Sign up for our daily briefing

Make your busy days simpler with Axios AM/PM. Catch up on what's new and why it matters in just 5 minutes.

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Catch up on coronavirus stories and special reports, curated by Mike Allen everyday

Catch up on coronavirus stories and special reports, curated by Mike Allen everyday

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Denver news in your inbox

Catch up on the most important stories affecting your hometown with Axios Denver

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Des Moines news in your inbox

Catch up on the most important stories affecting your hometown with Axios Des Moines

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Minneapolis-St. Paul news in your inbox

Catch up on the most important stories affecting your hometown with Axios Twin Cities

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Tampa Bay news in your inbox

Catch up on the most important stories affecting your hometown with Axios Tampa Bay

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Charlotte news in your inbox

Catch up on the most important stories affecting your hometown with Axios Charlotte

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Please enter a valid email.

Please enter a valid email.

Subscription failed
Thank you for subscribing!

Illustration: Aïda Amer/Axios

Recent hacks of connected vehicles can teach AV developers how to design cybersecurity measures that are cued by anomalies in vehicle behavior.

Why it matters: Today's connected vehicles lack adequate security systems, and autonomous vehicles will have far more vulnerabilities, raising the stakes even higher.

Background: Some current vehicles have anti-malware systems adapted from the IT world, but those are not in wide use and are not robust enough to fully protect connected vehicles, let alone AVs.

  • Hackers have compromised a vehicle's onboard computer using its tire pressure monitor sensor and via SMS messages sent over 4G networks.
  • They have assumed varying degrees of control over connected vehicles using Wi-Fi connections as well, including steering and braking systems, and via over-the-air updates and onboard diagnostic ports.

AV systems are more multifaceted, creating new vulnerabilities, particularly with vehicle-to-everything connectivity in place. They also have more sensors; when sensor data is uploaded to servers, that creates another point of vulnerability.

What's needed: So far, manufacturers have responded by issuing security updates for vehicles — but a proactive system that can anticipate and prevent attacks will be imperative for AV safety. One strategy — being explored by companies like SafeRide Technologies, Vectra, PerimeterX, and ExtraHop — is to examine malware behavior.

  • A behavior-based security system could be triggered by behavior anomalies, rather than detecting a malware's signature. Triggers could include an upload to a sensor server with fewer or more bytes than typically expected or superfluous computer activity registered by the engine control unit.
  • This system could work regardless of the attack type or vulnerability targeted, which is critical given that hackers can mutate code endlessly.

What to watch: Behavior-based security systems must have the capability to learn vehicle behavior independently, without dependency on every software or hardware vendor, and regardless of data formats. Since that would require computing power that only advanced, high-end vehicles have onboard, most cars would need to rely on network bandwidth to run the detection program on the cloud.

Yossi Vardi is the CEO of SafeRide Technologies, an automotive cybersecurity startup.

Go deeper

3 hours ago - Politics & Policy

Kellyanne Conway's parting power pointers

Kellyanne Conway addresses the 2020 Republican National Convention. Photo: Nicholas Kamm/AFP via Getty Images

Kellyanne Conway has seen power exercised as a pollster, campaign manager and senior counselor to President Trump. Now that his term in office has concluded, she shared her thoughts with Axios.

Why it matters: If there's a currency in this town, it's power, so we've asked several former Washington power brokers to share their best advice as a new administration and new Congress settle in.

3 hours ago - Politics & Policy

GOP holdouts press on with plans to crush Cheney

Screenshot of emails to a member of Congress from individuals who signed an Americans for Limited Government petition against Rep. Liz Cheney. Photo obtained by Axios

Pro-Trump holdouts in the House are forging ahead with an uphill campaign to oust Rep. Liz Cheney as head of the chamber's Republican caucus even though Minority Leader Kevin McCarthy told them to back down.

Why it matters: What happens next will be a test of McCarthy's party control and the sincerity of his opposition to the movement. Cheney (R-Wyo.) is seen as a potential leadership rival to the California Republican.

Democrats aim to punish House GOP for Capitol riot

Speaker Nancy Pelosi passes through a newly installed metal detector at the House floor entrance Thursday. Photo: Drew Angerer/Getty Images

House Democrats plan to take advantage of corporate efforts to cut funding for Republicans who opposed certifying the 2020 election results, with a plan to target vulnerable members in the pivotal 2022 midterms for their role in the Jan. 6 violence.

Why it matters: It's unclear whether the Democrats' strategy will manifest itself in ads or earned media in the targeted races or just be a stunt to raise money for themselves. But the Capitol violence will be central to the party's messaging as it seeks to maintain its narrow majorities in Congress.