Jump to content

Automotive hacking: Difference between revisions

From Wikipedia, the free encyclopedia
Content deleted Content added
Citation bot (talk | contribs)
Altered template type. Add: date, doi, authors 1-1. Removed parameters. Some additions/deletions were parameter name changes. | Use this bot. Report bugs. | Suggested by Neko-chan | #UCB_webform 431/500
 
(33 intermediate revisions by 24 users not shown)
Line 1: Line 1:
{{Short description|Computer security term for hacking of automobiles}}
'''Automotive hacking''' includes the exploitation of vulnerabilities within the software, hardware, and communication systems of [[automobile]]s.
<ref>{{Cite journal |last1=Mishra |first1=Rahul Mishra Rahul |last2=Hemant |first2=Hemant |last3=Bajaj |first3=Parveen Kumar Bajaj Parveen Kumar |date=2024-04-30 |title=Movie Review System Using Machine Learning |url=https://doi.org/10.21203/rs.3.rs-4282512/v1 |access-date=2024-12-04 |website=doi.org|doi=10.21203/rs.3.rs-4282512/v1 }}</ref>'''Automotive hacking''' is the exploitation of vulnerabilities within the software, hardware, and communication systems of [[automobile]]s.


== Overview ==
== Overview ==
Modern automobiles contain hundreds of on-board computers processing everything from vehicle controls to the [[infotainment]] system. These computers, called [[Electronic control unit]]s (ECU), communicate with each other through multiple networks and communication protocols including the [[CAN bus|Controller Area Network]] (CAN) for vehicle component communication such as connections between engine and brake control; [[Local Interconnect Network]] (LIN) for cheaper vehicle component communication such as between door locks and interior lights; [[MOST Bus|Media Oriented Systems Transport]] (MOST) for infotainment systems such as modern touchscreen and [[telematics]] connections; and [[FlexRay]] for high-speed vehicle component communications such as active suspension and active cruise control data synchronization.<ref>Petit, J., & Shladover, S. E. (2015). [https://www.researchgate.net/profile/Jonathan_Petit/publication/266780575_Potential_Cyberattacks_on_Automated_Vehicles/links/543bb4150cf24a6ddb978a28/Potential-Cyberattacks-on-Automated-Vehicles.pdf Potential cyberattacks on automated vehicles]. IEEE Transactions on Intelligent Transportation Systems, 16(2), 546-556. doi:10.1109/TITS.2014.2342271</ref>
Modern automobiles contain hundreds of on-board computers processing everything from vehicle controls to the [[infotainment]] system. These computers, called [[Electronic control unit]]s (ECU), communicate with each other through multiple networks and communication protocols including the [[CAN bus|Controller Area Network]] (CAN) for vehicle component communication such as connections between engine and brake control; [[Local Interconnect Network]] (LIN) for cheaper vehicle component communication such as between door locks and interior lights; [[MOST Bus|Media Oriented Systems Transport]] (MOST) for infotainment systems such as modern touchscreen and [[telematics]] connections; and [[FlexRay]] for high-speed vehicle component communications such as active suspension and active cruise control data synchronization.<ref>Petit, J., & Shladover, S. E. (2015). [https://www.researchgate.net/profile/Jonathan_Petit/publication/266780575_Potential_Cyberattacks_on_Automated_Vehicles/links/543bb4150cf24a6ddb978a28/Potential-Cyberattacks-on-Automated-Vehicles.pdf Potential cyberattacks on automated vehicles]. IEEE Transactions on Intelligent Transportation Systems, 16(2), 546-556. doi:10.1109/TITS.2014.2342271</ref>


Additional consumer communication systems are also integrated into automobile architectures. These include [[Bluetooth]] for wireless device connections, [[4G]] Internet hotspots, and vehicle [[Wi-Fi]].
Additional consumer communication systems are also integrated into automobile architectures including [[Bluetooth]] for [[Wireless|wireless device]] connections, [[4G]] Internet hotspots, and vehicle [[Wi-Fi]].<ref>{{cite web |title=Car renters beware: Bluetooth use can reveal your private data |url=https://eu.usatoday.com/story/money/cars/2018/01/30/car-renters-beware-bluetooth-use-can-reveal-your-private-data/1080225001/ |website=USA Today |access-date=23 March 2021}}</ref>


The integration of these various communications and software systems leaves automobiles vulnerable to attack. Security researchers have begun demonstrating the multitude of potential attack vectors in modern vehicles, and some real-world exploits have resulted in manufacturers issuing vehicle recalls and software updates to mobile applications.
The integration of these various communications and software systems leaves automobiles vulnerable to attack. Security researchers have begun demonstrating the multitude of potential attack vectors in modern vehicles, and some real-world exploits have resulted in manufacturers issuing vehicle recalls and software updates to mobile applications.


