Then they told me to drive the Jeep onto the highway. Instead, they merely assured me that they wouldn't do anything life-threatening. To better simulate the experience of driving a vehicle while it's being hijacked by an invisible, virtual force, Miller and Valasek refused to tell me ahead of time what kinds of attacks they planned to launch from Miller's laptop in his house 10 miles west. Their code is an automaker's nightmare: software that lets hackers send commands through the Jeep’s entertainment system to its dashboard functions, steering, brakes, and transmission, all from a laptop that may be across the country. The result of their work was a hacking technique-what the security industry calls a zero-day exploit-that can target Jeep Cherokees and give the attacker wireless control, via the Internet, to any of thousands of vehicles. Louis to be Miller and Valasek's digital crash-test dummy, a willing subject on whom they could test the car-hacking research they'd been doing over the past year. The Jeep’s strange behavior wasn’t entirely unexpected.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |