QSM provides unparalleled support throughout the product acquisition, installation, and implementation process.
For nearly five decades, QSM has helped organizations bring data-driven discipline to software project estimation, tracking, and benchmarking. Our methodology and tools turn project complexity into measurable, defensible outcomes.
This past July marked the first cyber security recall in automotive history. Fiat Chrysler issued a formal voluntary recall of 1.4 million vehicles after security researchers Charlie Miller and Chris Valasek demonstrated to WIRED how they could exploit a software vulnerability in Chrysler’s Uconnect dashboard computers and remotely hack into a 2014 Jeep Grand Cherokee over the Internet, taking over dashboard functions, transmission, steering and brakes. Most notably, they did so from their basement while WIRED author Andy Greenberg was driving the vehicle on the highway!
Though this was first time an automotive manufacturer issued a recall for cyber security, it’s not the first time security risks have been found in automotive software. As I’ve pointed out in my previous article “How Much Software Is in Your Car?” nearly every vehicle less than 30 years old on the road today depends on lots of computer software and thus is potentially vulnerable to hacking, especially newer models that are connected to the Internet.
With all of this complex software comes the need for automotive manufacturers to employ systems engineering and sophisticated project, program and portfolio management carefully balanced against the triple constraint of schedule, effort/cost and quality. Unlike some other industries, auto industry executives do not have the luxury of focusing exclusively on quality when developing estimates and plans for vehicle development. Being late to market with innovative technology may mean that a competitor captures the majority of market share. If development effort and costs are too high, it puts more pressure on sales volume to reach an acceptable margin. Software reliability issues, to include security vulnerabilities, can result in expensive recalls and even lawsuits that tarnish a company’s reputation and impact future sales.
One automotive manufacturer that has been very proactive with cyber security is Tesla Motors. The Tesla Model S was built to be a connected car from the ground up and the protection of owners’ security and privacy was a top priority. Tesla Motors has had strong collaboration with security researchers during development and after auditing the cyber security of the Tesla Model S, Kevin Mahaffey, co-founder and CTO of mobile security firm Lookout, concluded that “the Tesla Model S has a very well designed security architecture that we believe should serve as a template or others in the industry…overall, I feel more secure driving in a Tesla Model S than any other connected car on the road.”
Examples of good architecture decisions in the Tesla Model S observed by Mahaffey and his colleague, Marc Rogers, principal security researcher for CloudFlare, included: an over-the-air update process to patch security vulnerabilities quickly, isolation between vehicle systems and infotainment systems, account password rotation, and the ability of the car to handle sudden power loss in a graceful way enabling the driver to safely pull over to the side of the road.
However, even the Tesla Model S had a number of areas where cyber security could be improved. While the Model S has good perimeter security, Mahaffey and Rogers demonstrated how someone with physical access to the interior of the vehicle could plug into a diagnostic Ethernet port behind the instrument cluster and hack into the infotainment systems. From there they exploited a number of vulnerabilities in the infotainment systems enabling them to remotely start and stop car, unlock the doors and open the trunk and frunk. In response, Tesla immediately pushed out an over-the-air firmware security patch to all Model S owners and Tesla CTO JB Straubel publicly thanked Mahaffey and Rogers for their findings at the Def Con security conference in Las Vegas.
So what can we do to improve cyber security across the entire automotive industry?
Some best practice recommendations for consumers:
Some best practice recommendations for automotive manufacturers: