Automotive Hacking

gauravhtandon1 5,396 views 143 slides Jan 19, 2020
Slide 1
Slide 1 of 143
Slide 1
1
Slide 2
2
Slide 3
3
Slide 4
4
Slide 5
5
Slide 6
6
Slide 7
7
Slide 8
8
Slide 9
9
Slide 10
10
Slide 11
11
Slide 12
12
Slide 13
13
Slide 14
14
Slide 15
15
Slide 16
16
Slide 17
17
Slide 18
18
Slide 19
19
Slide 20
20
Slide 21
21
Slide 22
22
Slide 23
23
Slide 24
24
Slide 25
25
Slide 26
26
Slide 27
27
Slide 28
28
Slide 29
29
Slide 30
30
Slide 31
31
Slide 32
32
Slide 33
33
Slide 34
34
Slide 35
35
Slide 36
36
Slide 37
37
Slide 38
38
Slide 39
39
Slide 40
40
Slide 41
41
Slide 42
42
Slide 43
43
Slide 44
44
Slide 45
45
Slide 46
46
Slide 47
47
Slide 48
48
Slide 49
49
Slide 50
50
Slide 51
51
Slide 52
52
Slide 53
53
Slide 54
54
Slide 55
55
Slide 56
56
Slide 57
57
Slide 58
58
Slide 59
59
Slide 60
60
Slide 61
61
Slide 62
62
Slide 63
63
Slide 64
64
Slide 65
65
Slide 66
66
Slide 67
67
Slide 68
68
Slide 69
69
Slide 70
70
Slide 71
71
Slide 72
72
Slide 73
73
Slide 74
74
Slide 75
75
Slide 76
76
Slide 77
77
Slide 78
78
Slide 79
79
Slide 80
80
Slide 81
81
Slide 82
82
Slide 83
83
Slide 84
84
Slide 85
85
Slide 86
86
Slide 87
87
Slide 88
88
Slide 89
89
Slide 90
90
Slide 91
91
Slide 92
92
Slide 93
93
Slide 94
94
Slide 95
95
Slide 96
96
Slide 97
97
Slide 98
98
Slide 99
99
Slide 100
100
Slide 101
101
Slide 102
102
Slide 103
103
Slide 104
104
Slide 105
105
Slide 106
106
Slide 107
107
Slide 108
108
Slide 109
109
Slide 110
110
Slide 111
111
Slide 112
112
Slide 113
113
Slide 114
114
Slide 115
115
Slide 116
116
Slide 117
117
Slide 118
118
Slide 119
119
Slide 120
120
Slide 121
121
Slide 122
122
Slide 123
123
Slide 124
124
Slide 125
125
Slide 126
126
Slide 127
127
Slide 128
128
Slide 129
129
Slide 130
130
Slide 131
131
Slide 132
132
Slide 133
133
Slide 134
134
Slide 135
135
Slide 136
136
Slide 137
137
Slide 138
138
Slide 139
139
Slide 140
140
Slide 141
141
Slide 142
142
Slide 143
143

About This Presentation

Under The Hood: How Hackers Can Remotely Hack Your Car?


Slide Content

Automotive Hacking Under The Hood: How Hackers Can Remotely Hack Your Car?

Automotive Hacking Under The Hood: How Hackers Can Remotely Hack Your Car?

Cyber criminals working for enemy states could ‘kill millions’ by remotely hacking cars, warns expert Justin Cappos , Computer Scientist New York University

Vehicular Automation Vehicular Automation involves the use of mechatronics, artificial intelligence, and multi-agent system to assist a vehicle's operator. These features and the vehicles employing them may be labelled as intelligent or smart . A vehicle using automation for difficult tasks, especially navigation, may be referred to as semi-autonomous . A vehicle relying solely on automation is consequently referred to as robotic or autonomous.

