Automobile Industry Gears Up For Cyber-Threat

car-hack.jpg

A year in the making, the automobile industry's new intelligence sharing and analysis center (ISAC) is now official and revving up to begin disseminating and exchanging cyber threat information later this year.

Heightened concerns over the safety of a rapidly emerging generation of networked vehicles initially led the Alliance of Automobile Manufacturers and the Association of Global Automakers to first begin mulling an ISAC in July of 2014, when they announced plans to address security weaknesses and vulnerabilities in vehicle automation and networking features that could put cars at risk of being hacked for sabotage or other purposes.
More than 60% of all new vehicles by 2016 are expected to be connected to the Internet, so the official launch of an automobile ISAC comes at a crucial time. Meanwhile, security researchers have been hacking away at networked cars to find bugs before the bad guys do, as the auto industry has remained relatively mum publicly on the topic of cybersecurity threats to their vehicles.
Officials from the Alliance of Automobile Manufacturers -- of which 12 major carmakers, such as BMW Group, Fiat Chrysler, Ford, General Motors, Mazda, and Toyota are members -- and the Association of Global Automakers -- which includes Honda, Nissan, Subaru, and others -- Booz Allen Hamilton, and SAE International, today announced that the auto industry's ISAC is now officially close to going live. Word of the ISAC came in conjunction with the 2015 SAE Battelle Cyber Auto Challenge in Detroit, where students work with automakers and government agencies on secure system design via hands-on cybersecurity activities.
Rob Strassburger, vice president of vehicle safety and harmonization for the Alliance of Automobile Manufacturers, said the ISAC will provide a central hub for cyber threat information and analysis, as well as vulnerabilities found in vehicles and their associated networks. "Automakers around the world will receive this information from the ISAC," he said.
The ISAC initially will not include suppliers from the auto industry, but it will extend to them as well as telecommunications and other technology providers as the ISAC matures, he said.
Meanwhile, the auto industry has been working on other cybersecurity initiatives aimed at locking down vehicle security and safety, according to Paul Scullion, safety manager with Association of Global Automakers. "An ISAC will bring insights on the threat landscape. Sharing of threats is just one piece," he said. Carmakers also are conducting research and development in "secure by design" features and functions, he said.
Several industry efforts also are underway, he noted: hackathons, a cybersecurity task force, and research with the National Institute of Standards and Technology (NIST), among other efforts, Scullion said. "OEMs are engaged with third-party security vendors and academia" to develop vehicle-specific technologies, he said.
Among the security technologies on the horizon for vehicles: enhanced network firewalls, software monitoring, and the ability to deny malicious traffic from bad guys to the car. "Privacy is another issue automakers are taking steps to address," Scullion said.
So just what type of intel would automakers share via the ISAC? Vulnerabilities and threats hitting them, for example, which of course likely will get anonymized. "Threat data could be nation-state, it could be a code vulnerability," said Jon Allen, principal for commercial solutions at Booz Allen Hamilton, the contractor who helped the auto industry set up the ISAC.
[Working group of federal agencies and private industry launched by the state of Virginia is studying car vulnerabilities and building tools to detect and protect against vehicle hacking and tampering. Read Hacking Virginia State Trooper Cruisers.]
Interestingly, the organizers of the ISAC have not contacted renowned car hacking researchers Charlie Miller and Chris Valasek for their input, according to Miller. Miller says he's glad to see the automotive industry addressing security issues, but it's difficult to tell just what progress they have made.
"I think they'll see at Black Hat/DEF CON this year that security researchers still have a lot to give of information to provide manufacturers," Miller says. "I'd really like to see more transparency about how automotive systems are designed to resist attack as well as how they detect and react to attacks. Right now it is possible, although I think unlikely, that manufacturers are doing a great job in this area in securing vehicles, but at this point there is no way for anyone outside of the industry to tell.  
"In my personal experience, it seems the auto industry has a ways to go in making automotive systems secure, resilient, and reactive to attacks," Miller says.
The challenge for automakers with their new ISAC will be both the trust factor among fierce competitors--true for nearly all ISACs when they first get up and running--and the fact that a vulnerability or threat may only affect a very specific make, model and year of a vehicle. Even so, the auto industry OEM ecosystem is such that most automakers use a lot of the same suppliers, so if the OEM products have bugs, so will many of the cars.
"Currently, every OEM has its own unique architecture and that will probably continue going forward. But with greater interconnection, that means by definition some greater commonality in features and functions on these networks," Strassburger said. "We're acting now to collect and share this [threat] information" and make it actionable, he said.
The chair of the Industrial Control Systems ISAC (ICS-ISAC), Chris Blask, says the "elephant in the room" for all information-sharing groups and ISACs today is the need for accepted standards in processes and policy for Intel-sharing. "There are massive gaps" in that piece of the puzzle for full Intel-sharing, Blask says.
Booz-Allen Hamilton's Allen noted that unlike other ISACs, the automobile ISAC is getting a jump-start on real attacks. "Many ISACs come after" their industries are hit with attacks, he said.
Dark Reading: http://ubm.io/1KtyNPu

 

« Hundreds of Thousands' of Vehicles At risk of Attack
Avoid Hiring a Cybercriminal: understand motivations & thoroughly vet employees »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Synovum

Synovum

Synovum was formed with the intention to provide high quality advice, consultancy, training and project management services to clients in all sectors of industry.

Dark Reading

Dark Reading

Dark Reading is the most trusted online community for security professionals.

CloudLayar

CloudLayar

CloudLayar is a cloud-based website firewall for protecting your website against online threats.

Sigma Payment Solutions

Sigma Payment Solutions

Sigma Payment Solutions offers a comprehensive suite of automated payment processing services, solutions, and technology to businesses in the USA.

ODVA

ODVA

ODVA is a global trade and standards development organization whose members comprise the world’s leading industrial automation companies.

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

Robert Bosch Centre for Cyber-Physical Systems (RBCCPS)

RBCCPS is an interdisciplinary research and academic centre within the Indian Institute of Science focused on research in cyber-physical systems.

Apricorn

Apricorn

Apricorn provides hardware-based 256-bit encrypted external storage products to companies and organizations that require high-level protection for their data at rest.

Skurio

Skurio

Skurio create cost-effective, intuitive and powerful Cloud based solutions to identify threats, detect data breaches outside the network and automate the response.

VU Security

VU Security

VU is a specialist in Cybersecurity software development with a focus on the prevention of fraud and identity theft.

Uhuru Corp

Uhuru Corp

Uhuru offers a wide variety of IoT products and solutions including enebular® IoT Orchestration Service.

astarios

astarios

astarios provide near-shore software development services including secure software development (DevSecOps), quality assurance and testing.

Evolution Equity Partners

Evolution Equity Partners

Evolution Equity Partners is an international venture capital investor partnering with exceptional entrepreneurs to develop market leading cyber-security and enterprise software companies.

FluidOne

FluidOne

FluidOne are an award-winning Connected Cloud Solutions provider. We design tailored solutions to help customers and partners digitally transform their IT and communications.

SPIE Switzerland

SPIE Switzerland

SPIE Switzerland AG, a subsidiary of the SPIE Group, is a Swiss full-service provider of ICT, multi-technical and integral facility services.

RKON

RKON

RKON Technologies provides managed IT and cybersecurity services to organizations across various industries, helping businesses mitigate risks and secure their digital infrastructures.

Xiphera

Xiphera

Xiphera designs and implements proven cryptographic security for embedded systems.