B12 - 108 - University of Pittsburgh

Session B12
108
Disclaimer—This paper partially fulfills a writing requirement for first year (freshman) engineering students at the
University of Pittsburgh Swanson School of Engineering. This paper is a student, not a professional, paper. This paper is
based on publicly available information and may not provide complete analyses of all relevant data. If this paper is used for
any purpose other than these authors’ partial fulfillment of a writing requirement for first year (freshman) engineering
students at the University of Pittsburgh Swanson School of Engineering, the user does so at his or her own risk.
THE VULNERABILITY OF ELECTRONIC CONTROL UNITS OF PASSENGER
VEHICLES
Kathleen Bracken, [email protected], Mena 3:00, Elizabeth Rager, [email protected], Mena 3:00
Abstract—Automobiles are no longer exclusively
mechanical. Cars today are equipped with Wi-Fi
connectivity, on-board diagnostics, and navigation. With this
connectivity comes a growing cybersecurity threat. Vehicle
manufacturers are failing to upgrade security as hacking
threats escalate. One of the most vulnerable parts of the car
is the Electronic Control Unit, or ECU.
All passenger vehicles produced today use ECUs to
control all components of the car, from the transmission to
the entertainment controls. These ECUs are interconnected
through the Controller Area Network, a series of codeconducting wires, and have the ability to connect to the
Internet through software services. ECUs have made
vehicles lighter, more intelligent, and more environmentally
and economically sustainable. They have also increased our
reliance on the Internet; however, this creates security risks.
In one case, hackers managed to remotely infiltrate a 2014
Jeep Cherokee. They were then able to access and
manipulate vehicle ECUs, including the air conditioning,
radio, and even the engine. Such breaches in security are a
critical issue to vehicle safety. Engineers must secure ECUs
in order to protect vehicle owners from hackers.
We have assembled the latest research regarding the
safety and sustainability of connected vehicles. By
investigating the technology behind ECUs, we have
uncovered their security flaws and summarized some
proposed solutions to the growing issue of Electronic
Control Unit security in automobiles.
Key Words—Automotive Software, Cybersecurity, Electronic
Control Units, Hacking, Internet of Things, Vehicles
HACKERS BEHIND THE WHEEL
Cars were once mechanical systems—the steering wheel
turned the wheels, the brake pedal brought them to a halt,
and the windows went up and down with the turn of a
handle. Today, windows rise and fall at the push of a button,
and even the vehicle transmission is controlled by electrical
impulses. Nearly every component of a modern automobile
relies on signals that are sent and processed by Electronic
Control Units (ECUs).
University of Pittsburgh Swanson School of Engineering 1
31.03.2017
ECUs are the fundamental technology that allow a
passenger to control the temperature, listen to satellite radio,
and navigate through a built-in GPS. These luxuries would
not be possible without being connected to the Internet, WiFi, or a cellular network. ECUs therefore connect the
components of the car not only to each other, but to the
outside world as well. This has allowed cars to enter the
ever-growing Internet of Things, a term used to describe the
connection of everyday devices to the Worldwide Web.
By using electricity rather than mechanics, ECUs provide
a lighter, more streamlined method of internal
communication. This reduced weight translates to greater
fuel efficiency and improves the environmental
sustainability of the
automobile
industry.
The
computerization of cars also makes maintenance more
efficient and economical. By enabling electronic safety
features such as Adaptive Cruise Control, ECUs can even
protect passengers by reducing collisions.
While the connective abilities of ECUs give automobiles
many useful capabilities, they also present a question of
security. Research has shown that cars, like computers and
any other Internet-connected device, are now vulnerable to
hacking. If steps are not taken to protect vehicles and their
passengers, hackers could potentially seize control of
vehicles. In fact, security experts Charlie Miller and Chris
Valasek, a University of Pittsburgh graduate, managed to
remotely kill the engine of a 2014 Jeep Cherokee while it
was driving on the highway [1]. This dramatic hacking feat
has led to a growing interest in securing ECUs, which are
the foundation of the connected car.
ELECTRONIC CONTROL UNITS
Connectivity is a critical aspect of today’s fast-paced and
digital world; it even translates into passenger vehicles. The
most integral part of this connectivity is the electronic
control unit. Hundreds of these connected ECUs comprise
the main control system of modern vehicles.