Vehicular Automation

Vehicular Automation

Autonomy levels Autonomy in vehicles is often categorized in six levels: The level system was developed by the Society of Automotive Engineers (SAE). Level 0: No automation. Level 1: Driver assistance - The vehicle can control either steering or speed autonomously in specific circumstances to assist the driver. Level 2: Partial automation - The vehicle can control both steering and speed autonomously in specific circumstances to assist the driver. Level 3: Conditional automation - The vehicle can control both steering and speed autonomously under normal environmental conditions, but requires driver oversight. Level 4: High automation - The vehicle can complete a travel autonomously under normal environmental conditions, not requiring driver oversight. Level 5: Full autonomy - The vehicle can complete a travel autonomously in any environmental conditions.

Autonomy levels

Vehicle Automation Vehicle automation has been one of the fundamental applications within the field of intelligent transportation systems ( ITS) since the start of ITS research in the mid-1980s. For most of this time, it has been generally viewed as a futuristic concept that is not close to being ready for deployment. However , recent development of “self-driving” cars and the announcement by car manufacturers of their deployment by 2020 show that this is becoming a reality.

Vehicle Automation

Automotive Hacking Automotive hacking is the exploitation of vulnerabilities within the software, hardware, and communication systems of automobiles.

Automotive Hacking Modern automobiles contain hundreds of on-board computers processing everything from vehicle controls to the infotainment system.

Automotive Hacking

Automotive Hacking These computers, called Electronic control units (ECU), communicate with each other through multiple networks and communication protocols including the Controller Area Network (CAN) for vehicle component communication such as connections between engine and brake control ; Local Interconnect Network (LIN).

Electronic control units (ECU)

Electronic control units (ECU)

Automotive Hacking F or cheaper vehicle component communication such as between door locks and interior lights; Media Oriented Systems Transport (MOST) for infotainment systems such as modern touchscreen and telematics connections ; and FlexRay for high-speed vehicle component communications such as active suspension and active cruise control data synchronization.

Media Oriented Systems Transport (MOST)

Automotive Hacking Additional consumer communication systems are also integrated into automobile architectures including Bluetooth for wireless device connections , 4G Internet hotspots, and vehicle Wi-Fi.

Consumer Communication Systems

Automotive Hacking

Automotive Hacking The integration of these various communications and software systems leaves automobiles vulnerable to attack. Security researchers have begun demonstrating the multitude of potential attack vectors in modern vehicles , and some real-world exploits have resulted in manufacturers issuing vehicle recalls and software updates to mobile applications.

Automotive Hacking

Automotive Hacking Manufacturers, such as John Deere, have used computer systems and Digital Rights Management to prevent repairs by the vehicle owners, or by third parties , or the use of aftermarket parts. Such limitations have prompted efforts to circumvent these systems, and increased interest in measures such as Motor Vehicle Owners' Right to Repair Act.

Automotive Hacking

Automotive Hacking Any car built after 2005 is an 'open door' to hackers and could be remotely controlled to obliterate 'millions of civilians', a researcher has found. Even some vehicles up to 17 years old could be vulnerable to attack and unless car makers fix the problem deaths in the next five years are inevitable. Hackers may already be causing accidents without authorities knowing. 

Hackers may already be causing accidents without authorities knowing

Automotive Hacking The warning was made by Justin Cappos, a computer scientist at New York University. Dr Cappos says this vulnerability should be treated as an ‘urgent' national security issue’.

Justin Cappos, a computer scientist at New York University says this vulnerability should be treated as an ‘urgent' national security issue’.

Automotive Hacking Once in the car, Dr Cappos warned hackers can send messages that stop the brakes working and turn of power steering .

Automotive Hacking 'Components in cars are not good at understanding where messages come from and whether they are authentic.' In 2016 hackers showed how they were able to take control of a Jeep Cherokee when it was moving at high speed.

Automotive Hacking

Automotive Hacking Charlie Miller and Chris Valasek, who now work for Uber , sent false messages to its internal network, overriding the correct ones. That allowed them to do terrifying things such as making the vehicle turn sharply while it was speeding down a country road.

Automotive Hacking

Research In 2010 , security researchers demonstrated how they could create physical effects and undermine system controls by hacking the ECU. The researchers needed physical access to the ECU and were able to gain full control over any safety or automotive system including disabling the brakes and stopping the engine

hacking the ECU

Research In a follow-up research paper published in 2011, researchers demonstrated that physical access is not even necessary. The researchers showed that “remote exploitation is feasible via mechanics tools, CD players, Bluetooth, cellular radio...and wireless communication channels allow long distance vehicle control, location tracking, in-cabin audio exfiltration and theft”. This means that a hacker could gain access to a vehicle's vital control systems through almost anything that interfaces with the automobile's systems.

