San Francisco, California — February 29, 2016 — Car hacking has frequently made headlines in the last few years. This is a growing concern for anyone in the automotive industry, especially as automotive computers proliferate. Making matters worse, these computers are increasingly connected through the “Internet of Things.”
A new book examines these vulnerabilities and lays out how existing loopholes can be exploited. According to publisher No Starch Press, The Car Hacker’s Handbook is the first book of its kind to take an in-depth look at the computer-based systems in modern cars that make them vulnerable to attack and exploitation.
“I’m excited to release this book because the topic affects all of us,” says Bill Pollock, founder of No Starch Press. “Modern cars are basically unprotected networks that weigh thousands of pounds and travel at 80 mph. And the attack surface is astounding.”
Some of the topics addressed include how-to:
– Write Metasploit payloads to attack the infotainment system and take control of a vehicle’s engine, steering, brakes, temperature control, door locks, and much more – Reverse engineer the CAN bus—the network that communicates critical information like braking, RPM, and door locking
– Hack the ECU (engine control unit) to access or modify it
– Feed exploits to a vehicle through vehicle-to-vehicle communication systems
– Override factory settings to improve engine performance
According to the publisher, The Car Hacker’s Handbook is a technical guide for anyone interested in cybersecurity or modifying vehicles.
“Car hacking allows you to assess the security risks of the vehicle you and your family ride in every day,” says Craig Smith, author of The Car Hacker’s Handbook. “The information in my book can be used to understand the undocumented inner workings of modern vehicles and communicate your findings with car manufacturers, which will make us all more secure.”
For more information on The Car Hacker’s Handbook, please visit nostarch.com.