Avatar photo

Editor, IFSEC Global

Author Bio ▼

Adam Bannister was Editor of IFSEC Global from 2014 through to November 2019. Adam is also a former Managing Editor at Dynamis Online Media Group.
August 9, 2017

Sign up to free email newsletters


The Video Surveillance Report 2022


UK government issues cybersecurity guidelines for connected cars

The Department for Transport has published cybersecurity guidelines for manufacturers of smart or connected cars.

Written with help from the Centre for the Protection of National Infrastructure, the principles implore everyone in the automotive supply chain to collaborate during the design process and over software upgrades and maintenance long after cars hit the road. The authorities are concerned about the prospect of older vehicles running outdated software.

As cars become increasingly automated – and ultimately, driverless – the stakes will rise. Last year ‘ethical’ hackers managed to wrest control of a Tesla Model S while the car was moving and slam on the brakes (see how they did it in the video below).

“Attacks can even inject malicious code into the electronic control units (ECUs) and controller-area-network (CAN) bus, which control critical systems such as electric steering and braking.” Mark Noctor, VP EMEA, Arxan Technologies

The eight principles, which were launched by transport minister Lord Callanan, follow:

  • Organisational security is owned, governed and promoted at board level
  • Security risks are assessed and managed appropriately and proportionately, including those specific to the supply chain
  • Organisations need product aftercare and incident response to ensure systems are secure over their lifetime
  • All organisations, including sub-contractors, suppliers and potential 3rd parties, work together to enhance the security of the system
  • Systems are designed using a defence-in-depth approach
  • The security of all software is managed throughout its lifetime
  • The storage and transmission of data is secure and can be controlled
  • The system is designed to be resilient to attacks and respond appropriately when its defences or sensors fail

Connecting to WiFi and external devices via Bluetooth, Modern cars are increasingly ‘smart’.

“The communications and entertainment systems are particularly vulnerable to attack, and can be reverse engineered to access the API libraries that facilitate data sharing between systems,” says Mark Noctor, VP EMEA at Arxan Technologies. “From here attacks can even inject malicious code into the electronic control units (ECUs) and controller-area-network (CAN) bus, which control critical systems such as electric steering and braking.

“Preventing application code from being accessed and tampered is one of the biggest priorities in protecting a connected vehicle, and it is encouraging to see the government’s guidelines specifically list the ability to protect code and ensure its integrity as key principles.

“Manufacturers must deploy code hardening measures to prevent attackers from accessing their source code and removing vital data such as cryptographic keys which can be used to access other systems. Anti-tampering measures should be hidden in the code to alert them if the code has been changed, and prevent systems from starting if alterations are detected.”

The government announced the Autonomous and Electric Vehicles Bill, which will “allow innovation to flourish and ensure the next wave of self-driving technology is invented, designed and operated safely in the UK”, during the Queens Speech in June.

The outcome of recent efforts by the US government to engage with US automakers over the issue do not augur well. Asked by a Senate committee if they supported mandatory privacy and safety standards, executives from Google, General Motors, Delphi and Lyft were evasive.

Related Topics

Notify of
1 Comment
Newest Most Voted
Inline Feedbacks
View all comments
Andrew Snyder
Andrew Snyder
August 10, 2017 8:07 pm

Adam, it is great to see the UK govt tackle this need for application shielding and usage of whitebox technology and code protection and obfuscation to create code that defends itself.

Keep up the good work!