the car was very, very loaded down and the angle of the car changed, the angle of the headlamps could actually change as well. And that was controlled by a computer and so they basically hooked up the wires, physically connected to the CAN bus wires and started flooding the car with instructions to open the door and start the engine and eventually the car was just overwhelmed with these CAN bus orders and saying okay, okay, you want me open the door and you want me to start engine. Got it. And that's what happened. Door opened, engine started, person is able to walk to the car and drive away and this is because the key fob was completely bypassed, and the bad guy was literally looking for the most accessible wiring to be able to physically send those CAN messages deeper within the CAN bus network of the car.
And in other words, a car being literally not a computer on wheels, but a computer network on wheels is the best way to think about it. It's like a server room on wheels. And if you're able to physically wire yourself into that server room, well guess what, you could do a lot of bad things with computers that are in that server. And in this case, it was to physically steal the car away and what the article goes on to say, Tim, is something that you and I have alluded to and talked about in previous podcasts, and that has a lot to do with isn't it interesting that really ultimately the solution here is something that's going to end up being a little more expensive in a vehicle but just as the whole idea that the gateway ECU, the way in to this server room of a car was to basically know the genuineness of the key fob that was actually speaking to it. Well, what it really means is that every ECU in the car, or at least the very key ones, such as the ECU that controls the engine starting and the ECU that controls the windows opening and closing and the door opening and closing.
And I will also say, there's another argument. And this is mentioned in the article as well, which is, when a car works perfectly, automakers are really reticent to change. And I think there's a third issue here, which is cryptographic commands, and various kinds of things like this will ultimately, it puts latency. It puts a load on an already extremely flooded CAN bus. And so, Tim, it’s almost kind of weird.
So let's talk about ultimately the trend quickly. And this gets back to enterprise IT where everybody kind of, on this podcast, feels a lot more comfortable. But I've also seen proposed networks inside of cars that actually look a lot more like enterprise networks.
This is TCPIP, and all the things that we're used to, and there are actually Tier 1, Tier 2 automotive suppliers that have proposed solutions like this and actually offer solutions like this for portions of the car.
So, isn’t it interesting, Tim, that we’ve talked about laptops computers, mobile devices all the traditional types of ways that we compute, and the more and more and more we get into really looking at, okay, what's the solution for this for automobiles, it ultimately is PKI. And ultimately, the way to get there in a way that's doable, is to make the network look a lot more like we're used to in an enterprise environment.
But, to your other point, what I really can't have is I can't have these vehicles that are careening down the street that are giant, deadly weapons. I can't have these vehicles doing things on their own that are causing deaths. And you can see where that focus on reliability might cause them to be reluctant to make changes in something that's already working.
I mean, they're not cheap. This article says here that I think they were like 5000 euros. So certainly that isn't cheap, but if you're going to go out and you're going to steal 30 to $50,000 vehicles left, right, and center, then you can easily see where somebody would make that investment.