Simply put, ECUs are computer devices that are
interconnected to control various aspects of systems. The
ECU is a combination of hardware and software located
within a larger system [1]. According to the Internal
Combustion Engine Handbook, a series of switches and
code-carrying wires transmit instructions from input controls
Kathleen Bracken
Elizabeth Rager
to the various mechanisms of a larger device, such as a car
[2]. The input signals can be digital or analog, and once they
reach the ECU, they are “converted into digital voltages and
frequencies that represent information readable by the
microcontroller” [2]. This means that the ECU takes the data
packets it receives and transforms them into a form that is
able to be understood by the microcontroller. Once the
information is processed by the ECU, the command is sent
to an actuator, which is the component of a system that
moves the mechanical parts of the apparatus. The integration
of ECUs into technology has made it easier to control large
systems remotely.
Figure 2 shows the core of the ECU. The signals enter
and exit the microcontroller, which processes and converts
the signals. These input and output signal pathways are
designated by I/O drivers. The watchdog and applicationspecific integrated circuit (ASIC) components are guard
computing systems that check the microcontroller’s
processing and reset or terminate processing in the event of a
negative response like a timeout error, which occurs when
the ECU runs out of time to return its data. Memory storage
is also included within the ECU core, as well as further
communication connections shown as the address and data
buses [3].
Computerizing Cars
Although ECUs are relatively small compared to the size
of a vehicle, they perform an invaluable job within their
host. ECUs have almost completely replaced mechanical
vehicular systems. For example, in older cars, gear shifting
entailed moving a physical linkage that would change the
transmission speed. Today, an ECU changes the gears by
sending signals. Vehicular systems such as the transmission,
radio, and air conditioning are all connected to ECUs that
are responsible for the processing of data and transmission
of code for execution of the data commands [2]. First, the
ECUs receive a command from the operator to perform a
specific task. This could be anything from rolling the car
windows down to accelerating. The ECU then processes the
request and evaluates it using various algorithms. After
evaluation, the request is sent from the ECU to the vehicle
system for execution [2].
The following images from Paderborn University in
Germany illustrate this transfer of signals through the ECU
[3]. Figure 1 shows the main ECU component. It
clarifies that signals from external components of a vehicle
enter the ECU, are converted into packets of data to be
processed, and are then sent to the mechanical component to
be executed [3].
FIGURE 2 [3]
ECU Core schematic
These address and data buses can also deliver excess data to
be stored in the external memory banks [3].
While ECUs execute critical processes, they are actually
easier to program than one might think. In fact, according to
Martin Salfer and Claudia Eckert, researchers at the
Technical University of Munich, most ECUs are
programmed using common languages such as Java, C++, or
C, which are readily taught in basic coding classes [4]. This
ease of programming can also allow others to access and
change the code by decompiling it and making amendments
[1].
Although a single ECU only controls one aspect of a
vehicle, all of the ECUs within a car are connected via the
Controller Area Network (CAN) Bus, or by another similar
connectivity network. As explained by Craig Smith, author
of The Car Hacker’s Handbook: A Guide for the Penetration
Tester, the CAN is one of today’s most widely used
protocols for electronic network connectivity within
vehicles; it provides a pathway through which ECUs can
communicate [5]. The CAN Bus is comprised of a series of
two wires, CAN high (CANH) and CAN low (CANL), that
connect some of the ECUs in a vehicle, allowing the devices
to communicate with one another [5]. When the CAN Bus
receives a signal from an ECU, it uses differential signaling
to transmit the message to other connected ECUs [5].
Differential signaling is a type of messaging that uses a
signal and its inverse to transmit packets of information that
dictate commands to ECUs. An example of differential
signaling is shown in the following figure from The Car
Hacker’s Handbook [5].
FIGURE 1 [3]
Main ECU design schematic
As referenced in the figure, the sensor drivers detect the
command processed in the core of the ECU, and the actor
drivers deliver the command to the vehicular system [3].
2
Kathleen Bracken
Elizabeth Rager
Environmental and Economic Effects of ECUs
The almost exclusive use of Electronic Control Units in
passenger vehicles has many sustainability benefits for both
the vehicle operator and the manufacturer. Sustainability
encompasses ensuring that future generations will have the
natural resources they require. It also includes improving the
long term economic health of an industry and the safety of
the public.
The article “A Car Hacking Experiment: When
Connectivity Meets Vulnerability” illustrates some of these
ECU benefits [6]. First, using ECUs to connect vehicle
systems instead of traditional mechanical methods allows the
vehicle to be much lighter [6]. Large cable bundles
previously used to connect systems have been reduced to the
CAN Bus’s dual-wire system, reducing the amount of
conductive metals used to transmit messages between ECUs.
