1 min read

White hackers to seek errors in open-source cybersecurity framework for cars

Luana PASCU

January 18, 2017

Ad One product to protect all your devices, without slowing them down.
Free 90-day trial
White hackers to seek errors in open-source cybersecurity framework for cars

Researchers from NYU Tandon, the University of Michigan Transport Research Institute (UMTRI), and the Southwest Research Institute (SwRI) have launched a challenge to all white hackers and security experts: find vulnerabilities before implementation of Uptane, the most recent open source cybersecurity framework for the automotive industry.

Uptane is “the first software update framework for automobiles that counters a comprehensive array of security attacks, and is resilient to partial compromises,” the paper reads. “It adds strategic features to the state-of-the-art software update framework, TUF, in order to address automotive specific vulnerabilities and limitations.”

The research group is led by Assistant Professor of Computer Science and Engineering Justin Cappos. In 2015, NYU received $14 million from the Department of Homeland Security”s Science and Technology Directorate to develop technology “that can help defend government and privately owned vehicles from cyberattacks.”

“Although widespread attacks are still difficult and expensive, they lie within the capabilities of nation-state cyber warriors, and it is time to begin securing the infrastructure, particularly as automotive electronics increase,” Cappos said.

This framework safeguards wireless updates in vehicles. The automotive industry is developing more complex cars to gain market share, but the software still has flaws. Although manufacturers implement a Software-over-the-Top update feature, hackers can still attack them with malware. A unique solution is required, because regular security software agents installed on PCs can”t safeguard cars, which have different causes for failure.

“Modern vehicles contain software with millions of lines of code that require periodic updates just like our computers and smart phones,” said Dr. Dan Massey, S&T CPSSEC Program Manager. “We must be able to safely and securely update the software in our devices, but updates are often inadequately protected. Cyberattacks on CPS in automobiles may have substantial costs, —potentially impacting millions of lives.

tags


Author



Right now

Top posts

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August Spam Debrief: Bitdefender Labs Warns of Fraud Campaigns Exploiting the Russia-Ukraine War

August 31, 2022

4 min read
Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

Snake Keylogger Returns in Malspam Campaign Disguised as Business Portfolio from IT Vendor

August 30, 2022

2 min read
What is medical identity theft and how to protect against it

What is medical identity theft and how to protect against it

July 27, 2022

2 min read
Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

Curious about Omegle? Here’s how the roulette-style chat platform can threaten your online privacy and security

July 07, 2022

5 min read
Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

Identifying and Dealing with Online Bullying Is Not Impossible - School Presentation Inside

June 28, 2022

2 min read
Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

Let’s Celebrate World Social Media Day by Improving Your Privacy and Security Online

June 28, 2022

3 min read

FOLLOW US ON

SOCIAL MEDIA


You might also like

Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths Prison for ex-eBay staff who aggressively cyberstalked company's critics with Craigslist sex party ads and funeral wreaths
Graham CLULEY

September 30, 2022

2 min read
Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials Honolulu Man Sabotaged Former Employer’s Network and Business Using Still-Active Credentials
Silviu STAHIE

September 30, 2022

1 min read
North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find North Korean Gang Uses Compromised Open Source Software to Distribute Malware, Researchers Find
Silviu STAHIE

September 30, 2022

1 min read