汽车黑客手册-简介

简介

在2014年,Open Garages(汽车黑客社区,一群在汽车安全方面乐于分享合作的人)发布了第一本《汽车黑客指南》作为汽车黑客课程的教材。这本书的设计初衷是为了能放进汽车的手套箱,并在一到两天的汽车安全课程中介绍汽车黑客的基本知识。我们几乎不知道这第一本书会引起多少兴趣:我们在上线第一周就有超过30万的下载量。事实上,由于这本书太过火爆,导致我们的网络服务提供商宕机了两次,他们对我们都有点不开心了。(还好,他们原谅了我们,这很好,因为我们喜欢这个小型ISP,SpeedSpan.net)

读者的反馈大多都非常好;最多的批评就是当去实践时发现我们的指南太短了,没有更多的细节。这本书就是为了解决这些抱怨。《汽车黑客手册》将会引入更多的汽车黑客细节甚至覆盖一些跟安全没有直接关系的知识,比如性能调优和一些能帮助理解以及修理汽车的工具。

为什么汽车黑客知识对我们所有人都有好处

如果你正拿起这本书,你也许已经知道你为什么想要黑车啦。不过为了以防万一,我们还是在这列出一些汽车黑客知识的详细好处:

了解汽车运行原理

汽车工业已经生产出令人惊艳的汽车了,这些车带有复杂的电子和计算机系统,但它们几乎没有发布什么信息来说明这些系统到底是如何工作的。一旦你了解了汽车的网络原理,以及它们是如何在系统内部和外部进行通信的,你将更好的诊断和解决问题。

修理你的汽车电子系统

随着汽车的发展,它们变得越来越不机械,越来越电子化了。不幸的是。汽车电子系统基本都是不开放的,经销商除外。虽然经销商可以获得的信息比你个人通常能获得的要多,但汽车制造商自己会将零部件外包出去,并需要专用工具来诊断问题。了解你汽车的电子工作原理可以帮助你绕过这个障碍。

修改你的汽车

了解汽车通信原理,将能更好的修改你的汽车,比如降低油耗以及更换第三方零件。当你了解了整个通信系统,你可以无缝的集成其他系统到你的汽车上,比如添加一个显示器来显示车辆性能或者用第三方零件来完美代替原厂零件。

发现隐藏功能

有些时候汽车装配了一些被隐藏或者被简单的屏蔽掉了的功能。我们可以发现这些被隐藏或者屏蔽掉的功能,让你的车发挥出最大的潜能。比如,汽车隐藏了一个“仆人模式”,就是当你把钥匙给到你的仆人时,可以让车辆进入受限模式。

确认你的车辆安全

在撰写本文时,车辆安全指南并没有针对恶意电子攻击进行说明。虽然汽车容易受到类似桌面系统相同的恶意软件的影响,但汽车制造商并没有强制去审计汽车电子产品的安全。目前这个情况很显然是不能接受的:车上坐着我们的家人和朋友,我们都必须知道这个车是不是足够安全。如果你学习了怎么去黑你的车,你就能知道你的车哪里是脆弱的,并且能提前做好预防措施,也能更好的倡导更高的安全标准。

帮助汽车工业

汽车工业也能从这本书中收益。这本书提供了识别威胁的指南以及突破当前保护的现代技术。除了帮助你设计你的安全实践,这本书还提供了指导研究人员如何沟通他们的发现。

今天的汽车越来越电子化。在《IEEE Spectrum》杂志上刊登了一篇文章:“这辆车是靠代码运行的”,作者 Robert N. Charette(罗伯特·查莱特)写道,到2009年,汽车通常都是由100多个微处理器、50个电子控制单元、5英里的线路和1亿行代码组成的(文章地址:http://spectrum.ieee.org/transportation/systems/this-car-runs-on-code)。丰田公司的工程师们开玩笑说,他们给汽车安装轮子的唯一原因就是防止电脑刮地面。随着计算机系统和车辆的整合程度越来越高,安全检查变得越来越重要和复杂。

注意 汽车黑客不能太随意。当在黑你车时,车的网络系统、无线连接、计算机系统以及其他电子设备都有可能损坏或者失效。当你在尝试这本书中的任何技术时都要非常小心,优先保证安全。如你所想,这本书的作者或者出版商都不可能为你车辆的损伤负责的。


INTRODUCTION

In 2014, Open Garages—a group of people interested in sharing and collaborating on vehicle security—released the first Car Hacker’s Manual as course material for car hacking classes. The original book was designed to fit in a vehicle’s glove box and to cover the basics of car hacking in a one- or two-day class on auto security. Little did we know how much interest there would be in that that first book: we had over 300,000 downloads in the first week. In fact, the book’s popularity shut down our Internet service provider (twice!) and made them a bit unhappy with us. (It’s okay, they forgave us, which is good because I love my small ISP. Hi SpeedSpan.net!)

The feedback from readers was mostly fantastic; most of the criticism had to do with the fact that the manual was too short and didn’t go into enough detail. This book aims to address those complaints. The Car Hacker’s Handbook goes into a lot more detail about car hacking and even covers some things that aren’t directly related to security, like performance tuning and useful tools for understanding and working with vehicles.

Why Car Hacking Is Good for All of Us

If you’re holding this book, you may already know why you’d want to hack cars. But just in case, here’s a handy list detailing the benefits of car hacking:

Understanding How Your Vehicle Works

The automotive industry has churned out some amazing vehicles, with complicated electronics and computer systems, but it has released little information about what makes those systems work. Once you understand how a vehicle’s network works and how it communicates within its own system and outside of it, you’ll be better able to diagnose and troubleshoot problems.