Additionally, the heavy mechanical systems that formerly
controlled processes like switching gears were replaced by
much lighter ECUs, lowering the overall weight of the
vehicle. Lighter vehicles lead to higher vehicular fuel
economy, using less gasoline to travel more miles and
reducing the use of petroleum. In addition to reducing
environmental effects, this also reduces consumer spending
on gasoline.
Reducing the amount of materials used to build the car is
also a direct result of using ECUs. Using fewer natural
resources like elemental metals and oil to produce vehicles
aids in the protection of some of the Earth’s most vital
natural resources. By cutting back on supplies needed to
build communication networks, vehicle manufacturers can
reduce the cost of production, thus maintaining a
sustainable cost for consumers and boosting the economic
sustainability of the automobile industry [6].
Using ECUs and the CAN Bus also allows for easier
maintenance of the vehicle [6]. The more compact wiring
structure of ECUs, as compared to mechanical systems, is
easier to navigate when performing tweaks and repairs of the
vehicle. This has increased the productivity of auto
mechanics and minimized the margin of error that could
come about as a result of interfering with the other vehicular
systems. Another added maintenance feature is the On-board
Diagnostics (OBD) port, which creates a wired connection to
the CAN Bus [6]. This tool can help mechanics locate
problems within ECUs. More efficient maintenance allows
auto mechanics to take more appointments. This can also
improve the quality of vehicle owners’ lives because they
are able to return to their daily routines more quickly.
Furthermore, ECUs increase the overall safety of vehicles
through technologies like Adaptive Cruise Control (ACC),
which keeps drivers using cruise control from getting too
close to the car in front of them [1]. Other available safety
features that add protection to drivers are Forward Collision
Warning Plus (FCP+) and Lane Departure Warning (LDW+)
that alert drivers to objects or movements that could cause a
FIGURE 3 [3]
Example of differential signaling
The darker top signal is transmitted by CANH, while the
lighter bottom signal is transmitted by CANL. As shown, the
top signal is a mirror image of the bottom [5]. This complete
signal is conveyed to ECUs through the CAN. The use of
differential signaling in vehicles is especially important
because this type of signal processing is not susceptible to
noise interference from the engine or tires [5].
The CAN Bus can also ensure that one faulty ECU does
not compromise the performance of the rest of the vehicle.
Because ECU signals travel along the CAN to be conveyed
and executed, if one ECU fails, the others will still be able to
communicate and execute commands [5]. CAN protocol is
an integral part of the transmission of ECU commands
throughout a vehicle.
Connecting Cars
Today, almost everyone is connected to the Internet via
smartphones, tablets, and even watches. This connectivity
has spread to vehicles. While ECUs connect various parts of
a vehicle together, they also connect vehicles to the Internet.
For example, the 2014 Jeep Cherokee’s radio ECU has the
ability to process Bluetooth and GPS signals as well as radio
signals [1]. Furthermore, the radio ECU links the vehicle to
an external cellular network, connecting the car to the
Internet [1]. While this connection allows the car to
communicate with applications that collect data from the
Internet, it also gives Internet servers the ability to access
information throughout the car. Once the car is connected to
the Internet, anyone with the necessary technical knowledge
could use the Internet connection to access any ECU
connected through the CAN Bus. The inclusion of vehicles
in the connectivity of the twenty-first century allows them to
be more in tune with the user, but it also allows for remote
external access to the vehicle control systems.
3
Kathleen Bracken
Elizabeth Rager
collision [1]. Services such as these lessen the dangers of
driving by preventing crashes and injuries. These services
can also reduce costs for drivers; fewer accidents mean that
vehicle owners and insurance companies do not need to
spend as much money on car repairs.
Transitioning to the almost exclusive use of ECUs in
passenger vehicles has greatly enhanced the driving
experience in some regards. However, ECUs are not without
fault. One of the most critical issues with ECUs is their lack
of security protection [1]. This shortcoming became an issue
as a result of connecting vehicles to the Internet.
HOW TO HACK A CAR
Figure 4 [7]
Scanning setup used to find vulnerable vehicles
Highway Hackers
This proved that the Wi-Fi feature was insecure, but most
Chrysler owners do not pay for this additional service. With
the ultimate goal of being able to seize any vehicle anywhere
in the country, they decided to broaden their scope to
hacking solely over the cellular network. They succeeded in
remotely communicating with their Jeep using their own
miniature cellular tower, called a femtocell, which conveys
signals over a small range. They used a femtocell because
they “assumed that normal Sprint towers would block
communications between two devices” [1]. However, they
soon discovered that was not the case. When Valasek and
Miller examined the Sprint cellular network, which is used
for Uconnect, they were surprised to find that “any Sprint
device anywhere in the country can communicate with any
other Sprint device anywhere in the country” [1]. This meant
that if they connected their laptop to a hotspot on the Sprint
network, they had the ability to communicate with the target
Jeep or any other connected Chrysler vehicle anywhere in
the entire country [1].
