{"id":5744,"date":"2018-10-17T13:34:12","date_gmt":"2018-10-17T17:34:12","guid":{"rendered":"http:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/?p=5744"},"modified":"2018-10-17T13:35:21","modified_gmt":"2018-10-17T17:35:21","slug":"5744","status":"publish","type":"post","link":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/2018\/10\/17\/5744\/","title":{"rendered":"CLEVER TOOL SHIELDS YOUR CAR FROM HACKS BY WATCHING ITS INTERNAL CLOCKS"},"content":{"rendered":"<p>In a paper they plan to present at the Usenix security conference next month, University of Michigan researchers Kyong-Tak Cho and Kang Shin describe an easy-to-assemble tool they call the Clock-based Intrusion Detection System, or CIDS. It&#8217;s designed to spot the malicious messages car hackers use to take control of vehicle components like brakes and transmission. The CIDS prototype uses a new technique to spot attack messages: It records the communications on a car&#8217;s internal network known as a CAN bus and\u2014in just seconds\u2014creates &#8220;fingerprints&#8221; for every digital component of a vehicle, the so-called Electronic Control Units or ECUs that allow everything from brakes to windshield wipers to communicate.<\/p>\n<p>To perform that fingerprinting, they use a weird characteristic of all computers: tiny timing errors known as &#8220;clock skew.&#8221; Taking advantage of the fact that those errors are different in every computer\u2014including every computer inside a car\u2014the researchers were able to assign a fingerprint to each ECU based on its specific clock skew. The CIDS&#8217; device then uses those fingerprints to differentiate between the ECUs, and to spot when one ECU impersonates another, like when a hacker corrupts the vehicle&#8217;s radio system to spoof messages that are meant to come from a brake pedal or steering system.<\/p>\n<p>That sort of impersonation is key to how white hat hackers previously managed to remotely mess with vehicles&#8217; brakes, transmission and steering systems.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.wired.com\/2016\/07\/clever-tool-shields-car-hacks-watching-internal-clocks\/\">https:\/\/www.wired.com\/2016\/07\/clever-tool-shields-car-hacks-watching-internal-clocks\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In a paper they plan to present at the Usenix security conference next month, University of Michigan researchers Kyong-Tak Cho and Kang Shin describe an easy-to-assemble tool they call the Clock-based Intrusion Detection System, or CIDS. It&#8217;s designed to spot the malicious messages car hackers use to take control of vehicle components like brakes and [&hellip;]<\/p>\n","protected":false},"author":20416,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[716352],"tags":[],"class_list":{"0":"post-5744","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-week-07-policy-documents-video","7":"entry"},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5744","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/users\/20416"}],"replies":[{"embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/comments?post=5744"}],"version-history":[{"count":2,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5744\/revisions"}],"predecessor-version":[{"id":5746,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/posts\/5744\/revisions\/5746"}],"wp:attachment":[{"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/media?parent=5744"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/categories?post=5744"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/community.mis.temple.edu\/mis5211sec001fall2018\/wp-json\/wp\/v2\/tags?post=5744"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}