Manufacturers, such as [[John Deere]], have used computer systems and Digital Rights Management to prevent repairs by the vehicle owners, or by third parties, or the use of aftermarket parts.<ref>[https://www.eff.org/de/deeplinks/2015/04/automakers-say-you-dont-really-own-your-car Automakers Say You Don’t Really Own Your Car] on eff.org (April 2015)</ref> Such limitations have prompted efforts to circumvent these systems, and increased interest in measures such as [[Motor Vehicle Owners' Right to Repair Act]].
Manufacturers, such as [[John Deere]], have used computer systems and Digital Rights Management to prevent repairs by the vehicle owners, or by third parties, or the use of aftermarket parts.<ref>[https://www.eff.org/de/deeplinks/2015/04/automakers-say-you-dont-really-own-your-car Automakers Say You Don’t Really Own Your Car] on eff.org (April 2015)</ref> Such limitations have prompted efforts to circumvent these systems, and increased interest in measures such as [[Motor Vehicle Owners' Right to Repair Act]].
Line 16: Line 17:


== Recent exploits ==
== Recent exploits ==
=== Fiat Chrysler UConnect ===
UConnect is [[Fiat Chrysler Automobiles|Fiat Chrysler]]'s Internet-connected feature which enables owners the ability to control the vehicle's infotainment/navigation system, sync media, and make phone calls. It even integrates with the optional on-board WiFi.<ref>http://www.autotrader.com/car-tech/what-is-chrysler-uconnect-215353</ref>


=== 2015 Fiat Chrysler UConnect Hack ===
However, susceptibilities in Fiat Chrysler’s UConnect system, available on over 1.4 million cars, allows hackers to scan for cars with the system, connect and embed [[Malware|malicious code]], and ultimately, commandeer vital vehicle controls like steering and brakes.<ref>Greenberg, A. (2015, July 21). [https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ Hackers Remotely Kill a Jeep on the Highway-With Me in It]. Retrieved August 6, 2015.</ref>
UConnect is [[Fiat Chrysler Automobiles|Fiat Chrysler]]'s Internet-connected feature which enables owners the ability to control the vehicle's infotainment/navigation system, sync media, and make phone calls. It even integrates with the optional on-board WiFi.<ref>{{Cite web|url=http://www.autotrader.com/car-tech/what-is-chrysler-uconnect-215353|title=Autotrader - page unavailable|website=www.autotrader.com}}</ref>

However, vulnerabilities in Fiat Chrysler's UConnect system, available on over 1.4 million cars, allows hackers to scan for cars with the system, connect and embed [[Malware|malicious code]], and ultimately, commandeer vital vehicle controls like steering and brakes.<ref>Greenberg, A. (2015, July 21). [https://www.wired.com/2015/07/hackers-remotely-kill-jeep-highway/ Hackers Remotely Kill a Jeep on the Highway-With Me in It]. Retrieved August 6, 2015.</ref>

=== 2015 Tesla Model S Hack ===
In 2015 at the [[DEF CON]] hacking conference Marc Rogers and Kevin Mahaffey demonstrated <ref>{{Cite web|url=https://www.youtube.com/watch?v=KX_0c9R4Fng/|title=DEF CON 23 - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S|website=YouTube.com|date=2 December 2015 }}</ref><ref>{{Cite web|url=https://www.youtube.com/watch?v=8oXYQAKEUPg/|title=Bloomberg:Tesla Model S Gets Hacked by Professionals|website=YouTube.com|date=10 August 2015 }}</ref> how a chain of exploits could be used to take complete control of the Model S. Marc Rogers and Kevin Mahaffey identified several remote and local vulnerabilities that could be used as entry points. They demonstrated that after exploitation the vehicle could be remotely controlled with an iPhone.<ref>{{Cite web|url=https://www.hollywoodreporter.com/news/security-experts-reveal-how-a-814062/|title=Security Experts Reveal How a Tesla Model S Was Hacked|website=hollywoodreporter.com|date=7 August 2015 }}</ref> Finally, they also demonstrated that it was possible to install a [[Backdoor (computing)|backdoor]] that allowed persistent access and control of the vehicle in a similar fashion to [[Exploit (computer security)|exploit]] techniques more usually associated with traditional computer systems. Marc Rogers and Kevin Mahaffey worked with [[Tesla, Inc.]] to resolve the issues before disclosure. It was announced before the presentation that the entire global fleet of Model S cars had been patched overnight, the first proactive mass Over The Air (OTA) security update of vulnerable vehicles.<ref>{{Cite magazine|url=https://www.wired.com/2015/08/researchers-hacked-model-s-teslas-already/|title=Researchers Hacked a Model S, But Tesla's Already Released a Patch|website=wired.com |last1=Zetter |first1=Kim }}</ref><ref>{{Cite web|url=https://www.npr.org/sections/alltechconsidered/2015/08/06/429907506/tesla-model-s-can-be-hacked-and-fixed-which-is-the-real-news/|title=Tesla Model S Can Be Hacked, And Fixed (Which Is The Real News)|website=npr.com}}</ref>


