Sep 11, 2019

Where current cybersecurity guidelines fall short

Illustration: Aïda Amer/Axios

Amidst legislative stalling, a consortium of twelve manufacturers has developed a framework for automotive cybersecurity best practices.

The big picture: At first glance, their guidelines hit the right points — incorporating security into design, developing risk assessment and incident response strategies — but current security solutions are not sufficient against increasingly sophisticated threats.

Background: The Self-Drive Act, a bill that didn't make it through Congress, required “manufacturers of highly automated vehicles to develop written cybersecurity and privacy plans for such vehicles prior to offering them for sale.”

  • However, it fell short of prescribing specific guidelines for how security systems will ensure those objectives.
  • In developing their own safety and cybersecurity guidelines, automakers were trying to keep drivers and passengers safe — and also aiming to satisfy regulators who, in the absence of industry action or input, could impose rules that may be less favorable to companies.

What's happening: Today, most security solutions rely on rules, logic and signatures to detect threats, but this means they can only detect known threats. Contemporary security systems essentially do the bare minimum to comply with security guidances.

  • This is one reason current security measures are not the best place to start in designing a framework. Any time hackers develop new viruses or malware, cybersecurity programs play catch-up.

What's needed: To go beyond compliance and prevent hackers before they compromise security measures, manufacturers need to develop systems that will enable them to meet these still-unknown threats.

  • Examination of vehicle system behavior anomalies could be a solution. If a hacker tries to install malware into a vehicle's ECU, the system would detect activity in the ECU that should not be taking place.
  • In another scenario, if a vehicle's ECU is acting in an irregular manner, that could mean that malware is present. The system could be programmed to block vehicle operations until the threat is addressed, preventing the malware from acting.

The bottom line: Cyber threats are increasing as more vehicles become connected, and as connected vehicles become more sophisticated. Current solutions are not advanced enough to satisfy the spirit of even the strictest security and privacy guidelines. Updating the solutions and frameworks should go hand in hand.

Yossi Vardi is the CEO of SafeRide Technologies, an automotive cybersecurity startup.

Go deeper

Updated 16 mins ago - Politics & Policy

Updates: George Floyd protests nationwide

Police officers wearing riot gear push back demonstrators outside of the White House on Monday. Photo: Jose Luis Magana/AFP via Getty Images

Protests over the death of George Floyd and other police-related killings of black people continued for a seventh day across the U.S., with President Trump threatening on Monday to deploy the military if the unrest continues.

The latest: Baltimore Police Department tweeted late Monday, "BPD has activated the Maryland State Police to assist with moderate crowds in the downtown area. Officers have observed members in the crowd setting off illegal fireworks and throwing objects near peaceful protestors and officers."

1 hour ago - Technology

Cisco, Sony postpone events amid continued protests

Screenshot: Axios (via YouTube)

Cisco said Monday night that it is postponing the online version of Cisco Live, its major customer event, amid the ongoing protests that have followed the killing of George Floyd.

Why it matters: Cisco joins Sony, Electronic Arts and Google in delaying tech events planned for this week.

2 hours ago - Technology

Twitter suspends fake antifa account tied to white nationalists

Twitter said Monday that it has suspended an account named "ANTIFA_US" which it says was tied to the white nationalist group Identity Evropa. Over the weekend, the account had called for violence and its posts had widely circulated online.

Why it matters: It's the latest example of social media being used to exploit and sharpen the very real divisions in American society. It's also the latest example of Twitter more aggressively rooting out false information on its platform.