Remote Exploitation Is Feasible Via Mechanics Tools, CD Players, Bluetooth, Cellular Radio...And Wireless Communication Channels

Fiat Chrysler UConnect UConnect is Fiat Chrysler's Internet-connected feature which enables owners the ability to control the vehicle's infotainment/navigation system , sync media, and make phone calls. It even integrates with the optional on-board WiFi .

UConnect is Fiat Chrysler's Internet-connected feature which enables owners the ability to control the vehicle's infotainment/navigation system

Fiat Chrysler UConnect However, susceptibilities in Fiat Chrysler’s UConnect system, available on over 1.4 million cars, allows hackers to scan for cars with the system , connect and embed malicious code, and ultimately, commandeer vital vehicle controls like steering and brakes.

UConnect system

General Motors OnStar RemoteLink App The OnStar RemoteLink app allows users the ability to utilize OnStar capabilities from their Android or iOS smartphones . The RemoteLink app can locate, lock and unlock, and even start your vehicle.

General Motors OnStar RemoteLink App

General Motors OnStar RemoteLink App The flaw in General Motors’ OnStar RemoteLink app, while not as extreme as UConnect, allows hackers to impersonate the victim in the eyes of the RemoteLink app. This means that the hackers can access all of the features of the RemoteLink app available to the victim including locating, locking and unlocking, and starting the engine

H ackers can access all of the features of the RemoteLink app available to the victim including locating, locking and unlocking, and starting the engine

Keyless Entry The security researcher Samy Kamkar has demonstrated a device that intercepts signals from keyless-entry fobs and would allow an attacker to unlock doors and start a car's engine.

Security Researcher Samy Kamkar Has Demonstrated A Device That Intercepts Signals From Keyless-entry Fobs And Would Allow An Attacker To Unlock Doors And Start A Car's Engine

Case Study : Hackers Remotely Kill a Jeep on the Highway It was the summer of 2015, Andy Greenberg was driving a Jeep Cherokee in downtown St. Louis. The vents started blasting cold air at the maximum setting, the radio was blaring at full volume, and the windshield wipers turned on.

Case Study : Hackers Remotely Kill a Jeep on the Highway renowned hackers Charlie Miller and Chris Valasek describe how they compromised the Jeep Cherokee via a vulnerability in Uconnect , the vehicle's Internet-connected entertainment system.

Case Study : Hackers Remotely Kill a Jeep on the Highway

Case Study : Hackers Remotely Kill a Jeep on the Highway The flaw in Uconnect lets anyone with the car's IP address to gain access from anywhere in the country. Miller and Valasek were then able to send commands to the engine and wheels through the car's internal Controller Area Network (CAN).

Case Study : Hackers Remotely Kill a Jeep on the Highway

Case Study : Your Car Could Be the Next Ransomware Target Cybersecurity experts say there are plenty of vulnerabilities for enterprising ransom-seeking hackers, unless automakers act

Case Study: Your Car Could Be the Next Ransomware Target The reason cars are such inviting targets for ransomware hackers is that they’re increasingly computerized. And as automakers have transferred more and more functions to processors, they've neglected to install the same levels of security found in other modern device ssuch as phones and laptops. 

Case Study : Your Car Could Be the Next Ransomware Target

Case Study: Your Car Could Be the Next Ransomware Target “Once you connect the car to the internet, the entire vehicle becomes a threat surface. If the auto industry doesn’t adapt, we’ll continue to see mistakes and potential vulnerabilities for things like ransomware to take place,”  says Craig Hurst, executive director of the Future of Automotive Security Technology Research (FASTR)

Case Study : Your Car Could Be the Next Ransomware Target

Case Study: Your Car Could Be the Next Ransomware Target The FBI issued a warning last year for the auto industry to be ever-vigilant about developing cybersecurity as autonomous technology advances and as cars become ever-more connected. And multiple academic and industry consortiums and partnerships, as well as for-profit corporations, are working on the concern. One possible scenario involves hackers installing malware into a vehicle's operating system, perhaps through an unprotected internet connection, and locking out the driving functions.

