http://www.informationweek.com/news/security/vulnerabilities/showArticle.jhtml?articleID=226700146&cid=nl_IW_daily_2010-08-13_h

The wireless systems that monitor tire pressure in modern cars can be spoofed 
remotely or even damaged, according to a team of Rutgers University and the 
University of South Carolina computer scientists. 
In particular, when driving two cars next to each other, the researchers could 
trigger a "low tire pressure" warning at 35 miles per hour, and a "check tire 
pressure" warning at 65 miles per hour. In addition, they found that at least 
one type of tire pressure system -- not disclosed -- "could be damaged through 
spoofed wireless signals." 

The researchers plan to present their in-car wireless network security and 
privacy vulnerability findings Thursday at the Usenix conference in Washington. 

"We have not heard of any security compromises to date, but it's our mission as 
privacy and security researchers to identify potential problems before they 
become widespread and serious," said Marco Gruteser, associate professor of 
electrical and computer engineering at Rutgers, in a statement. 


While in-car wireless networks are meant to be shielded, researchers could 
still eavesdrop on communications from 30 feet away using a simple antenna, and 
120 feet away when using an amplifier. In addition, according to their 
research, "reverse-engineering of the underlying protocols revealed static 
32-bit identifiers and that messages can be easily triggered remotely, which 
raises privacy concerns as vehicles can be tracked through these identifiers." 
The researchers studied two systems identified only as "commonly used in 
vehicles manufactured during the past three years" and found that neither 
performed authentication or input validation. As a result, the researchers were 
able to spoof the sensor messages. "We validated this experimentally by 
triggering tire pressure warning messages in a moving vehicle from a customized 
software radio attack platform located in a nearby vehicle," they said. 

What does it take to hack a car's wireless network? Try college-level 
engineering expertise and a few thousand dollars' worth of publicly available 
radio and computer equipment. The researchers also used their own cars. 

Spurred by the Firestone tire recall in the 2000, in 2003, the U.S. Department 
of Transportation began requiring a phase-in of tire pressure monitoring 
systems. By September 2007, all light vehicles -- 26,000 pounds or less -- sold 
in the United States contained either wired or wireless versions of such 
systems. 

According to Wade Trappe, an associate professor of electrical and computer 
engineering at Rutgers who worked on the project, "while we agree this 
technology is essential for driver safety, more can be done to improve 
security, such as using input validation or encryption."



--- StripMime Report -- processed MIME parts ---
multipart/alternative
  text/plain (text body -- kept)
  text/html
---

_______________________________________________
Post Messages to: [email protected]
Subscription Maintenance: http://leafe.com/mailman/listinfo/profox
OT-free version of this list: http://leafe.com/mailman/listinfo/profoxtech
Searchable Archive: http://leafe.com/archives/search/profox
This message: 
http://leafe.com/archives/byMID/profox/dcb07e692abe457ba5d786c91f51c...@dual
** All postings, unless explicitly stated otherwise, are the opinions of the 
author, and do not constitute legal or medical advice. This statement is added 
to the messages for those lawyers who are too stupid to see the obvious.

Reply via email to