=== General Motors OnStar RemoteLink App ===
=== General Motors OnStar RemoteLink App ===
The [[OnStar]] RemoteLink app allows users the ability to utilize OnStar capabilities from their [[Android (operating system)|Android]] or [[iOS]] smartphones. The RemoteLink app can locate, lock and unlock, and even start your vehicle.<ref>https://www.onstar.com/us/en/services/remotelink.html?source=ct</ref>
The [[OnStar]] RemoteLink app allows users the ability to utilize OnStar capabilities from their [[Android (operating system)|Android]] or [[iOS]] smartphones. The RemoteLink app can locate, lock and unlock, and even start your vehicle.<ref>{{Cite web|url=https://www.onstar.com/us/en/mobile_app/?source=ct|title=Mobile App|website=www.onstar.com}}</ref>


The flaw in [[General Motors]]’ OnStar RemoteLink app, while not as extreme as UConnect, allows hackers to impersonate the victim in the eyes of the RemoteLink app. This means that the hackers can access all of the features of the RemoteLink app available to the victim including locating, locking and unlocking, and starting the engine.<ref>Finkle, J., & Woodall, B. (2015, July 30). [https://www.reuters.com/article/gm-hacking/update-1-researcher-says-can-hack-gms-onstar-app-open-vehicle-start-engine-idUSL1N10A3XK20150730 Researcher says can hack GM's OnStar app, open vehicle, start engine]. Retrieved August 27, 2015.</ref>
The flaw in [[General Motors]]’ OnStar RemoteLink app, while not as extreme as UConnect, allows hackers to impersonate the victim in the eyes of the RemoteLink app. This means that the hackers can access all of the features of the RemoteLink app available to the victim including locating, locking and unlocking, and starting the engine.<ref>Finkle, J., & Woodall, B. (2015, July 30). [https://www.reuters.com/article/gm-hacking/update-1-researcher-says-can-hack-gms-onstar-app-open-vehicle-start-engine-idUSL1N10A3XK20150730 Researcher says can hack GM's OnStar app, open vehicle, start engine]. Retrieved August 27, 2015.</ref>
Line 28: Line 33:
=== Keyless entry ===
=== Keyless entry ===


[[Samy Kamkar]] has demonstrated a device that captures signals from [[keyless entry]] fobs and allows the attacker to unlock the doors and start the engine of the owner's car.<ref>[https://www.npr.org/sections/alltechconsidered/2018/02/23/583682220/this-gray-hat-hacker-breaks-into-your-car-to-prove-a-point This 'Gray Hat' Hacker Breaks Into Your Car — To Prove A Point]</ref>
The security researcher [[Samy Kamkar]] has demonstrated a device that intercepts signals from [[keyless entry|keyless-entry]] fobs and would allow an attacker to unlock doors and start a car's engine.<ref>{{Cite web|url=https://www.npr.org/sections/alltechconsidered/2018/02/23/583682220/this-gray-hat-hacker-breaks-into-your-car-to-prove-a-point|title=This 'Gray Hat' Hacker Breaks Into Your Car — To Prove A Point|website=NPR.org}}</ref>

=== "USB" entry ===
Kia back windows can be broken without setting off an alarm, and Hyundai are similar.<ref name="carbuzz/milwaukee-sue-kia">{{cite web |title=Milwaukee Might Sue Kia Because Of Excessive Thefts |url=https://carbuzz.com/news/milwaukee-might-sue-kia-because-of-excessive-thefts |website=CarBuzz |access-date=9 December 2022 |language=en-us |date=11 December 2021}}</ref>
Since 2021,<ref name="caranddriver/a38491394">{{cite news |title=Hyundai, Kia Take Action after Cars Become Theft Targets in Milwaukee |url=https://www.caranddriver.com/news/a38491394/hyundai-kia-thefts-milwaukee-action/ |access-date=9 December 2022 |work=[[Car and Driver]] |date=11 December 2021 |language=en-us}}</ref><ref name="autoblog/2021/milwaukee-stolen">{{cite web |title=Milwaukee car thieves are crazy for Hyundais and Kias |url=https://www.autoblog.com/2021/12/13/milwaukee-stolen-cars-hyundai-kia/ |website=Autoblog |date=13 December 2021 |access-date=9 December 2022 |language=en}}</ref><ref name="autoblog/thefts-tiktok">{{cite web |title=Hyundai, Kia models at higher risk of theft, and of course it's on TikTok |url=https://www.autoblog.com/2022/08/02/hyundai-kia-thefts-tiktok/ |website=Autoblog |date=2 August 2022 |access-date=9 December 2022 |language=en}}</ref> on social media,<ref name="youtube=fbTrLyqL_nw">{{cite web |author1=Tommy G |title=Kia Boys Documentary (A Story of Teenage Car Theft) |date=31 May 2022 |url=https://www.youtube.com/watch?v=fbTrLyqL_nw |publisher=youtube |access-date=9 December 2022 |language=en}}</ref><ref>{{cite web |title=Milwaukee Police Investigate 'Kia Boys' YouTube Documentary |url=https://patch.com/wisconsin/milwaukee/milwaukee-police-investigate-kia-boys-youtube-documentary |website=[[Patch.com]] |access-date=9 December 2022 |location=Milwaukee, WI |language=en |date=3 June 2022}}</ref><ref name="urbanmilwaukee/kia-boyz">{{cite web |last1=Jannene |first1=Jeramey |title=Interviewing The 'Kia Boyz' |url=https://urbanmilwaukee.com/2022/06/07/interviewing-the-kia-boyz/ |website=Urban Milwaukee |access-date=9 December 2022 |language=en}}</ref> videos show stealing of post-2010 Kia vehicles and post-2014 Hyundai vehicles, without [[engine immobilizer]]s, with a [[:File:USB Type-A plug B&W.svg|USB 1.1 A plug]] [[USB hardware#Connectors|cable]], or pliers.<ref name="thedrive/stealing-kias-usb">{{cite web |last1=Stumpf |first1=Rob |title=How Thieves Are Stealing Hyundais and Kias With Just a USB Cable |url=https://www.thedrive.com/news/how-thieves-are-stealing-hyundais-and-kias-with-just-a-usb-cable |website=The Drive |access-date=9 December 2022 |language=en |date=2 August 2022}}</ref><ref name="tampabay/tiktok-kia">{{cite news |title=TikTok 'Kia Challenge' fuels St. Pete spike in Kia and Hyundai auto thefts |url=https://www.tampabay.com/news/crime/2022/07/28/tiktok-kia-challenge-fuels-st-pete-spike-in-kia-and-hyundai-auto-thefts/ |access-date=9 December 2022 |work=[[Tampa Bay Times]] |language=en}}</ref><ref>{{cite web |title=3 Ways to Hotwire a Car |url=https://www.wikihow.com/Hotwire-a-Car |website=wikiHow |access-date=9 December 2022 |language=en}}</ref><ref name="carscoops/steal-with-usb">{{cite web |last1=Anderson |first1=Brad |title=This Is How Easy It Is To Steal A Hyundai Or Kia With A USB Cable |url=https://www.carscoops.com/2022/10/this-is-how-easy-it-is-to-steal-a-hyundai-or-kia-with-a-usb-cable/ |website=Car Scoops |access-date=9 December 2022 |date=October 11, 2022}}</ref><ref>{{cite news |title=Hyundais and Kias make up 68% of stolen cars this year in Milwaukee |url=https://www.tmj4.com/news/local-news/hyundais-and-kias-make-up-68-of-stolen-cars-this-year-in-milwaukee |access-date=9 December 2022 |work=[[WTMJ-TV]] |date=23 September 2021 |language=en}}</ref><ref>{{cite news |last1=Hughes |first1=Elliot |title=Worried about your Kia or Hyundai getting stolen? Milwaukee police are handing out steering wheel locks |url=https://www.jsonline.com/story/news/crime/2021/05/07/milwaukee-police-giving-away-steering-wheel-locks-kia-hyundai-owners/4987762001/ |access-date=9 December 2022 |work=[[Journal Sentinel]] |location=[[Milwaukee]]}}</ref><ref>{{cite news |last1=Schmidt |first1=Rose |title=St. Paul PD: Kia thefts up 1,300%, Hyundai thefts up 584% in 2022 |url=https://www.fox9.com/news/st-paul-pd-kia-thefts-up-1300-hyundai-thefts-up-584-in-2022 |access-date=9 December 2022 |work=FOX 9 |date=18 July 2022}}</ref><ref name="10tv/2022/steal-hyundais-kias">{{cite news |title=Car thieves using old trick to steal Hyundais, Kias in Columbus |url=https://www.10tv.com/article/news/crime-tracker/car-thieves-using-old-trick-steal-hyundais-kias-in-columbus/530-8b443afe-a52d-46f4-9428-d9c455b3a51a |access-date=9 December 2022 |work=[[10tv.com]] |date=January 11, 2022}}</ref> Kia started installing immobilizers in 2022.<ref name="autoblog/thefts-tiktok"/><ref name="topclassactions/kia-defect-steal">{{cite web |last1=Jewett |first1=Abraham |title=Kia class action alleges defect makes vehicles easy to steal |url=https://topclassactions.com/lawsuit-settlements/consumer-products/auto-news/kia-class-action-alleges-defect-makes-vehicles-easy-to-steal/ |website=Top Class Actions |access-date=9 December 2022 |language=en |date=8 August 2022}}</ref>

=== 2022 CAN injection: keyless car theft ===
Using a fake device sold on the dark web, thieves were able to steal vehicles by forcing the headlamps open and accessing the CAN bus, and then once on the bus, to simulate the signals to start the vehicle. The exploit requires enough time and privacy for thieves to remove vehicle hardware, sometimes bumpers, in order to open the headlights.<ref name=CANinjection>[https://kentindell.github.io/2023/04/03/can-injection/ CAN injection: keyless car theft] by Dr. Ken Tindell, CTO of Canis Automotive Labs, 4-3-2023.</ref> Possibly the only way to prevent this kind of event by determined and knowledgeable thieves would be for car designers to encrypt traffic on the CAN bus.


== References ==
== References ==
{{Reflist}}
{{Reflist}}


[[Category:Computer Security articles by quality]]
[[Category:Articles created via the Article Wizard]]
[[Category:Automobile articles by quality]]
[[Category:Hacking (computer security)]]
[[Category:Hacking (computer security)]]
[[Category:Terrorism by method]]

Latest revision as of 20:53, 9 December 2024

[1]Automotive hacking is the exploitation of vulnerabilities within the software, hardware, and communication systems of automobiles.

Overview

[edit]

Modern automobiles contain hundreds of on-board computers processing everything from vehicle controls to the infotainment system. These computers, called Electronic control units (ECU), communicate with each other through multiple networks and communication protocols including the Controller Area Network (CAN) for vehicle component communication such as connections between engine and brake control; Local Interconnect Network (LIN) for cheaper vehicle component communication such as between door locks and interior lights; Media Oriented Systems Transport (MOST) for infotainment systems such as modern touchscreen and telematics connections; and FlexRay for high-speed vehicle component communications such as active suspension and active cruise control data synchronization.[2]

Additional consumer communication systems are also integrated into automobile architectures including Bluetooth for wireless device connections, 4G Internet hotspots, and vehicle Wi-Fi.[3]

The integration of these various communications and software systems leaves automobiles vulnerable to attack. Security researchers have begun demonstrating the multitude of potential attack vectors in modern vehicles, and some real-world exploits have resulted in manufacturers issuing vehicle recalls and software updates to mobile applications.

Manufacturers, such as John Deere, have used computer systems and Digital Rights Management to prevent repairs by the vehicle owners, or by third parties, or the use of aftermarket parts.[4] Such limitations have prompted efforts to circumvent these systems, and increased interest in measures such as Motor Vehicle Owners' Right to Repair Act.

