Thursday, December 26, 2013

▶ Defcon 21 -Hacking Ford and Toyota ECU's on the CAN Bus

▶ Defcon 21 - Adventures in Automotive Networks and Control Units - YouTube


Published on Nov 16, 2013
Charlie Miller & Chris Valasek

August 1st--4th, 2013
Rio Hotel & Casino • Las Vegas, Nevada

DailyTech - Charlie Miller Releases Open Source "Car Sabotage Toolkit"
New how-to guide allows even layman hackers to carry out attacks similar to suspected government efforts

During a presentation at Def Con 21 last month, famed Apple, Inc. (AAPL) hacker Charlie Miller (who works at Twitter) and Chris Valasek, director of security intelligence at IOActive, revealed an interesting side project. The presentation showed how to affordably attack a vehicle's CAN bus with malicious messages, causing the vehicle to brake, refuse to break, or even steer into a wall.  The presentation shows how such attacks could be carried out -- even by relatively unskilled hackers.
 
Defcon hackers release Ford and Toyota car hijack data - IT News from V3.co.uk
Renowned hackers Charlie Miller and Chris Valasek have released tools capable of hijacking control of moving cars to the general public.

Miller and Valasek released the tools alongside a white paper explaining their research. The tools relate to the 2010 Toyota Prius and the 2010 Ford Escape and let hackers remotely take control of the cars' electronic smart steering, braking, acceleration, engines and lights.

Miller and Valasek originally showed off the attack with a live demonstration at the Defcon hacker conference at the start of August. The paper shows the specific processes required to hack various different electronic components to enact specific commands.

No comments: