Please follow and like us:

Last year, hackers competed to exploit the connected parts of a Tesla Model S to win $10,000. Researchers from Chinese security, search and app store giant Qihoo 360 won. But that competition was not exactly Tesla-approved.

Later this year, however, at the Defcon convention in Las Vegas, Tesla plans to open one of Elon Musk’s sleek electric cars to the hacker attendees, allowing them to tinker with any piece of the vehicle they like, according to sources, who wished to remain anonymous. The benefits for Tesla will be twofold: they will be made aware of any bugs in the vehicle and of any hackers who are worth hiring. At Defcon last year, Tesla scouts were on the prowl, finding plenty of talent whilst meandering the halls of the Rio Hotel & Casino.

Tesla had not responded to questions on what stage the plans were at or what model would be up for testing.

There will be a good deal of focus on digital security in cars at Defcon and BlackHat 2015, another conference that takes place days earlier in Las Vegas. Perennial automotive mischief-makers (and helpful hackers) Chris Valasek and Charlie Miller have promised to show off a car hack, which will remotely exploit the Control Area Network (CAN) of an automobile – something that’s only been done a handful of times in recent memory.

The blurb for their talk reads: “Although the hacking of automobiles is a topic often discussed, details regarding successful attacks, if ever made public, are non-comprehensive at best. The ambiguous nature of automotive security leads to narratives that are polar opposites: either we’re all going to die or our cars are perfectly safe. In this talk, we will show the reality of car hacking by demonstrating exactly how a remote attack works against an unaltered, factory vehicle.

“Starting with remote exploitation, we will show how to pivot through different pieces of the vehicle’s hardware in order to be able to send messages on the CAN bus to critical electronic control units. We will conclude by showing several CAN messages that affect physical systems of the vehicle. By chaining these elements together, we will demonstrate the reality and limitations of remote car attacks.”

Though Valasek declined to offer more on what was going to be revealed at the talk, the following tweets hint at what vehicle will be targeted and just what the pair will achieve through their attacks:

With a range of open source car hacking tools, from CANard to CANCat, hitting the web in recent months, and scores of researchers trying to expose flaws in vehicles, the security of modern cars is under intense scrutiny. That’s why groups like I Am The Cavalry have emerged, pressuring lawmakers and manufacturers to spur on the betterment of cars’ protections from malicious hackers before something cataclysmic happens.

Some on Capitol Hill are listening, including Senator Markey, who, after requesting more information from manufacturers on their security efforts, claimed many were failing to protect drivers adequately and were leaking private data too.

A handful of car makers have responded too. The likes of Tesla, BMW and GM, which is currently on a recruiting drive, with jobs such as vehicle cybersecurity testing engineer on offer, have set up initiatives to drive better security. But many continue to ignore the problem, hence the hacker drive to push them towards safer practices.

http://www.forbes.com/sites/thomasbrewster/2015/04/28/tesla-opening-car-to-hackers/