How Vulnerable is Your Car to Cyberattacks?

To view the full article via Michigan State University News, click here.

EAST LANSING, MI (12.18.2019) – The emergence of smart cars has opened the door to limitless possibilities for technology and innovation – but also to threats beyond the car itself. New research from Michigan State University is the first to apply criminal justice theory to smart vehicles, revealing cracks in the current system leading to potential cyber risks.

“Automotive cybersecurity is an area we don’t understand well in the social sciences. While there are groups of computer scientists and engineers digging into some of the issues, the social aspects are extremely relevant and under-examined,” said Thomas Holt, professor of criminal justice at MSU. “As the technology gets greater market share, it’s critical to get ahead of the curve before there are issues we can’t rein in.”

As vehicles become smarter and more connected to WiFi networks, hackers will have more opportunities to breach vehicle systems. Connecting your smartphone through a USB port can give a hacker backdoor access to data from both your phone and your car; additionally, Google Android users who can download apps from unverified sites are even more at-risk.

The research – published in the Journal of Crime and Justice – applied Routine Activities Theory, used a popular criminal justice framework, to current forms of vehicle security and provided recommendations for manufacturers and owners to improve safety.

Thomas Holt, professor in the School of Criminal Justice, focuses his research on computer hacking, malware and the role of the internet in facilitating all manner of crime and deviance.

“The risk with vehicles isn’t just personal data – though that is still a real concern,” Holt said. “Say the car is compromised and a hacker alters certain alert systems that tell a driver when tire pressure is low or so the emergency brake sensory systems don’t kick in. That could lead to loss of life.”

The theory Holt applied says that in order for a criminal to act three things need to come together: a motivated offender, a suitable target and a lack of guardian. In the context of vehicle security, he said that motivators and targets are clear, but the presence of a guardian was where vehicles fell short.

“Where we found holes was surprising: there’s no one technically responsible for these vehicles’ central computer systems,” Holt said. “The automotive and equipment manufacturers need to recognize that as it stands, they serve as the guardians in the space, and the onus is on them. They need to take the lead in thinking more critically about data flows, software vendors and how to communicate security with dealerships

To view the full article via Michigan State University News, click here.

See the original paper for details:
https://www.tandfonline.com/doi/abs/10.1080/0735648X.2019.1692425