Research

[edit]

In 2010, security researchers demonstrated how they could create physical effects and undermine system controls by hacking the ECU. The researchers needed physical access to the ECU and were able to gain full control over any safety or automotive system including disabling the brakes and stopping the engine.[5]

In a follow-up research paper published in 2011, researchers demonstrated that physical access is not even necessary. The researchers showed that “remote exploitation is feasible via...mechanics tools, CD players, Bluetooth, cellular radio...and wireless communication channels allow long distance vehicle control, location tracking, in-cabin audio exfiltration and theft”.[6] This means that a hacker could gain access to a vehicle's vital control systems through almost anything that interfaces with the automobile's systems.

Recent exploits

[edit]

2015 Fiat Chrysler UConnect Hack

[edit]

UConnect is Fiat Chrysler's Internet-connected feature which enables owners the ability to control the vehicle's infotainment/navigation system, sync media, and make phone calls. It even integrates with the optional on-board WiFi.[7]

However, vulnerabilities in Fiat Chrysler's UConnect system, available on over 1.4 million cars, allows hackers to scan for cars with the system, connect and embed malicious code, and ultimately, commandeer vital vehicle controls like steering and brakes.[8]

2015 Tesla Model S Hack

[edit]

In 2015 at the DEF CON hacking conference Marc Rogers and Kevin Mahaffey demonstrated [9][10] how a chain of exploits could be used to take complete control of the Model S. Marc Rogers and Kevin Mahaffey identified several remote and local vulnerabilities that could be used as entry points. They demonstrated that after exploitation the vehicle could be remotely controlled with an iPhone.[11] Finally, they also demonstrated that it was possible to install a backdoor that allowed persistent access and control of the vehicle in a similar fashion to exploit techniques more usually associated with traditional computer systems. Marc Rogers and Kevin Mahaffey worked with Tesla, Inc. to resolve the issues before disclosure. It was announced before the presentation that the entire global fleet of Model S cars had been patched overnight, the first proactive mass Over The Air (OTA) security update of vulnerable vehicles.[12][13]

[edit]

The OnStar RemoteLink app allows users the ability to utilize OnStar capabilities from their Android or iOS smartphones. The RemoteLink app can locate, lock and unlock, and even start your vehicle.[14]

The flaw in General Motors’ OnStar RemoteLink app, while not as extreme as UConnect, allows hackers to impersonate the victim in the eyes of the RemoteLink app. This means that the hackers can access all of the features of the RemoteLink app available to the victim including locating, locking and unlocking, and starting the engine.[15]

Keyless entry

[edit]

The security researcher Samy Kamkar has demonstrated a device that intercepts signals from keyless-entry fobs and would allow an attacker to unlock doors and start a car's engine.[16]

"USB" entry

[edit]

Kia back windows can be broken without setting off an alarm, and Hyundai are similar.[17] Since 2021,[18][19][20] on social media,[21][22][23] videos show stealing of post-2010 Kia vehicles and post-2014 Hyundai vehicles, without engine immobilizers, with a USB 1.1 A plug cable, or pliers.[24][25][26][27][28][29][30][31] Kia started installing immobilizers in 2022.[20][32]

2022 CAN injection: keyless car theft

[edit]

Using a fake device sold on the dark web, thieves were able to steal vehicles by forcing the headlamps open and accessing the CAN bus, and then once on the bus, to simulate the signals to start the vehicle. The exploit requires enough time and privacy for thieves to remove vehicle hardware, sometimes bumpers, in order to open the headlights.[33] Possibly the only way to prevent this kind of event by determined and knowledgeable thieves would be for car designers to encrypt traffic on the CAN bus.

