Thanks. Yes, I am aware of it, and I am on it. From what I understand, these two "hackers" managed to take over the control of Prius with a laptop and a gamepad. The inspiration of their hacking also comes from the original tech paper -- Univ. of Washington, etc. -- mentioned in this story.
I caught a passing news clip as I passed through the Atlanta airport this evening suggesting that hackers at the Black Hat / Defcon conference in Las Vegas did demonstrate ways to take over critical car controls. Are details forthcoming from EETimes?
Every article, interview (and many of the engineer user comments on them) you have done in the last month has me more and more concerned about the direction auto control systems (and for that matter every single control system that is quickly moving to a networked, software primary controlled with some old school electronics stuff to keep those hardware folks quiet) architectures are going.
To your quandary at the end of your article and comment, yes it is shameful and to throw down a gauntlet perhaps criminal that more is not being done to create architectures that will minimize the possibilities of problems all the way up to catastrophes.
What concerns me in this article are two things, first this not unique to this gentleman's opinion of 'if I have not seen it, it is never happened':
"At this moment, no tragic automotive accident caused by external attacks has happened yet, he explained." quote from your article by I believe Martin Klimke.
And second, the believe by hardware security people that installing code execution systems that will only run vetted software will 'solve' the hackability of the macro-system.
I am not an expert in any way on TPM, but what I do know is I have owned computers and notebooks that have contained these TPM modules for as I remember at least 15 years and have patched the BIOS, firmware and Windows OS on what seems like a daily basis to address active exploits that none of which to my memory overrode the TPM security but disabled the functions of the computer or extracted data from the computer. So explain to me what TPM did to solve this? And how these similar modules will better protect vehicle systems with them?
A July 17th New Scientist article "$25 gadget lets hackers seize control of a car" (http://www.newscientist.com/article/mg21929266.500-25-gadget-lets-hackers-seize-control-of-a-car.html#.UevjztI3t8E) claims that an inexpensive device can be used to remotely seize control of some critical car controls. The device is scheduled to be shown at the Black Hat Security conference in Las Vegas on July 27th. It will be interesting to see what unfolds.
DrQuine: The notion that auto companies would become involved in solving problems seems awfully far-fetched to me on a day when the city of Detroit was forced to declare bankruptcy. Who's to blame for that? Well, if the auto industry had acted far sooner to build better cars, it would have held onto its historic market share. But no. SUVs and trucks had higher profit margins, so that's the way it went. And a once-proud city was brought to its knees.
NASA's Orion Flight Software Production Systems Manager Darrel G. Raines joins Planet Analog Editor Steve Taranovich and Embedded.com Editor Max Maxfield to talk about embedded flight software used in Orion Spacecraft, part of NASA's Mars mission. Live radio show and live chat. Get your questions ready.
Brought to you by