In order to demonstrate the scale of this vulnerability, the
researchers performed another scan to search for vehicles
that could potentially have the same vulnerability as the
2014 Jeep Cherokee. A single scan found 2,695 vehicles
that could, through this flaw, receive remote
communications without authentication [1]. They
extrapolated this data and were able to estimate that between
292,000 and 471,000 vulnerable vehicles existed [1].
The ability to communicate with the Jeep remotely gave
them a direct connection through Uconnect to the CAN. The
CAN network could then relay their messages to the various
ECUs throughout the vehicle. Now that they had access,
they had to determine how to program their own commands
to control these ECUs. Miller and Valasek downloaded IAR
workbench, which is used by automotive engineers to
compile code [1]. According to their paper, they were lucky
to find “that IAR workbench came with example code for
our exact processor and it included sample code for sending
and receiving CAN messages” [1]. They used these
examples to reverse engineer functions in C++, Java, and
Python that could be used to control various ECUs.
At the 2015 Black Hat USA conference, security experts
Charlie Miller and Chris Valasek revealed that they had
discovered how to hack a car—and they released a paper
describing exactly how they managed to do it. The
researchers, who had backgrounds in security at Twitter and
IOactive, used Miller’s 2014 Jeep Cherokee for their work
[7]. They made use of Fiat Chrysler’s Uconnect
entertainment service, which relies on the Sprint cellular
network [7]. The Uconnect service is found in most vehicles
manufactured by Fiat Chrysler Automobiles, and as Miller
and Valasek point out in their conference paper, it is the
“source for infotainment, Wi-Fi connectivity, navigation,
apps, and cellular communications” [1]. Because this service
connects the car to the outside world, it opens up a host of
vulnerabilities.
The UConnect features are essential to understanding the
vulnerabilities of the vehicle. The standard Uconnect system
uses the cellular network to perform services such as GPS
navigation and roadside assistance. In this case, Miller’s
Jeep was equipped with an additional Wi-Fi service, which
is an optional Uconnect feature that comes at additional cost.
Adding the Wi-Fi capability allows full internet browsing,
and it lets any device with internet capabilities connect to the
Web through the car. Creating a full-fledged Wi-Fi hotspot
opens up the possibility that an unauthorized user could
connect to the car [1].
Miller and Valasek demonstrated the procedure a hacker
might use to exploit this Wi-Fi vulnerability. First, they ran a
port scan to check for their best point of entry, or “port,” and
found that “not only were there ports open, but there were
several open” [1]. They selected Port 6667 as their target,
which “on a normal server is used for Internet Relay Chat
(IRC), but on a Jeep, it’s used for something called D-Bus,
an interprocess communications mechanism” [1]. According
to Miller, D-Bus “can require authentication, but the Jeep
implementation did not” [1]. In other words, the
manufacturers had failed to implement a basic security
procedure and left open a port that could allow external
access to the vehicle’s ECUs.
4
Kathleen Bracken
Elizabeth Rager
The researchers were then able to send their messages
over the cellular network, into the target Jeep, and into the
CAN network. The messages were then relayed through the
CAN to the ECUs, which did not recognize that these
instructions were not authentic. Through this process, the
researchers gained the ability to manipulate the air
conditioning, brakes, radio, and other ECUs in the vehicle.
They could even force the vehicle to display an image of
their choice on the Uconnect touch screen.
In light of this discovery, Miller and Valasek now had the
power to remotely seize control of thousands of vehicles. In
one high-profile stunt, they put a reporter from Wired behind
the wheel. From the comfort of their living room, they
seized control of the vehicle and stalled the Jeep’s engine
while the reporter was driving on the highway [8]. The
researchers could easily have wreaked havoc on thousands
of unsuspecting drivers, caused collisions, or forced audio
systems to blast uncontrollable rap music. However, they
chose to put their knowledge to more ethical use and notified
Chrysler of the vulnerability [7].
easily utilized by members of the public. This method of
software sharing allows collaborative development and has
been an essential part of the advancement of computers over
the past decades. In this case, however, it has the
disadvantage of allowing hackers to exploit software in a
way that was not intended by the developer [9]. Anyone with
the determination to hack a vehicle could download this
software and expand upon this method. If these
vulnerabilities are not fixed, car hacking could soon be
accessible and cheap—even to the common criminal.