Case Study: Your Car Could Be the Next Ransomware Target A driver might find his or her car unable to start. A message pops on the control screen with instructions for how to pay a ransom to make the vehicle start again. “Cars are becoming computers on wheels ,” says Jake Fisher, director of automotive testing at Consumer Reports. “As the technologies are added, manufacturers will have to consider all the possibilities. We support the new technology, we’re just making sure that it is added in a responsible way.”

Case Study: Your Car Could Be the Next Ransomware Target

Ransomware, in general, is a growing criminal concern because the attacks have been effective and relatively easy to launch

FBI issued a warning against threats related to connected vehicle technologies in modern vehicles

Attacker Model T he types of attackers that are likely to be present in an automated vehicle system Internal Versus External: The internal attacker is an authenticated member of the network that can communicate with other members. The external attacker is considered by the network members as an intruder and, hence, is limited in the diversity of attacks. Nevertheless , she/he can eavesdrop on the communication

Internal Versus External

Attacker Model Malicious Versus Rational: A malicious attacker seeks no personal benefits from the attacks, and aims to harm the members or the functionality of the network. Hence , she/he may employ any means disregarding corresponding costs and consequences. On the contrary, a rational attacker seeks personal profit and, hence, is more predictable in terms of attack means and attack target.

Malicious Versus Rational

Attacker Model Active Versus Passive: An active attacker can generate pack ets or signals to perform the attack , whereas a passive attacker only eavesdrops on the communication channel (i.e., wireless or in-vehicle wired network ). Local Versus Extended: An attacker can be limited in scope, even if she/he controls several entities (vehicles or base stations ), which make him/her local. An extended attacker controls several entities that are scattered across the network, thus extending his/her scope.

Active Versus Passive

Attacker Model Intentional Versus Unintentional: An intentional attacker generates attacks on purpose , whereas an unintentional attack is a cyber incident that could be generated by faulty sensors or equipments .

9 Terrifying Ways Hackers Can Control Your Car C yber security researchers Charlie Miller of Twitter and Chris Valasek of IOActive used the latest hacking techniques to hack in to the electrical systems of a Jeep Cherokee. They were able to do this without direct physical access to the vehicle.

9 Terrifying Ways Hackers Can Control Your Car Using the Internet they were able to gain wireless control of the Jeep Cherokee giving them access to the Jeep’s entertainment system, enabling them to relay commands to its dashboard functions, steering, brakes and transmission, and they were able to do all of this remotely 10 miles away from the vehicle's location.

9 Terrifying Ways Hackers Can Control Your Car! Finding any car via GPS coordinates Because Uconnect computers are linked to the Internet via Sprint’s mobile network, hackers can use a Sprint mobile device as a Wi-Fi hot spot , along with a laptop, to scan for possible vulnerable targets on the Internet. Once an appropriate target has been found, they are then able to retrieve information about that vehicle, such as its vehicle identification number, make, model, IP address, and most scarily, its GPS coordinates. Once the hacker has the GPS coordinates of the target vehicle, they can then input this data into Google Maps and track its general location by placing markers onto the map as the vehicle travels.

Sprint Drive: the all-in-one vehicle hotspot, tracker.

Finding any car via GPS coordinates

9 Terrifying Ways Hackers Can Control Your Car! Turning on your car Stereo system remotely Imagine you found yourself driving down the motorway at night alone when suddenly the radio switched on at full volume , seemingly changing stations with you unable to control it or switch it off, I think you’d be forgiven for thinking you were about to be abducted by aliens, but this is one of the many ways that hackers can manipulate your vehicle via this exploit. Apart from the obvious distraction issues, these types of attacks could be used to harass and intimidate people and when you are not aware of who is controlling the radio this could becomes quite frightening for some people.

