Hacker coalition sets out to improve critical device security, challenges car makers

The group aims to improve cyber security of medical, automotive, home electronics, and public infrastructure systems

A collective of security researchers issued a letter Friday from the DefCon hacker conference in Las Vegas urging the automotive industry to adopt five principles for building safer computer systems in vehicles.

The group is operating under the name I Am the Cavalary and includes researchers and others concerned about the security of devices that have a direct impact on public safety. Over the last few years, a growing number of security researchers have investigated potential vulnerabilities in the electronic devices built into modern cars to control everything from entertainment systems to critical safety functions like brakes, steering and lights.

As automakers rush to build wireless functionality in some car systems to connect them with mobile phones and the larger Internet, there are increasing concerns that potential vulnerabilities combined with a lack of segmentation of internal car networks could open up attack vectors that expose vehicles to remote hacking, endangering driver safety.

At the Black Hat security conference Wednesday, researchers Charlie Miller and Chris Valasek presented an analysis of wireless attack surfaces in 24 car models from different manufacturers. They ranked the 2014 models of the Infiniti Q50 and Jeep Cherokee and the 2015 model of the Cadillac Escalade as the most hackable cars.

In its open letter to the auto industry, the I Am the Cavalry group urged car makers to build computer systems with security considerations in mind based on the principle of safety by design.

Vehicle computer networks should use isolation and segmentation mechanisms to ensure that non-critical systems cannot impact the performance of critical systems, the group said.

This segmentation should be physical rather than through logical controls, as past security research has shown that logical isolation can often be bypassed, said Joshua Corman, chief technology officer at Sonatype and co-founder of I Am The Cavalry.

Car makers should also make sure that they can easily deploy security updates for computer systems if needed without requiring car recalls, the research group said in its letter. Finally, in case something does go wrong and a forensic investigation is required, car systems should have logging features that preserve evidence.

Automakers should encourage third-party collaboration by publishing clear vulnerability disclosure policies for security researchers to follow. Tesla Motors is one company that has already done this, but others should follow suit, the group said.

Members of I Am the Cavalry aim to provide their technical expertise to various industries and legislators as a public service, but they also invite participation from the public itself. The group's open letter to the automotive industry was also published as a petition on Change.org.

The group is not only focused on the safety of car computer systems and is actually interested in three other groups of devices that can impact human life: medical devices including implantable, diagnostic, imaging and radiological ones; home devices like consumer electronics, alarm systems, door and garage locks, thermostats and heating and ventilation systems; and public infrastructure systems like those used in aircraft, public transportation, power and electricity, aviation, traffic monitoring, utility services and waste and sewage.

During a talk at DefCon Saturday, I Am the Cavelry co-founders Joshua Corman and Nicholas Percoco, the vice president for strategic services at Rapid7, will provide an overview of the group's first year of activity and the strategies it has built to advance its public safety goals.

"This initiative is not only about finding bugs," Corman said. It's about building relationships between researchers, industry and government, which is much harder, he said.

Join the CSO newsletter!

Error: Please check your email address.

Tags Rapid7securitySonatype

More about CherokeeEscaladeRapid7

Show Comments

Featured Whitepapers

Editor's Recommendations

Solution Centres

Stories by Lucian Constantin

Latest Videos

  • 150x50

    CSO Webinar: Will your data protection strategy be enough when disaster strikes?

    Speakers: - Paul O’Connor, Engagement leader - Performance Audit Group, Victorian Auditor-General’s Office (VAGO) - Nigel Phair, Managing Director, Centre for Internet Safety - Joshua Stenhouse, Technical Evangelist, Zerto - Anthony Caruana, CSO MC & Moderator

    Play Video

  • 150x50

    CSO Webinar: The Human Factor - Your people are your biggest security weakness

    ​Speakers: David Lacey, Researcher and former CISO Royal Mail David Turner - Global Risk Management Expert Mark Guntrip - Group Manager, Email Protection, Proofpoint

    Play Video

  • 150x50

    CSO Webinar: Current ransomware defences are failing – but machine learning can drive a more proactive solution

    Speakers • Ty Miller, Director, Threat Intelligence • Mark Gregory, Leader, Network Engineering Research Group, RMIT • Jeff Lanza, Retired FBI Agent (USA) • Andy Solterbeck, VP Asia Pacific, Cylance • David Braue, CSO MC/Moderator What to expect: ​Hear from industry experts on the local and global ransomware threat landscape. Explore a new approach to dealing with ransomware using machine-learning techniques and by thinking about the problem in a fundamentally different way. Apply techniques for gathering insight into ransomware behaviour and find out what elements must go into a truly effective ransomware defence. Get a first-hand look at how ransomware actually works in practice, and how machine-learning techniques can pick up on its activities long before your employees do.

    Play Video

  • 150x50

    CSO Webinar: Get real about metadata to avoid a false sense of security

    Speakers: • Anthony Caruana – CSO MC and moderator • Ian Farquhar, Worldwide Virtual Security Team Lead, Gigamon • John Lindsay, Former CTO, iiNet • Skeeve Stevens, Futurist, Future Sumo • David Vaile - Vice chair of APF, Co-Convenor of the Cyberspace Law And Policy Community, UNSW Law Faculty This webinar covers: - A 101 on metadata - what it is and how to use it - Insight into a typical attack, what happens and what we would find when looking into the metadata - How to collect metadata, use this to detect attacks and get greater insight into how you can use this to protect your organisation - Learn how much raw data and metadata to retain and how long for - Get a reality check on how you're using your metadata and if this is enough to secure your organisation

    Play Video

  • 150x50

    CSO Webinar: How banking trojans work and how you can stop them

    CSO Webinar: How banking trojans work and how you can stop them Featuring: • John Baird, Director of Global Technology Production, Deutsche Bank • Samantha Macleod, GM Cyber Security, ME Bank • Sherrod DeGrippo, Director of Emerging Threats, Proofpoint (USA)

    Play Video

More videos

Blog Posts

Market Place