CYBERSECURITY SOLUTIONS
As several experts have demonstrated, the use of vehicle
ECUs creates many security issues, but the benefits of ECUs
are also undeniable. In a consumer world that demands the
ease of automatic windows, satellite radio, and the ability to
turn a car into a Wi-Fi hotspot, ECUs cannot be eliminated.
However, Miller and Valasek point out that “as new
technology is added to vehicles, new attacks become
possible” [1]. If the danger of insecure ECUs continues to
grow at this rate, with advancements in convenience
outstripping advancements in safety, the public may begin to
avoid purchasing new cars in order to protect themselves.
The peril could soon outweigh the appeal. If high-profile
hacks become more common, consumers will take notice,
and the automobile industry could suffer a blow. In order to
protect the economic sustainability of their own livelihood,
vehicle manufacturers must find a way to balance the luxury
of ECUs with passenger safety.
Protecting Our Passengers
Valasek and Miller’s efforts demonstrated to the world
that vehicle hacking is a tangible threat, not a fantasy. Their
work caused Chrysler to recall a massive 1.4 million
automobiles [7]. Chrysler also released a patch for their
software [7]. Additionally, cellular provider Sprint blocked
access to the vital Port 6667 and upgraded their security,
which means that now, the “only way to attack a vulnerable,
unpatched vehicle” requires “close range to the vehicle”
instead of being able to utilize Sprint’s vast network of
cellular towers [1].
These upgrades have improved security, and as of the
researchers’ second talk at the following year's Black Hat
Conference, Chrysler vehicles can no longer be remotely
hacked. However, Miller and Valasek were still able to
perform hacks via the Universal Serial Bus (USB) port by
inserting a stick filled with infectious code to manipulate the
steering and brakes [9]. Since this type of attack requires
physical access to the car, Chrysler shrugged off this new
research and did not choose to recall or patch vehicles with
this vulnerability [9].
While Valasek and Miller’s Jeep exploits are a highprofile example of engineering efforts to address car
security, they are hardly the first to discover a way to
compromise vehicle ECUs. Researchers at the University of
Luxembourg developed their own way to infiltrate a vehicle.
They performed their experiments on a Renault Twizy 80,
and were able to force the vehicle to slow down, stop, and
change gears [6]. For their work, they used the “Open
Vehicle Monitoring System (OVMS), which is an open
source tool that brings remote access to a number of
electric cars in order to retrieve various information such as
the battery state, location, and other readings” [6]. Since this
software is open source, it can be found online and might be
Vulnerability Assessment
The path to security begins with assessing which ECUs
are the most vulnerable. Claudia Eckert and Martin Salfer of
the Technical University of Munich developed a series of
mathematical models that can be used to evaluate the
security of any ECU. Their method, which is based on the
principles of probability and “ECU development data and
software flash images,” assesses the “attack surface and
vulnerability” of the ECU [4]. In other words, it provides a
quantitative way to determine how easy it might be to hack a
particular ECU. The formula the researchers developed is
modeled by the Bernoulli process. This equation involves
the number of vulnerabilities (X), the probability of a single
attack surface spot being free from vulnerabilities (Q), the
number of attack surface spots (i), the average code size of
these spots (x), and the vulnerability density (v) [4].
Vulnerability density is defined as:
𝑣 =
𝑠𝑒𝑐𝑢𝑟𝑡𝑦 𝑟𝑒𝑣𝑒𝑙𝑎𝑛𝑡 𝑑𝑒𝑓𝑒𝑐𝑡𝑠
𝑐𝑜𝑑𝑒 𝑠𝑖𝑧𝑒
(1) [4]
In other words, it is a ratio of the security flaws in the code
to the amount of code. This property is useful for describing
5
Kathleen Bracken
Elizabeth Rager
how many flaws exist in a segment of code. The
aforementioned variables are all used to derive the equation:
𝑃𝐵 (𝑋 > 0) = 1 − 𝑃𝐵 (𝑋 = 0) = 1 − 𝑞𝑖𝑥 = 1 − (1 − 𝑣)𝑖𝑥 (2) [4]
PB is the likelihood that a security vulnerability exists in the
software of a specific ECU [4]. It quantitatively describes
how easy it might be to hack a particular ECU based on
various factors related to weak points in the software itself.