Turning on your car Stereo system remotely

9 Terrifying Ways Hackers Can Control Your Car! Hacking Car Air Conditioning System While not the most terrifying aspect of this hack, it’s also possible to control the vehicles air-conditioning system by remotely pumping air at full blast in to the target vehicle. Again, this would be something of a distraction to drivers, especially when travelling at high speed. This may not seem all that scary but imagine driving on a very cold winters day, early in the morning and being blasted by cold air with no ability to stop it.

Hacking Car Air Conditioning System

9 Terrifying Ways Hackers Can Control Your Car! Hacking Car Control System It’s a beautifully sunny day and your travelling at 70mph down the motorway when suddenly your washer fluid starts to continuously spray your windscreen while your wipers swish from left to right uncontrollably at full speed. While struggling to see through your windscreen, all confused and a little jumpy, that’s when your transmission unexpectedly cuts out and your vehicle stops responding to your accelerator.

Hacking Car Control System

9 Terrifying Ways Hackers Can Control Your Car! As the vehicle begins to lose speed rapidly, you’re terrified to see in your rear view mirror cars, lorries and other motor vehicles beginning to rapidly pile up behind you , swerving and honking their horns when trying to avoid your sudden speed decrease. Well, using this vulnerability, this is exactly what could happen if a hacker gained control of your vehicle.

9 Terrifying Ways Hackers Can Control Your Car! Shut down you Car Engine While your vehicle is in motion, hackers also have the ability to completely and fully kill the engine. Leaving you unable to control your vehicle safely without restarting the engine. If this command was given at a critical moment during your journey, this could cause a dangerous incident. Imagine being on a busy motorway roundabout when this hack kicks in.

Shut down you Car Engine

9 Terrifying Ways Hackers Can Control Your Car! Hacking Car Brakes If you’re not already a little worried, then imagine a hacker being able to abruptly engage the breaks of your vehicle while you’re in motion? This is where things begin to get really dangerous. Having the ability to track a vehicle on the move and then suddenly engage the braking system is quite terrifying. Speeding down the motorway at 70mph when your brakes unexpectedly and violently kick in is an extremely dangerous prospect for you and other motorists.

Hacking Car Brakes

9 Terrifying Ways Hackers Can Control Your Car! Failing your Car Brakes This part of the hack is probably the scariest of the lot and it’s a horrifying thought that a compromised vehicle could have its brakes completely disabled by some anonymous hacker miles away in a remote location while the driver is helpless to stop it. This scenario is all too real though and Miller and Valasek have demonstrated this with chilling precision. Once the hacker has control of the system, there’s nothing to stop them causing a major incident.

Failing your Car Brakes

9 Terrifying Ways Hackers Can Control Your Car! Threatening the Car Driver through Display Screen Miller and Valasek have also been able to send images remotely to the in-car digital display. You can certainly see how this could be abused and cause issues for the occupants of the vehicle.

Threatening the Car Driver through Display Screen

9 Terrifying Ways Hackers Can Control Your Car! Hacking Car Steering System While travelling at slower speeds and only while reversing, the hack allows for the control of the vehicles steering. Even though this hack only works at slower speeds, this is still a dangerous prospect for both the occupants and pedestrians.

Hacking Car Steering System

9 Terrifying Ways Hackers Can Control Your Car! The list of commands a hacker can issue when in control of a compromised vehicle is not limited to those listed above. They are also able to manipulate digital readouts for speed and fuel consumption, honk the horn, query the vehicle for information and unlock it. As hacking techniques get more sophisticated and pervasive, and as vehicle systems become more integrated in to the ‘Internet of Things’, it doesn’t become difficult to imagine that future hacks could gain more and more control over a vehicles functions.

9 Terrifying Ways Hackers Can Control Your Car! Miller and Valasek aren’t the only ones working on pointing out these vulnerabilities. There has been other research conducted, such as that undertaken by researchers at the University of Washington and the University of California who were able to wirelessly disable locks and brakes on a Sedan. There’s even a ‘Car Hackers Handbook’ out there.

