![]() ![]() However, just a year later in 2011, Koscher and Checkoway et al. These attacks focus on firmware modification and CAN message injection, both requiring reverse engineering.ĭespite the 2010 paper featuring sophisticated attacks, the researchers required physical access to the vehicle, and so the attacks could be matched for example, by cutting the brake wires. The 2010 study demonstrated practically on two cars the security flaws which still exist today and form the basis of many automotive attacks. Prior to this study, other academic research in this field was largely theoretical. It took 30 years until the first comprehensive research into vehicle security was published in 2010, by Koscher and Checkoway et al. Vehicle hacking began almost as soon as ECUs entered the mainstream auto industry in the 1980s, with car enthusiasts seeking to tune their vehicles by modifying the ECU firmware. As part of my thesis on automotive hacking I reviewed a lot of literature and tried to piece together the history of this subject, leading to producing a ‘Brief history of automotive hacking’ - first in the form of a Twitter thread, now here.
0 Comments
Leave a Reply. |