
"When you see a car, truck or bus making its way down the road, who do you assume is control of it? This isn't a trick question. Decades ago, there would have been one answer: the person behind the wheel. In more recent years, as vehicles became increasingly connected to the internet and driver-assist and self-driving technology grew more widespread, it's not as clear if a driver is, well, a driver."
"Ruter's tests focused on security - specifically, to see whether or not the possibility existed of an external party either taking control of a bus or operating its camera system. The VDL buses lacked the ability to receive remote updates at all, rendering them secure for purposes of these tests. With respect to the Yutong buses, however, Ruter noted the presence of some potential security issues. One, a security vulnerability that affected a number of companies using third-party software, has reportedly been addressed by Yutong."
Connected and autonomous vehicle features blur who controls a vehicle and create new attack surfaces for remote hacking. Ruter tested two electric bus models to evaluate security and update mechanisms. VDL buses could not receive remote updates, which prevented remote alteration during the tests. Yutong buses exhibited potential vulnerabilities, including a third-party software flaw reportedly patched and the ability for the manufacturer to stop or render buses inoperable. Ruter is implementing measures to delay signals to buses to distinguish benign updates from potentially malicious interventions. Other entities have also investigated vehicle cybersecurity after remote-control incidents.
Read at InsideHook
Unable to calculate read time
Collection
[
|
...
]