References

[edit]
  1. ^ Mishra, Rahul Mishra Rahul; Hemant, Hemant; Bajaj, Parveen Kumar Bajaj Parveen Kumar (2024-04-30). "Movie Review System Using Machine Learning". doi.org. doi:10.21203/rs.3.rs-4282512/v1. Retrieved 2024-12-04.
  2. ^ Petit, J., & Shladover, S. E. (2015). Potential cyberattacks on automated vehicles. IEEE Transactions on Intelligent Transportation Systems, 16(2), 546-556. doi:10.1109/TITS.2014.2342271
  3. ^ "Car renters beware: Bluetooth use can reveal your private data". USA Today. Retrieved 23 March 2021.
  4. ^ Automakers Say You Don’t Really Own Your Car on eff.org (April 2015)
  5. ^ Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., ... & Savage, S. (2010, May). Experimental security analysis of a modern automobile. In Security and Privacy (SP), 2010 IEEE Symposium on (pp. 447-462). IEEE.
  6. ^ Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., ... & Kohno, T. (2011, August). Comprehensive Experimental Analyses of Automotive Attack Surfaces. In USENIX Security Symposium.
  7. ^ "Autotrader - page unavailable". www.autotrader.com.
  8. ^ Greenberg, A. (2015, July 21). Hackers Remotely Kill a Jeep on the Highway-With Me in It. Retrieved August 6, 2015.
  9. ^ "DEF CON 23 - Marc Rogers and Kevin Mahaffey - How to Hack a Tesla Model S". YouTube.com. 2 December 2015.
  10. ^ "Bloomberg:Tesla Model S Gets Hacked by Professionals". YouTube.com. 10 August 2015.
  11. ^ "Security Experts Reveal How a Tesla Model S Was Hacked". hollywoodreporter.com. 7 August 2015.
  12. ^ Zetter, Kim. "Researchers Hacked a Model S, But Tesla's Already Released a Patch". wired.com.
  13. ^ "Tesla Model S Can Be Hacked, And Fixed (Which Is The Real News)". npr.com.
  14. ^ "Mobile App". www.onstar.com.
  15. ^ Finkle, J., & Woodall, B. (2015, July 30). Researcher says can hack GM's OnStar app, open vehicle, start engine. Retrieved August 27, 2015.
  16. ^ "This 'Gray Hat' Hacker Breaks Into Your Car — To Prove A Point". NPR.org.
  17. ^ "Milwaukee Might Sue Kia Because Of Excessive Thefts". CarBuzz. 11 December 2021. Retrieved 9 December 2022.
  18. ^ "Hyundai, Kia Take Action after Cars Become Theft Targets in Milwaukee". Car and Driver. 11 December 2021. Retrieved 9 December 2022.
  19. ^ "Milwaukee car thieves are crazy for Hyundais and Kias". Autoblog. 13 December 2021. Retrieved 9 December 2022.
  20. ^ a b "Hyundai, Kia models at higher risk of theft, and of course it's on TikTok". Autoblog. 2 August 2022. Retrieved 9 December 2022.
  21. ^ Tommy G (31 May 2022). "Kia Boys Documentary (A Story of Teenage Car Theft)". youtube. Retrieved 9 December 2022.
  22. ^ "Milwaukee Police Investigate 'Kia Boys' YouTube Documentary". Patch.com. Milwaukee, WI. 3 June 2022. Retrieved 9 December 2022.
  23. ^ Jannene, Jeramey. "Interviewing The 'Kia Boyz'". Urban Milwaukee. Retrieved 9 December 2022.
  24. ^ Stumpf, Rob (2 August 2022). "How Thieves Are Stealing Hyundais and Kias With Just a USB Cable". The Drive. Retrieved 9 December 2022.
  25. ^ "TikTok 'Kia Challenge' fuels St. Pete spike in Kia and Hyundai auto thefts". Tampa Bay Times. Retrieved 9 December 2022.
  26. ^ "3 Ways to Hotwire a Car". wikiHow. Retrieved 9 December 2022.
  27. ^ Anderson, Brad (October 11, 2022). "This Is How Easy It Is To Steal A Hyundai Or Kia With A USB Cable". Car Scoops. Retrieved 9 December 2022.
  28. ^ "Hyundais and Kias make up 68% of stolen cars this year in Milwaukee". WTMJ-TV. 23 September 2021. Retrieved 9 December 2022.
  29. ^ Hughes, Elliot. "Worried about your Kia or Hyundai getting stolen? Milwaukee police are handing out steering wheel locks". Journal Sentinel. Milwaukee. Retrieved 9 December 2022.
  30. ^ Schmidt, Rose (18 July 2022). "St. Paul PD: Kia thefts up 1,300%, Hyundai thefts up 584% in 2022". FOX 9. Retrieved 9 December 2022.
  31. ^ "Car thieves using old trick to steal Hyundais, Kias in Columbus". 10tv.com. January 11, 2022. Retrieved 9 December 2022.
  32. ^ Jewett, Abraham (8 August 2022). "Kia class action alleges defect makes vehicles easy to steal". Top Class Actions. Retrieved 9 December 2022.
  33. ^ CAN injection: keyless car theft by Dr. Ken Tindell, CTO of Canis Automotive Labs, 4-3-2023.