Working on Your Vehicle’s Electrical Systems

As vehicles have evolved, they’ve become less mechanical and more electronic. Unfortunately, automotive electronics systems are typically closed off to all but the dealership mechanics. While dealerships have access to more information than you as an individual can typically get, the auto manufacturers themselves outsource parts and require proprietary tools to diagnose problems. Learning how your vehicle’s electronics work can help you bypass this barrier.

Modifying Your Vehicle

Understanding how vehicles communicate can lead to better modifications, like improved fuel consumption and use of third-party replacement parts. Once you understand the communication system, you can seamlessly integrate other systems into your vehicle, like an additional display to show performance or a third-party component that integrates just as well as the factory default.

Discovering Undocumented Features

Sometimes vehicles are equipped with features that are undocumented or simply disabled. Discovering undocumented or disabled features and utilizing them lets you use your vehicle to its fullest potential. For example, the vehicle may have an undocumented “valet mode” that allows you to put your car in a restricted mode before handing over the keys to a valet.

Validating the Security of Your Vehicle

As of this writing, vehicle safety guidelines don’t address malicious electronic threats. While vehicles are susceptible to the same malware as your desktop, automakers aren’t required to audit the security of a vehicle’s electronics. This situation is simply unacceptable: we drive our families and friends around in these vehicles, and every one of us needs to know that our vehicles are as safe as can be. If you learn how to hack your car, you’ll know where your vehicle is vulnerable so that you can take precautions and be a better advocate for higher safety standards.

Helping the Auto Industry

The auto industry can benefit from the knowledge contained in this book as well. This book presents guidelines for identifying threats as well as modern techniques to circumvent current protections. In addition to helping you design your security practice, this book offers guidance to researchers in how to communicate their findings.

Today’s vehicles are more electronic than ever. In a report in IEEE Spectrum titled “This Car Runs on Code,” author Robert N. Charette notes that as of 2009 vehicles have typically been built with over 100 microprocessors, 50 electronic control units, 5 miles of wiring, and 100 million lines of code (http://spectrum.ieee.org/transportation/systems/this-car-runs-on-code). Engineers at Toyota joke that the only reason they put wheels on a vehicle is to keep the computer from scraping the ground. As computer systems become more integral to vehicles, performing security reviews becomes more important and complex.

WARNING

Car hacking should not be taken casually. Playing with your vehicle’s network, wireless connections, onboard computers, or other electronics can damage or disable it. Be very careful when experimenting with any of the techniques in this book and keep safety as an overriding concern. As you might imagine, neither the author nor the publisher of this book will be held accountable for any damage to your vehicle.

原文链接:http://opengarages.org/handbook/ebook/

原文作者:Chris Evans

编辑于

我来说两句

0 条评论
登录 后参与评论

相关文章

来自专栏大数据文摘

数字遗产:人没了网络数据怎么办

29080
来自专栏VRPinea

五一出门到处都是人从众,还不如在家来场环球旅行

29680
来自专栏罗超频道

围攻360:控制、裁判和看门狗

9月下旬互联网安全大会上周鸿祎提出“泛安全”,已透露要管预装这事的意向。但人们没想到360会这么快出手,而且输得这么惨。360手机助手建议用户卸载一些应...

32090
来自专栏机器人网

10款最适合初学者的机器人

机器人的需求每天都在增长,一同增长的还有机器人存在的意义。 个人、企业和工厂引进机器人的原因多种多样,越来越多的人以来科学技术,机器人的需求也随之增长。 因此...

48560
来自专栏VRPinea

谈癌色变的时代或将终结,VR让科学家“进入”癌细胞

37180
来自专栏机器人网

最适合初学者的十大机器人

机器人的需求每天都在增长,一同增长的还有机器人存在的意义。 个人、企业和工厂引进机器人的原因多种多样,越来越多的人以来科学技术,机器人的需求也随之增长。 因此,...

42550
来自专栏Flutter入门到实战

程序员谨防加班猝死之十大建议

 1、间歇性睡眠。如果实在要加班话3分钟时间睡一觉,记住不能超过5分钟。一睡着立马醒,这就是传说中的猫打盹。  2、多喝水。如果实在加班时间长,记得每隔20分...

11920
来自专栏ThoughtWorks

软件服务与汽车修理技术 | TW洞见

今日洞见 文章作者/图片来自ThoughtWorks:姚琪琳。 本文所有内容,包括文字、图片和音视频资料,版权均属ThoughtWorks公司所有,任何媒体、网...

29250
来自专栏人工智能快报

新加坡将在海陆边境启用虹膜识别技术

据亚洲新闻网报道,新加坡将在海陆边境启用虹膜识别技术。在未来两年内,新加坡将逐步在陆上和海上检查点引入虹膜扫描,以升级其身份验证方式。这是继2016年11月10...

395110
来自专栏云加头条

12月4日 云头条:网络视听,新的“黄金赛道”?

要做生意,最重要的一件事,就是紧跟大势。红利来了,傻子也能躺着赚钱。红利没了,神坛说塌也就塌了。而现在,网络视听内容行业即将迎来一波巨大的红利。在5G、4K、A...

13730

扫码关注云+社区

领取腾讯云代金券