Cover Image
市場調查報告書 - 209093

竊盜犯可以控制車輛嗎? 對車輛防盗系統的駭客攻擊

Theft and Technical Trends: Can Thieves control my car? Hacking attacks on Vehicle Security Systems 2011

出版商 SBD
出版日期 內容資訊 英文
價格
本報告書已不再販售
竊盜犯可以控制車輛嗎? 對車輛防盗系統的駭客攻擊 Theft and Technical Trends: Can Thieves control my car? Hacking attacks on Vehicle Security Systems 2011
出版日期: 2011年09月16日 內容資訊: 英文

本報告已在2013年03月19日停止出版

簡介

由於本報告內容機密性極高,購買前必需先經過SBD安全部門審查。

關於駭客的危險性已經受到矚目、既存系統的脆弱性受到指摘。汽車製造商以及供應商在考慮新通信系統概念、關於現在開發階段的車輛在販售後被竊盜的危險性是必須被理解的。

本報告書為竊盜犯連接車輛系統進行電腦駭客行為的危險性之相關介紹。今後司所採用的車輛架構與通信分析、各種實際配線以及無線連接的駭客危險性之相關檢驗,概述如下。

第1章 要旨

  • 前言
  • 結論
  • 推薦事項

第2章 架構弱點

  • 有線接續
  • 無線接續
  • 車輛技術
    • 信息娛樂
    • 信息通訊
  • 連線路徑整理

第3章 新技術以及動向

  • 車輛側
  • 基礎設施
  • 竊盜工具

第4章 車輛駭客攻擊

  • 調査研究1:接續型車輛控制單元
  • 調査研究2:TPMS(胎壓監視系統)
  • 調査研究3:警察的車載監視系統
  • 一般駭客事例
  • 有效的駭客招術整理

第5章 駭客風險

  • 駭客在今後將帶來深刻威脅的理由
  • 車輛控制

第6章 防盗性向上策略與防護策

圖表一覧

  • 圖 1. CAN架構的發展
  • 圖 2. 信息於樂系統的接續性擴大
  • 圖 3. 訊息通信路徑
  • 表 4. 被想定的駭客連線経路
  • 圖 5. 隊列行駛系統的概念
  • 圖 6. TPMS攻擊工具
  • 表 7. 有效的駭客攻擊招術
  • 圖 8. 車輛駭客風險:現在與將來
  • 圖 9. 車輛內嵌系統的重要度分類
  • 圖 10. ECU分區:車體控制模組
目錄

IMPORTANT CONFIDENTIALITY NOTICE:

** Due to the confidential nature of the report content, your request to purchase SBD's security reports will be vetted by SBD's security team, prior to any sale agreement. **

Abstract

This study explores the potential for thieves to use computer hacking techniques to gain access to vehicle systems. SBD examines the future of vehicle architecture and communications to identify the potential threats of hacking a vehicle through various wired and wireless connections. Hacking is major news, and researchers have already started to find vulnerabilities in existing systems. This report cuts through the hype to help you gain a clear picture of what hacks can be achieved at the present and which are likely to develop into threats in the future. Vehicle manufacturers and systems suppliers need to consider security within the concept of new communication systems, and to understand the capability that potential thieves will have when the vehicles being developed now are eventually launched. This report will help prevent the exploitation of new technologies.

This report will help you to:

  • Gain insight into how new communications and connectivity technologies will increase vehicle vulnerability
  • Examine the weaknesses in vehicle architecture to understand how hackers could misuse them
  • Understand exactly what research teams have been able to do and what methods were used
  • Benefit from useful pointers and solutions about future proofing your vehicles against hacking

This report answers the following key questions:

  • Is vehicle hacking a threat to vehicles now?
  • What can be achieved once a hacking attack has successfully connected to the vehicle?
  • Is hacking a vehicle easy to do? What equipment/knowledge is needed?
  • How will the future integration of systems and the move towards open architecture change this problem?

About the Report Author

Craig Best (Technical Analyst - Vehicle Security).

Craig's background is in Automotive Engineering at Loughborough University and he has a wide understanding of vehicle design principles. He has provided extensive research on a number of SBD projects, and helps to analyse and maintain the range of research databases. His current specialisation is in global theft statistics and vehicle technical information.

The SBD Commitment

From technical trends reports to conducting end user surveys, SBD has over 15 years of experience of providing strategic advice, insight and expertise to the automotive and associated industries globally.

At SBD, we help vehicle manufacturers and their suppliers bridge that gap between system design and actual market needs. Our diverse team of experts understand global market and technical requirements and how to plan cost-effective systems for the future that customers value and are willing to pay for.

Table of Contents

1. Executive summary

  • 1.1. Introduction
  • 1.1. Conclusions
  • 1.1. Recommendations

2. Architecture Weaknesses

  • 2.1. Wired Connection
  • 2.2. Wireless Connection
  • 2.3. Vehicle Technology
    • 2.3.1. Infotainment
    • 2.3.2. Telematics
  • 2.4. Summary of Access Routes

3. New Technology and Developments

  • 3.1. On Vehicle
  • 3.2. Infrastructure
  • 3.3. Theft Tools

4. Vehicle Hacking Attacks

  • 4.1. Research Study 1 - Connected Vehicle Control Units
  • 4.2. Research Study 2 - TPMS
  • 4.3. Research Study 3 - Police In-Car Surveillance System
  • 4.4. Public Hacking Incidences
  • 4.5. Summary of Successful Hacking Attacks

5. The Threat of Hacking

  • 5.1. Why Hacking will be a Threat in the Future
  • 5.2. Control of the Vehicle

6. Secure and Protect

LIST OF FIGURES

  • Fig. 1: Developing CAN Architecture
  • Fig. 2: Increased Connectivity of Infotainment Systems
  • Fig. 3: Telematics Communication Route
  • Fig. 4: Summary of Possible Hacking Access Routes
  • Fig. 5: Road Train Concept
  • Fig. 6: TPMS Attack Tool
  • Fig. 7: Summary of Successful Hacking Attacks
  • Fig. 8: Vehicle Hacking Threats - Present vs. Future
  • Fig. 9: Criticality of On-Board Vehicle Systems
  • Fig. 10: ECU Partitioning - Body Control Module
Back to Top