首页
学习
活动
专区
工具
TVP
发布
社区首页 >专栏 >汽车黑客手册-简介

汽车黑客手册-简介

作者头像
vell001
修改2018-10-27 16:46:11
1.4K0
修改2018-10-27 16:46:11
举报
文章被收录于专栏:AI-vellAI-vell

简介

在2014年,Open Garages(汽车黑客社区,一群在汽车安全方面乐于分享合作的人)发布了第一本《汽车黑客指南》作为汽车黑客课程的教材。这本书的设计初衷是为了能放进汽车的手套箱,并在一到两天的汽车安全课程中介绍汽车黑客的基本知识。我们几乎不知道这第一本书会引起多少兴趣:我们在上线第一周就有超过30万的下载量。事实上,由于这本书太过火爆,导致我们的网络服务提供商宕机了两次,他们对我们都有点不开心了。(还好,他们原谅了我们,这很好,因为我们喜欢这个小型ISP,SpeedSpan.net)

读者的反馈大多都非常好;最多的批评就是当去实践时发现我们的指南太短了,没有更多的细节。这本书就是为了解决这些抱怨。《汽车黑客手册》将会引入更多的汽车黑客细节甚至覆盖一些跟安全没有直接关系的知识,比如性能调优和一些能帮助理解以及修理汽车的工具。

为什么汽车黑客知识对我们所有人都有好处

如果你正拿起这本书,你也许已经知道你为什么想要黑车啦。不过为了以防万一,我们还是在这列出一些汽车黑客知识的详细好处:

了解汽车运行原理

汽车工业已经生产出令人惊艳的汽车了,这些车带有复杂的电子和计算机系统,但它们几乎没有发布什么信息来说明这些系统到底是如何工作的。一旦你了解了汽车的网络原理,以及它们是如何在系统内部和外部进行通信的,你将更好的诊断和解决问题。

修理你的汽车电子系统

随着汽车的发展,它们变得越来越不机械,越来越电子化了。不幸的是。汽车电子系统基本都是不开放的,经销商除外。虽然经销商可以获得的信息比你个人通常能获得的要多,但汽车制造商自己会将零部件外包出去,并需要专用工具来诊断问题。了解你汽车的电子工作原理可以帮助你绕过这个障碍。

修改你的汽车

了解汽车通信原理,将能更好的修改你的汽车,比如降低油耗以及更换第三方零件。当你了解了整个通信系统,你可以无缝的集成其他系统到你的汽车上,比如添加一个显示器来显示车辆性能或者用第三方零件来完美代替原厂零件。

发现隐藏功能

有些时候汽车装配了一些被隐藏或者被简单的屏蔽掉了的功能。我们可以发现这些被隐藏或者屏蔽掉的功能,让你的车发挥出最大的潜能。比如,汽车隐藏了一个“仆人模式”,就是当你把钥匙给到你的仆人时,可以让车辆进入受限模式。

确认你的车辆安全

在撰写本文时,车辆安全指南并没有针对恶意电子攻击进行说明。虽然汽车容易受到类似桌面系统相同的恶意软件的影响,但汽车制造商并没有强制去审计汽车电子产品的安全。目前这个情况很显然是不能接受的:车上坐着我们的家人和朋友,我们都必须知道这个车是不是足够安全。如果你学习了怎么去黑你的车,你就能知道你的车哪里是脆弱的,并且能提前做好预防措施,也能更好的倡导更高的安全标准。

帮助汽车工业

汽车工业也能从这本书中收益。这本书提供了识别威胁的指南以及突破当前保护的现代技术。除了帮助你设计你的安全实践,这本书还提供了指导研究人员如何沟通他们的发现。

今天的汽车越来越电子化。在《IEEE Spectrum》杂志上刊登了一篇文章:“这辆车是靠代码运行的”,作者 Robert N. Charette(罗伯特·查莱特)写道,到2009年,汽车通常都是由100多个微处理器、50个电子控制单元、5英里的线路和1亿行代码组成的(文章地址:http://spectrum.ieee.org/transportation/systems/this-car-runs-on-code)。丰田公司的工程师们开玩笑说,他们给汽车安装轮子的唯一原因就是防止电脑刮地面。随着计算机系统和车辆的整合程度越来越高,安全检查变得越来越重要和复杂。

注意 汽车黑客不能太随意。当在黑你车时,车的网络系统、无线连接、计算机系统以及其他电子设备都有可能损坏或者失效。当你在尝试这本书中的任何技术时都要非常小心,优先保证安全。如你所想,这本书的作者或者出版商都不可能为你车辆的损伤负责的。


INTRODUCTION

In 2014, Open Garages—a group of people interested in sharing and collaborating on vehicle security—released the first Car Hacker’s Manual as course material for car hacking classes. The original book was designed to fit in a vehicle’s glove box and to cover the basics of car hacking in a one- or two-day class on auto security. Little did we know how much interest there would be in that that first book: we had over 300,000 downloads in the first week. In fact, the book’s popularity shut down our Internet service provider (twice!) and made them a bit unhappy with us. (It’s okay, they forgave us, which is good because I love my small ISP. Hi SpeedSpan.net!)

