In an effort to keep DHS.gov current, the archive contains outdated information that may not reflect current policy or programs.
Most people are familiar with the process of updating the software on their computer and mobile phone, but cyber components—and cybersecurity—are not limited to computers and smart phones.
Today’s automobile is a smart device and is highly sophisticated. A modern car typically has more than 100 microprocessors, 50 electronic control units, and 100 million lines of software code. To put this sophistication in perspective, that’s 50 times more lines of code than the F-22 Raptor, one of the most high-tech military aircraft now in use.
Late model automobiles also are connected devices: Bluetooth links the car with cell phones, and many cars have built-in cellular communication and Wi-Fi capabilities. This connectivity enables remote start and many other features and will increase with the addition of smart infrastructure in which the road, signals and other components communicate with the vehicle and wider adoption of self-driving vehicles.
This technology and connectively also makes cars targets for hackers who potentially could compromise a vehicle’s control and safety systems. Features such as automatic braking and remote start would take on a very different character if they were under the control of a remote adversary.
While there never has been a confirmed malicious attack of an automobile, white-hat hackers have proven that automobiles are vulnerable to cyberattacks. Most white-hat hackers believe it’s not if, but when hackers will exploit cyber vulnerabilities to remotely access connected vehicles. It’s a scary possibility in which a cyber intrusion could target thousands of cars simultaneously, causing mayhem on the nation’s highways.
This reality has made cybersecurity a major concern for the auto industry as well as the government, including the S&T Cyber Security Division’s (CSD) Cyber Physical Systems Security (CPSSEC) project.
The CPSSEC program focuses include working collaboratively with automakers and leading researchers to increase vehicle cybersecurity, funding research projects to enhance auto cybersecurity, and helping to upgrade the federal government’s fleet of automobiles.
“The leaps we have made in automobile technology require solutions that ensure the cybersecurity and safety of this indispensable part of our lives,” said Dr. Daniel Massey, S&T’s CPSSEC program manager. “Our objective is to identify key cybersecurity challenges and find solutions that will reduce the risk of cyberattacks.”
Among its work is a joint research project with New York University (NYU), the University of Michigan Transportation Research Institute (UMTRI) and Southwest Research Institute (SwRI) to secure vehicle software updates. Like computers and cell phones, vehicle software requires updates to correct errors in safety-critical systems or remove vulnerabilities that could allow hackers to remotely affect vehicle systems.
The ability to update vehicle software is essential to both safety and security, but it also could be a key attack vector for adversaries. If attackers can gain access to the software update system, they can insert malicious code. Attackers have exploited flaws in the software update processes for traditional information technology systems (e.g., applications, operating systems) and cell phones to insert malware. This CPSSEC project works to ensure these flaws are not repeated in vehicle software updates.
The NYU, UMTRI, and SwRI teams have created a voluntary group that includes more than 40 leading automotive-related companies—from original equipment manufacturers and tier 1 suppliers to startup companies—with relevant vehicle technology. The team is making rapid progress on a design document and reference implementation that will help ensure vehicle software update systems are safe and secure.
Separately, an HRL Laboratories-led team is using a novel side-channels approach to improve vehicle cybersecurity both during updates and normal operations. Without modifying the vehicle, the observation “side channels” potentially can identify malicious behavior. For example, activity by the vehicle generates noise and heat. While attackers may modify code in a vehicle, they cannot prevent physical actions from generating noise or heat as a result of the code modification. If we understand the normal patterns of side channels, we potentially could identify and neutralize a hack.
DHS S&T also is working to secure the federal government’s large fleet of vehicles from cyber threats. Telematics systems, which are required in government vehicles by March 2017, track location, performance, and other behaviors and can improve management of the government’s vehicle fleet by reducing fuel costs, lowering carbon emissions, and identifying maintenance issues. However, if telematics are not implemented securely, an adversary could exploit these same benefits. We do not want an adversary to know the location of every government vehicle, so the race is on to ensure the government’s fleet is not cyber vulnerable.
This multi-front approach to address vehicle cybersecurity in the public and government sectors keeps the CPSSEC team busy. But it also puts them at the forefront of a very important mission that dovetails with the overall Department of Homeland Security mission: to secure the homeland.