Using this equation, engineers can determine which ECUs
have the most vulnerable code and use that knowledge to
focus their security efforts.
Keeping Up With Updates
Other researchers have proposed more tangible solutions
to the security issue. One of the biggest challenges for
automotive companies is the difficulty associated with
updating ECU software. Researchers from the Kanagawa
Institute of Technology and Soka University in Japan point
out that “Vehicles these days have roughly one hundred
Electronic Control Units” [10]. All of these ECUs are
controlled by software, and “it is difficult to release software
without bugs. Thus, it is very important to quickly fix the
bugs once they are detected” [10]. Just as the software in
phones and computers must be kept up-to-date, automobile
software should be in a constant state of improvement in
order to fix bugs and improve security as new threats arise.
A vehicle has so many ECUs that the process of updating
software is inconvenient and time-consuming because “the
vehicle must be stopped and cannot be controlled by the
driver. However, the engine must be activated” [10]. This
process is similar to the familiar ordeal of updating one’s
phone. When a new version of software comes out for an
iPhone or similar device, the installation process can be a
nuisance. The owner must plug the phone into a charger and
cannot use the phone for several minutes while the update is
in progress. This familiar process is almost identical in
vehicles, but on a much larger scale, which makes it even
more inconvenient. Instead of missing out on calls or texts
for a few minutes, a vehicle owner must take the car to the
dealer and wait for the software to be installed [10].
In order to ensure that vehicle owners take the necessary
steps to protect themselves by keeping up with releases of
improved software, this inconvenience must be minimized.
Ideally, software updates might one day become fast and
simple enough to be done at home instead of at the
dealership. Figure 5 illustrates the current update process
and suggests the possibility of simpler future updates if
greater efficiency can be achieved.
Figure 5 [10]
The future of vehicle updating
In order to attain this efficiency, these researchers suggest
implementing a bsdiff code compression algorithm, which is
“a famous and efficient algorithm for PC software” [10].
This algorithm compresses code by identifying similar and
different segments of code [10]. Compression reduces the
size of the file so that fewer bits must be transmitted, which
in turn makes the transfer of data faster. The researchers
showed that their proposed bsdiff method is somewhat
effective, but more work must be done to apply their work to
ECU software [10]. Hopefully, improvements in updating
efficiency will allow automotive manufacturers to keep up
with changing security needs, especially as bugs and
vulnerabilities are discovered by researchers such as the Jeep
and Luxembourg hackers.
Cloud Defense
The specific threats faced by connected automobiles must
also be considered in order to prepare for likely scenarios.
Vehicle ECUs are threatened by malware, or the injection of
malicious code [11]. There are many types of malware,
including spyware, worms, and ransomware [11]. These may
be familiar terms in the realm of the Internet, but the
prospects are even more frightening when applied to a
personal vehicle. Spyware could be used to extract personal
data, worms could spread from car to car, and ransomware
could be used to remotely lock the car doors and “ransom” a
vehicle until its owner pays for its release [11]. Vehicles
today have little protection against such scenarios.
Researchers from Cisco Systems, Inc. state that, thanks to
the onboard diagnostic systems in cars today, “attackers can
install malware on the ECUs as easily as car enthusiasts can
tune and reprogram their ECUs” [11]. Malware could also
be downloaded via embedded web browsers [11]. It might
even enter through an infected USB stick, which can be
inserted into some vehicle systems like Uconnect in order to
import music [1]. Due to these various points of entry,
6
Kathleen Bracken
Elizabeth Rager
vehicles are vulnerable on many fronts. One of the
challenges faced by automobile manufacturers is to
determine how to mitigate these threats. Many vehicles run
on Linux-based operating systems, which are often more
secure against malware “than other operating systems such
as Microsoft Windows and Android” [11]. However, even
Linux is not immune, and automobiles still require a
stronger form of defense.
Types of malware are constantly evolving, which also
presents a challenge. As the Cisco researchers point out,
vehicles have increasingly long life spans, and the average
age of “passenger cars and light trucks on the U.S. roads
reached 11.4 years in 2013” [11]. This makes it difficult to
ensure that older vehicles are kept up to date. Once again,
software updating presents a problem, but rather than
suggesting a code compression technique such as the
previously recommended bsdiff algorithm, these experts
propose a cloud-based security system [11]. Using a cloud
would allow the car to rely on external protections that could
be maintained and updated by the manufacturer.
