
Annons
Chris Valasek: Toyota is really downplaying what we did. They claimed that the project would require us to "dismantle the dashboard", which is not true. The dismantling of the dashboard was for a secondary project. Okay. So is there stuff going on behind the scenes? Have Toyota offered you both a job?
Chris: [laughs] No, not yet! They don’t seem too happy with us.
Annons
Charlie Miller: Not initially. I don’t know if I’d say it’s been hostile, but they’ve certainly been defensive.
Chris: Neither Toyota or Ford specifically asked us to not publish our research, but I don’t think they were elated that we did, either.Okay. Could you sum up exactly what this project was?
Chris: Sure. Several months ago Charlie and I got a Toyota Prius and a Ford Escape, and we wanted to see what exactly an attacker could do to physically control a car once it had logged on to its computer network. We can steer, accelerate, brake, remove the brake, sound the horn, operate the seatbelts, work the lights… basically, we can remotely control anything that the car does with its computers.
Charlie: A couple of years ago, some research showed that you could do the remote attacks against vehicles. So we’re just trying to follow on from that and see how it applies to different cars with different sorts of features.


Chris: Now that we’ve published our tools it’ll be a lot easier to.I guess so – you only tweeted all the info and tools a few days ago, didn’t you?
Chris: Yeah, we released everything, so it’s literally open; there’s no paywall or anything. The paper, and all of our code, data, scripts, examples and tutorials on how to make all the tools we did physically – it’s all out there. It does take a lot of resources, and I’m sure that some criminal organisations have that sort of money, but I’d rather everyone who has access to a car and our code be able to start looking at things as well.
Charlie: The goal of our research was to make it so other people could carry on this kind of research.
Annons
Charlie: Car hacking in general could be used as a weapon, but without a remote component, our research alone is pretty benign [because, presumably, you wouldn't want to crash a car that you yourself were travelling in].Could someone come up with a remote control to hack cars with?
Chris: It is certainly a chunk of work, but it's been done and I’m sure we could do it we cared to try.
Charlie: It only takes a single vulnerability to turn our tethered approach into a remote application…So isn't that kinda dangerous?
I think keeping the problem secret doesn’t actually help keep people safe. Maybe it does in the very, very short term, but in the longer term the best approach is to find the problems and to discuss them and get them fixed, rather than trying to hide them.Is this possible in every modern car?
Chris: It really depends on what sort of features the car has, but any car that uses its computers to physically control pieces of the automobile is going to be vulnerable.Okay, thanks very much guys. Take care.Follow Joseph on Twitter: @josephfcoxMore on people hacking things:Barnaby Jack Could Hack Your Pacemaker and Make Your Heart ExplodeCyber Criminals Hate Brian Krebs So Much They're Sending Heroin and SWAT Teams to His HomeI Spoke to Some Immoral Hackers Who Don't Give a Shit About Your Feelings
