Sign up for our daily briefing
Make your busy days simpler with Axios AM/PM. Catch up on what's new and why it matters in just 5 minutes.
Catch up on the day's biggest business stories
Subscribe to Axios Closer for insights into the day’s business news and trends and why they matter
Stay on top of the latest market trends
Subscribe to Axios Markets for the latest market trends and economic insights. Sign up for free.
Sports news worthy of your time
Binge on the stats and stories that drive the sports world with Axios Sports. Sign up for free.
Tech news worthy of your time
Get our smart take on technology from the Valley and D.C. with Axios Login. Sign up for free.
Get the inside stories
Get an insider's guide to the new White House with Axios Sneak Peek. Sign up for free.
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Catch up on coronavirus stories and special reports, curated by Mike Allen everyday
Want a daily digest of the top Denver news?
Get a daily digest of the most important stories affecting your hometown with Axios Denver
Want a daily digest of the top Des Moines news?
Get a daily digest of the most important stories affecting your hometown with Axios Des Moines
Want a daily digest of the top Twin Cities news?
Get a daily digest of the most important stories affecting your hometown with Axios Twin Cities
Want a daily digest of the top Tampa Bay news?
Get a daily digest of the most important stories affecting your hometown with Axios Tampa Bay
Want a daily digest of the top Charlotte news?
Get a daily digest of the most important stories affecting your hometown with Axios Charlotte
Illustration: Aïda Amer/Axios
Recent hacks of connected vehicles can teach AV developers how to design cybersecurity measures that are cued by anomalies in vehicle behavior.
Why it matters: Today's connected vehicles lack adequate security systems, and autonomous vehicles will have far more vulnerabilities, raising the stakes even higher.
Background: Some current vehicles have anti-malware systems adapted from the IT world, but those are not in wide use and are not robust enough to fully protect connected vehicles, let alone AVs.
- Hackers have compromised a vehicle's onboard computer using its tire pressure monitor sensor and via SMS messages sent over 4G networks.
- They have assumed varying degrees of control over connected vehicles using Wi-Fi connections as well, including steering and braking systems, and via over-the-air updates and onboard diagnostic ports.
AV systems are more multifaceted, creating new vulnerabilities, particularly with vehicle-to-everything connectivity in place. They also have more sensors; when sensor data is uploaded to servers, that creates another point of vulnerability.
What's needed: So far, manufacturers have responded by issuing security updates for vehicles — but a proactive system that can anticipate and prevent attacks will be imperative for AV safety. One strategy — being explored by companies like SafeRide Technologies, Vectra, PerimeterX, and ExtraHop — is to examine malware behavior.
- A behavior-based security system could be triggered by behavior anomalies, rather than detecting a malware's signature. Triggers could include an upload to a sensor server with fewer or more bytes than typically expected or superfluous computer activity registered by the engine control unit.
- This system could work regardless of the attack type or vulnerability targeted, which is critical given that hackers can mutate code endlessly.
What to watch: Behavior-based security systems must have the capability to learn vehicle behavior independently, without dependency on every software or hardware vendor, and regardless of data formats. Since that would require computing power that only advanced, high-end vehicles have onboard, most cars would need to rely on network bandwidth to run the detection program on the cloud.
Yossi Vardi is the CEO of SafeRide Technologies, an automotive cybersecurity startup.