Car Hackers Handbook

Steps To Protect Your Car From Hacks

Steps To Protect Your Car From Hacks Keep in touch with your car’s manufacturer Update your car’s software Store your keyless remote in the fridge (or faraday bag) Turn off your car’s Bluetooth and Wi-Fi when not in use Hide your car’s Wi-Fi password Scan USB drives before plugging them into your car

Steps To Protect Your Car From Hacks Keep in touch with your car’s manufacturer Give your auto manufacturer your contact information so they can reach you about software updates or vehicle recalls if necessary. Or be proactive, and check the National Highway Traffic Safety Administration (NHTSA) recall page. Just enter your vehicle identification number (VIN) there to see if there’s been a recall for your vehicle.

Keep in touch with your car’s manufacturer

Steps To Protect Your Car From Hacks Update your car’s software Outdated software can contain bugs that hackers can exploit to steal your private data or take control of your car. So just as you’d check your computer for software updates, be sure to keep an eye out for notices from your auto manufacturer, and bring your car in for updates as soon as they’re available.

Update your car’s software

Steps To Protect Your Car From Hacks Store your keyless fob in the fridge Or get a faraday bag. Because in a matter of seconds, thieves can break into your car by amplifying the signal from your keyless remote and tricking the car into thinking you’re nearby. If Your Keyless Fob Is In A Faraday Bag (Or Your Refrigerator), Then Its Signal Will Be Blocked, Preventing Criminals From Hacking Open Your Car Doors.

Store your keyless fob in the fridge Or get a faraday bag

Steps To Protect Your Car From Hacks Turn off your car’s Bluetooth and Wi-Fi when not in use An open wireless connection could allow criminals to walk up to an unpatched car, connect to its entertainment system, and take control of one or more parts of the vehicle

Turn off your car’s Bluetooth and Wi-Fi when not in use

Steps To Protect Your Car From Hacks The FBI warns, “Vulnerabilities may exist within a vehicle’s wireless communication functions, within a mobile device – such as a cellular phone or tablet connected to the vehicle via USB, Bluetooth, or Wi-Fi – or within a third-party device connected through a vehicle diagnostic port. In these cases, it may be possible for an attacker to remotely exploit these vulnerabilities and gain access to the vehicle’s controller network or to data stored on the vehicle.” So if you’re not using your car’s Bluetooth or Wi-Fi, it’s best to switch them off.

Steps To Protect Your Car From Ha cks Hide your car’s Wi-Fi password This one’s simple. If your car has its own Wi-Fi, be sure to keep the password hidden. Leaving it in your glovebox could expose you to attack if your car is ever broken into.

Hide your car’s Wi-Fi password

Steps To Protect Your Car From Hacks Scan USB drives before plugging them into your car An infected USB drive could contain malicious code designed to compromise your car. So be sure to scan any USB drive before plugging it into your car.

Scan USB drives before plugging them into your car

Conclusion These types of attacks are only likely to get more varied and sophisticated and with some 470,000 plus estimated Crysler vehicles already vulnerable to these types of attack , not to mention the very real possibility of other manufacturers models also being vulnerable to similar exploits it’s extremely important that both the auto industry and customers take note. Crysler has issued a security patch which can be downloaded at their website by entering your Vehicle Identification Number (VIN) but this is a manual process that requires you to download the patch and update your Uconnect System via a USB drive. Alternatively, you can take your car to a dealer to get the update.

Cyber-attacks On Internet-connected Cars

Conclusion This type of patching requires that the customer be aware of the vulnerability though, which means that moving forward, the responsibility for updating the security of the vehicles electronic system lies with customers. There needs to be a better, more secure way of automating vehicle updates on these types of systems. In a hyper connected world, cyber attacks and cyber threats are an ever-growing concern for businesses and consumers alike and the research conducted by Miller and Valasek highlights the need for more individuals to be working in IT security jobs, specifically cyber security.

In a hyper connected world, cyber attacks and cyber threats are an ever-growing concern

Terminology Automation: The use of electronic or mechanical devices to replace human labor, in this case, to replace the human labor applied to driving a road vehicle.

Terminology Autonomous Automation: Vehicle automation based entirely on information acquired from sensors onboard the vehicle, without active communication or cooperation with other entities

Autonomous Automation

Terminology Cooperative Automation: Vehicle automation that incorporates information communicated from the roadway infrastructure or other vehicles and that may also involve active negotiation of manoeuvres with other vehicles.