The idea of using a cloud to protect systems is not new—
it has been used for computers as well. The process is
relatively simple. Instead of directly handling requests for
communication, the computer redirects the request to a
security cloud “where the traffic will be scanned for
malware before relayed to the source computer” [11]. If
implemented in automobiles, this would mean that messages
received from an outside source would be carefully
examined for authenticity before being relayed to the target
ECU. This system would not protect the vehicle against
physical intrusion, such as an infected USB stick, so it is not
a complete solution. It would also render the vehicle
dependent on the cloud, but in a world with increasingly
broad cellular coverage, the likelihood of this becoming a
major problem is minute.
While this cloud defense is not perfect, delegating some
malware detection to a cloud would allow the systems that
are on the vehicle “to be lightweight in terms of processing
and storage, and yet have a full spectrum of malware defense
capabilities that are kept up-to-date over time” [11]. In other
words, the cloud would augment the vehicle’s local security,
and it could be sustained by the manufacturer without
requiring an extensive update of the physical car. This
cloud-assisted framework could be adapted for different
vehicles to “to match their specific malware risk profiles and
protection needs” [11]. This proposed solution has the
potential to reduce the burden of updating software, and it
could reduce the amount of security needed on the vehicle
itself.
ECUs are vulnerable in their current state, but electrical
and computer engineers across the globe are striving to
remedy this problem. Vulnerability assessment can help
researchers decide where to focus their efforts. The bsdiff
algorithm or another code compression technique could
make frequent software updates more feasible. To make
security less burdensome, cloud-based defense could
minimize the amount of on-car protection needed. These
techniques are steps forward in the vital, but often
overlooked, field of vehicle security. The evolution of the
increasingly computerized automobile industry depends on
ensuring that new technology is safe for consumers. In order
to continue to make vehicles environmentally sustainable
through new computing technology, the issue of safety must
be controlled. Hopefully, the security of automotive ECUs
will continue to improve, and the convenience of connected
cars will not have to come at the steep price of safety.
CATCHING UP TO CODE
In today’s fast-paced digital world, many forms of
technology have evolved and developed to keep up with the
twenty-first century. One such technology is the electronic
control unit. ECUs are now used almost exclusively in
passenger vehicles as a way to control systems such as air
conditioning and transmission.
The use of ECUs has increased the sustainability of
vehicles by reducing their weight, making them more fuelefficient, reducing maintenance times, and lowering both the
environmental and economic costs of production.
Furthermore, new safety features controlled by ECUs help to
keep vehicle occupants safer in the event of operator neglect
or emergency. These added benefits illustrate the importance
of ECUs in passenger vehicles from an ethical standpoint,
promoting safety, efficiency, and environmental protection.
ECUs now also have the capacity to link to the Internet
and gather information from applications. However, this
connectivity is not without complications. One of the
greatest issues facing ECUs is the lack of security against
hacking via the Internet connection. Security experts
demonstrated the gravity of this shortcoming with their hack
of a 2014 Jeep Cherokee. By gaining access to the CAN
network of the vehicle through the radio ECU, they were
able to control many of the vehicle’s systems.
Their research brought to light previously unconsidered
issues. As a result, many other groups have begun to
examine solutions to these problems. For example, a group
of researchers devised an equation to assess the
vulnerabilities of ECUs. Other more tangible solutions
include updates using the bsdiff algorithm, an update similar
to mobile phone updates, and a cloud-based security feature
that examines code before it is implemented in ECUs. Using
such approaches will allow automotive manufacturers and
technicians to appropriately diagnose and update ECU issues
and code.
Vehicle ECUs prove to be an integral component of
today’s digital world. Connecting to one another and the
Worldwide Web, ECUs provide a number of sustainable
benefits. As with any technology, there are also some
downfalls in the form of security issues. However, with the
recognition of these problems will come a solution, as
researchers have already begun proposing and testing fixes.
7
Kathleen Bracken
Elizabeth Rager
Finding solutions to ECU vulnerabilities will help to usher in
a new wave of autonomous automotive options and services.
ata=JnNpdGU9ZWhvc3QtbGl2ZQ%3d%3d#AN=11727310
6&db=aph
[10] Y. Onuma, Y. Terashima, M. Nozawa, R. Kiyohara.
“Improved Software Updating for Automotive ECUs.” 2016
40th IEEE Annual Computer Software and Applications
Conference. 2016. Accessed 1.26.2017.
http://ieeexplore.ieee.org.pitt.idm.oclc.org/stamp/stamp.jsp?t
p=&arnumber=7552226
[11] T. Zhang, H. Antunes, S. Aggarwal. “Defending
Connected Vehicles Against Malware: Challenges and a
Solution Framework.” IEEE Internet of Things Journal.