The feedback from readers was mostly fantastic; most of the criticism had to do with the fact that the manual was too short and didn’t go into enough detail. This book aims to address those complaints. The Car Hacker’s Handbook goes into a lot more detail about car hacking and even covers some things that aren’t directly related to security, like performance tuning and useful tools for understanding and working with vehicles.

Why Car Hacking Is Good for All of Us

If you’re holding this book, you may already know why you’d want to hack cars. But just in case, here’s a handy list detailing the benefits of car hacking:

Understanding How Your Vehicle Works

The automotive industry has churned out some amazing vehicles, with complicated electronics and computer systems, but it has released little information about what makes those systems work. Once you understand how a vehicle’s network works and how it communicates within its own system and outside of it, you’ll be better able to diagnose and troubleshoot problems.

Working on Your Vehicle’s Electrical Systems

As vehicles have evolved, they’ve become less mechanical and more electronic. Unfortunately, automotive electronics systems are typically closed off to all but the dealership mechanics. While dealerships have access to more information than you as an individual can typically get, the auto manufacturers themselves outsource parts and require proprietary tools to diagnose problems. Learning how your vehicle’s electronics work can help you bypass this barrier.

Modifying Your Vehicle

Understanding how vehicles communicate can lead to better modifications, like improved fuel consumption and use of third-party replacement parts. Once you understand the communication system, you can seamlessly integrate other systems into your vehicle, like an additional display to show performance or a third-party component that integrates just as well as the factory default.

Discovering Undocumented Features

Sometimes vehicles are equipped with features that are undocumented or simply disabled. Discovering undocumented or disabled features and utilizing them lets you use your vehicle to its fullest potential. For example, the vehicle may have an undocumented “valet mode” that allows you to put your car in a restricted mode before handing over the keys to a valet.

Validating the Security of Your Vehicle

As of this writing, vehicle safety guidelines don’t address malicious electronic threats. While vehicles are susceptible to the same malware as your desktop, automakers aren’t required to audit the security of a vehicle’s electronics. This situation is simply unacceptable: we drive our families and friends around in these vehicles, and every one of us needs to know that our vehicles are as safe as can be. If you learn how to hack your car, you’ll know where your vehicle is vulnerable so that you can take precautions and be a better advocate for higher safety standards.

Helping the Auto Industry

The auto industry can benefit from the knowledge contained in this book as well. This book presents guidelines for identifying threats as well as modern techniques to circumvent current protections. In addition to helping you design your security practice, this book offers guidance to researchers in how to communicate their findings.

Today’s vehicles are more electronic than ever. In a report in IEEE Spectrum titled “This Car Runs on Code,” author Robert N. Charette notes that as of 2009 vehicles have typically been built with over 100 microprocessors, 50 electronic control units, 5 miles of wiring, and 100 million lines of code (http://spectrum.ieee.org/transportation/systems/this-car-runs-on-code). Engineers at Toyota joke that the only reason they put wheels on a vehicle is to keep the computer from scraping the ground. As computer systems become more integral to vehicles, performing security reviews becomes more important and complex.

WARNING

Car hacking should not be taken casually. Playing with your vehicle’s network, wireless connections, onboard computers, or other electronics can damage or disable it. Be very careful when experimenting with any of the techniques in this book and keep safety as an overriding concern. As you might imagine, neither the author nor the publisher of this book will be held accountable for any damage to your vehicle.

本文系外文翻译,前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

本文系外文翻译前往查看

如有侵权,请联系 cloudcommunity@tencent.com 删除。

评论
登录后参与评论
0 条评论
热度
最新
推荐阅读
目录
  • 简介
  • 为什么汽车黑客知识对我们所有人都有好处
    • 了解汽车运行原理
      • 修理你的汽车电子系统
        • 修改你的汽车
          • 发现隐藏功能
            • 确认你的车辆安全
              • 帮助汽车工业
              领券
              问题归档专栏文章快讯文章归档关键词归档开发者手册归档开发者手册 Section 归档