Files
awesome-connected-things-sec/docs/Automotive/automotive-security.md
2025-07-20 13:27:07 +05:30

20 KiB
Raw Blame History

Car Hacking Resources: From Origins to Today

A historical and up-to-date guide to the world of automotive security and car hacking covering foundational breakthroughs, major attacks, community growth, tools, and essential resources.


Table of Contents


1. Early Days: 1990s2000s

  • First Hacking Points: OBD (On-Board Diagnostics) port introduction enabled access to engine management with custom hardware and proprietary protocols.
  • Key Focus: Wired access to in-vehicle networks, mainly CAN (Controller Area Network, CAN Wikipedia, standardized 1991).
  • Barriers: Highly proprietary, isolated systems; vehicle-specific strategies required.

2. 20102014: Proof-of-Concepts and Recognition

  • Researchers began hacking ECUs through direct access, quickly moving to remote attacks via Bluetooth, CD, cellular, and more.
  • Notable exploits included 2011 Chevy Malibu remote hacks (Wired Article) and proof that almost any connected vehicle could be at risk.
  • Open-source tools and low-cost OBD-II USB adapters made experimentation accessible.

3. 20152018: Mainstream Awareness and Escalation


4. 20192021: Community, Tools, and Remote Exploits


5. 20222025: Modern Era and Emerging Frontiers


International Automotive Cybersecurity Standards — Regional Table

Country/Region Key Standards / Regulations Regulatory Bodies / Notes
Global ISO/SAE 21434 (Cybersecurity Engineering), UNECE WP.29 R155/R156 ISO, SAE, UNECE. Adopted by most OEMs worldwide.
United States SAE J3061, NHTSA Cybersecurity Best Practices, Auto-ISAC Best Practices, NIST 800 Series NHTSA, SAE, Auto-ISAC, NIST. J3061 is a precursor to ISO/SAE 21434.
EU UNECE WP.29 R155/R156, GDPR, ENISA Guidance UNECE, European Commission, ENISA. GDPR covers data privacy.
Japan UNECE WP.29 R155/R156, JASO TP18004 JAMA, JASO, MLIT. JASO guidance tailors standards to domestic industry.
China GB/T 38629-2020, GB/T 37292-2018, MIIT, CCC Cybersecurity MIIT, CCC. GB/T standards required for type approvals.
South Korea UNECE WP.29, KATRI Guidance KATRI, MOLIT. National docs supplement UNECE.
UK UNECE WP.29, DCMS Code of Practice, NCSC Guidance DVSA, DCMS, NCSC. Dedicated automotive/IoT code post-Brexit.
Australia UNECE WP.29, ACSC Guidance Dept. of Infrastructure, ACSC. National supplements for cyber and connected fleets.
Germany IT Security Catalogue (BNetzA), UNECE WP.29 BNetzA. Applies IT/OT security standards to automotive and infrastructure sectors.
Switzerland Basel/FINMA Cyber Guidance Basel Committee, FINMA. Emphasis on supply chain and digital vehicle resilience.

Essential Learning & Research Resources

Resource/Community Type Description/Notes
The Car Hackers Handbook (Craig Smith) Book Comprehensive guide to car security
Hacking Connected Cars Book Techniques and procedures book
ICSim Toolkit/Software CAN cluster simulation
can-utils Toolkit/Software CAN bus open-source tools
python-can Toolkit/Software Python CAN bus library
Scapy/CAN Layer Toolkit/Software CAN protocol analysis
DEF CON Car Hacking Village Community/Event Global in-person and virtual hands-on events
Car Hacking Village @ DefCamp Community/Event European CTF/hack venue
ASRG Community Auto Security Research Group: global research
Open Garages Forum/Repo Tutorials, datasets, simulation kits
Upstream Security Reports Research/Survey Trends, vulnerabilities, industry survey
The Hacker News: API survey News/Research Mass API attack reports
arXiv: UWBAD paper Research Ultra-Wideband relay attack research
arXiv: SAE J1939 attacks Research Heavy-duty transport attacks
ScienceDirect: HD vehicle review Research Heavy vehicle vulnerabilities
MDPI Sensors: SDV security Research/Survey Survey on frameworks/attacks
VicOne Zero-Day Database Vulnerability DB Live CVE, 0-day tracking

Getting Started with Car Hacking (Today)


Summary Timeline of Milestones


Curated Modern Automotive Security List (2025)

Approach & Methodology

  • In-Vehicle Network, Hardware Hacking, Firmware, Wireless, Mobile App, Cloud/Telemetry, AI-based Security, Supply Chain, Mobility.

Communities & Events

Educational Resources

Tools & Platforms

Hardware

Software

Libraries

Lists & Platforms

Research, Papers & Vulnerabilities


Reference Resource Links:

New & Emerging Threats

  • AI Security & Prompt Injection
  • Automotive Software Supply Chain Security
  • Connected Mobility & Telematics API Security
  • EV Charging Infrastructure Vulnerabilities
  • Ransomware & Data Breach Response

Recommendations


This guide covers car hackings journey from early OBD/CAN explorations to todays cloud, API, and AI security challenges - linking you directly to key reference points and resources at each stage.