1.23.2014. Accessed 1.26.2017.
http://ieeexplore.ieee.org/document/6720160/. P.10-21
SOURCES
[1] C. Valasek, C. Miller. “Remote Exploitation of an
Unaltered Passenger Vehicle.” IOActive, Inc. 2015.
Accessed 1.10.2017.
http://www.ioactive.com/pdfs/IOActive_Remote_Car_Hacki
ng.pdf
[2] R. van Basshuysen, F. Schäfer. Internal Combustion
Engine Handbook. SAE International. 2016. Accessed
2.17.2017.
https://app.knovel.com/web/toc.v/cid:kpICEHBC04/viewerT
ype:toc/root_slug:internal-combustionengine/url_slug:kt0113ZWVC
[3] “Electronic Control Units (ECUs).” Paderborn
University. 2014. Accessed 1.26.2017.
http://www.ccs-labs.org/teaching/c2x/2014s/05-ecus.pdf
[4] C Eckert, M. Salfer. “Attack Surface and Vulnerability
Assessment of Automotive Electronic Control Units.” 2015
12th International Joint Conference on e-Business and
Telecommunications. 7.20-22.2015. Accessed 1.26.2017.
http://ieeexplore.ieee.org.pitt.idm.oclc.org/stamp/stamp.jsp?
arnumber=7518052
[5] C. Smith. The Car Hacker’s Handbook: A Guide for the
Penetration Tester. No Starch Press. 3.6.2016. Accessed
1.11.2017.
http://proquest.safaribooksonline.com/book/softwareengineering-and-development/softwaretesting/9781457198847/firstchapter
[6] S. Jafarnejad, L.Codeca, W. Bronzi, et al. “A Car
Hacking
Experiment:
When
Connectivity
Meets
Vulnerability.” 2015 IEEE Globecom Workshops. 12.610.2015. Accessed 1.11.2017.
http://ieeexplore.ieee.org.pitt.idm.oclc.org/xpls/icp.jsp?arnu
mber=7413993&tag=1
[7] S. Kerner. “Researchers Demo How They Hacked a Jeep
Remotely.” eWeek. 8.6.2015. Accessed 1.10.2017.
http://web.b.ebscohost.com/ehost/detail/detail?sid=b665cd61
-33fb-4e37-8203a4c0b5859b14%40sessionmgr106&vid=1&hid=124&bdata=
JkF1dGhUeXBlPWlwLHVpZCZzY29wZT1zaXRl#AN=10
9363539&db=aph
[8] A. Greenberg. “Hackers Remotely Kill a Jeep on the
Highway—With Me in It.” Wired. 7.21.2015. Accessed
1.14.2016.
https://www.wired.com/2015/07/hackers-remotely-kill-jeephighway/
[9] S. Kerner. “Car Hackers Return to Black Hat to Reveal
New Flaws.” eWeek. 8.4.2016. Accessed 1.10.2017.
http://web.a.ebscohost.com/ehost/detail/detail?sid=39038cba
-a259-43c2-bcbc53810d22a1f7%40sessionmgr4007&vid=20&hid=4107&bd
ADDITIONAL SOURCES
W. Rash “Your New Car May Connect You to Greater
Cyber-Risk.” eWeek. 2.27.2016. Accessed 1.10.2017.
http://web.a.ebscohost.com/ehost/detail/detail?sid=198ec9b4
-5f70-4599-bc0b586f386b8fd4%40sessionmgr4008&vid=1&hid=4107&bdat
a=JkF1dGhUeXBlPWlwLHVpZCZzY29wZT1zaXRl#AN=
113449383&db=aph
ACKNOWLEDGEMENTS
We would like to extend our gratitude to our Freshman
Conference Chair Mr. Greg Wunderley for reviewing our
paper and sharing his advice. We would also like to thank
our Co-Chair Alyssa Srock for reviewing our progress and
keeping us on track, and our writing instructor, Professor
Prymus, for answering our questions and providing
constructive feedback. Kathleen would also like to thank her
parents, Eric and Kimberly Bracken, who have supported
her journey toward engineering by answering countless
questions about calculus, keeping her well-fed, and
proofreading this paper. Elizabeth would like to thank her
father Roger Rager for getting her interested in electrical
engineering, Carl Rager for showing her the ropes of power
engineering, and Matthew Rager for encouraging her to stick
with electrical engineering.
8