Cooperative Automation

Terminology Dynamic Driving Task: All of the real-time functions required to operate a motor vehicle in on-road traffic • object and event detection, recognition, and classification; • object and event response; • real-time mission planning; • steering, turning, lane keeping, and lane changing; • acceleration and deceleration; • enhancing conspicuity (lighting, signaling, gesturing, etc .

Terminology Infrastructure sign: Road sign (static or dynamic) installed by road operator or government agencies to inform drivers.

Terminology Machine vision: Video image processing used for object detection (road, obstacles, road signs, etc.).

Terminology GPS: Global Positioning System used for localization and positioning on the integrated map. We assume that the vehicle includes multiple GPS 2 ( e.g., one GPS for navigation display and one for automation)

GPS: Global Positioning System

Terminology In-vehicle Devices: It includes hand-held devices brought by users. It can be connected to the infotainment system via Bluetooth, Wifi, Zigbee, or universal serial bus. This can represent an after-market device, a smartphone, or a tablet

In-vehicle Devices

Terminology Acoustic Sensor: Acoustic sensor that recognizes a trained/known signal. For example, a crash sound sensor detects a collision faster than an airbag sensor

Terminology Radar: Active system that uses return of microwave radiation ( radio waves) to detect objects. Lidar (light detection and ranging): Active system that uses return of infrared (IR) or visible light instead of radio waves to detect objects.

Radar

Lidar

Terminology In-vehicle sensors: Any on-board sensors that give information about the internal state of the vehicle ( rotational speed of a wheel, tire pressure, etc.). Odometric sensors: Wheel encoders and inertial sensors ( accelerometers, gyroscope, etc.) used for inertial odometric navigation .

In-vehicle sensors

Odometric sensors

Samy Kamkar American researcher A hacker made a $30 gadget that can unlock many cars that have keyless entry https://www.businessinsider.in/latest/a-hacker-made-a-30-gadget-that-can-unlock-many-cars-that-have-keyless-entry/articleshow/48377988.cms

Security Researchers Charlie Miller and Chris Valase k Chris Valasek and Charlie Miller: How to Secure Autonomous Vehicles https://threatpost.com/chris-valasek-and-charlie-miller-how-to-secure-autonomous-vehicles/134937/

Justin Cappos, Computer Scientist, New York University Cyber criminals working for enemy states could ‘kill millions’ by remotely hacking cars, warns expert https://engineering.nyu.edu/news/cyber-criminals-working-enemy-states-could-kill-millions-remotely-hacking-cars-warns-expert

Books: Hacking Connected Cars: Tactics, Techniques, and Procedures

The Car Hacker's Handbook

FBI, Motor Vehicles Increasingly Vulnerable to Remote Exploits Federal Bureau of Investigation, the Department of Transportation and the National Highway Traffic Safety Administration. https://www.ic3.gov/media/2016/160317.aspx

Policing in smart cities Bureau Of Police Research And Development https :// bprd.nic.in/WriteReadData/CMS/Policing%20in%20Smart%20Cities.pdf

References Automotive hacking https://en.wikipedia.org/wiki/Automotive_hacking Car hacking threatens vision of connected mobility https://www.ft.com/content/163f08c6-6ce3-11e9-9ff9-8c855179f1c4 Carhacked! (9 Terrifying Ways Hackers Can Control Your Car) https://purplegriffon.com/blog/carhacked-9-terrifying-ways-hackers-can-control-your-car Car Hacks and How to Protect Yourself https://www.kaspersky.com/resource-center/threats/car-hacks-and-how-to-protect-yourself Hackers Remotely Kill a Jeep on the Highway—With Me in It https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ How Hackers Exploit Automotive Software to Overtake Cars https://www.securitymagazine.com/articles/91192-how-hackers-exploit-automotive-software-to-overtake-cars Researchers are sounding the alarm on a little-known risk of connected cars https://www.fastcompany.com/90383517/researchers-are-sounding-the-alarm-on-a-little-known-risk-of-connected-cars

Thanks…
Tags