{"id":3283,"date":"2017-10-25T10:05:01","date_gmt":"2017-10-25T08:05:01","guid":{"rendered":"https:\/\/blog.mi.hdm-stuttgart.de\/?p=3283"},"modified":"2023-08-06T21:50:07","modified_gmt":"2023-08-06T19:50:07","slug":"vulnerable-vehicles","status":"publish","type":"post","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/10\/25\/vulnerable-vehicles\/","title":{"rendered":"Vulnerable Vehicles &#8211; Connected cars and their security issues"},"content":{"rendered":"<p class=\"p1\"><em><span class=\"s1\">In times of the continuing Internet-of-things- and connectivity-hype, a connected variant of \u201cthe German\u2019s favourite toy\u201d cannot be absent. Modern cars, SUVs and lightweight trucks come with all kinds of connected features, from smartphone interface integration up to social media in the navigation system. But what about the security of these features? Is there a way to compromise them? And what could be possible results of a remote exploitation? This blog post gives an overview about the current state of research in terms of connected car security and shows us some problems, which could be live threatening to some extent.<\/span><\/em><\/p>\n<p class=\"p4\"><span class=\"s1\">The automotive industry finds itself a bit between the devil and the deep blue sea at the moment. Besides record turnovers and economic success, the manufacturers are faced with some serious challenges. Dieselgate, alleged cartels, general antitrust issues and massive pressure from the governments due to legislations and the push of new drive concepts are only a short summary of the problems the whole industry has to deal with.<\/span><\/p>\n<p><!--more--><\/p>\n<p class=\"p4\"><span class=\"s1\">But there is another issue that could lead to a great depression for the automakers. The fascination and attractiveness of conventional cars in the eyes of younger generations is decreasing constantly. Especially the Generation Y does not let itself being impressed from \u201cold values\u201d like a high amount of horsepower, sporty design or the exclusivity of a luxury brand. In their eyes, cars need to have new digital features, which make their life easier, to be attractive.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">According to this, car makers introduce many digital and connected features in new generations of their products and continuously build their cars to be part of the Internet of Things (IoT). And some of those new features could have an undisputed benefit for some users and seem to be a very important selling point. However, in regard to development times of conventional parts in the car, like the suspension or passive security features, which are tested for many years before they land in production cars, those car-IoT-solutions popped up in production cars in a very short period. Considering the fact, that many other IoT-devices, which do not weigh several tons and move with 200 km\/h have security issues, it is important to look \u201cunder the bonnet\u201d of those features &#8211; especially when you read articles, like those about the remote exploitation of a connected car from 2015, which we examine later in this text. To get a deeper understanding of this whole topic, we now take a brief look on the history of connectivity in our cars, such as we know it today. <\/span><\/p>\n<p class=\"p6\"><span class=\"s1\"><b>The rolling WiFi-hotspot<\/b><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">The first efforts of the automakers to integrate cars in the IoT environment started already in the 2000s with the implementation of sim cards and cellular GSM-modules in the onboard electronics. Initially, the data transfer was unidirectional to get information for the navigation system or to listen to internet radio. The car itself did not have any interface to send information about its current state to the environment. With the introduction of the first proprietary e-Call services around 2005, the navigation- and entertainment systems, also called infotainment systems, were firstly able to send information about the location of the car via the cellular module. From 2018 on, all new vehicles in the European Union have to be delivered with these features as standard, which finally leads to a wide coverage of connected vehicles. However, these kind of fundamental connectivity features are not really part of the IoT, which leads to a classification as <i>Connected Car 1.0,<\/i> since data transfer is only one directional and not interactive with the connected environment.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Connectivity was an increasing topic for premium cars since the mid-2000s. Meanwhile even small-sized cars, like an Opel Corsa or a Volkswagen Polo have some proper connectivity functions on board &#8211; of course mostly as a fee-required option. Considering the offered functionalities and features, a parallel to smartphone services and applications can be drawn. Cars with modern, connected infotainment systems receive data from the internet (of things) to use various services and may also send many different data to their environment, starting with your location, over information about the cars state, like current fuel capacity, mileage or service requirements up to the integration of your social media profiles. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Fast mobile networks and up-to-date data consumption models also opened the possibility to receive and send more dynamic information about the driving profile, current state of the vehicle, like speed, revolutions per minute and other telematics. Besides the informational benefit for the owner of the car, this data is highly interesting for many different companies with data-driven business models. As an example, you can name insurance companies. With access to the driving profile and style of a certain driver and his car, they can calculate individual rates.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Also road safety can benefit from telematics and data about the state of connected cars. If the electronic stability control from a car a few miles in front of you regulates due to a slippery road, this data can be logged and transmitted to a service provider, which sends all cars behind a warning because of the dangerous road conditions. This is only one brief example, how this kind of data can contribute to safety, but obviously only when the data is processed secure. The table below shows a summary of connected car services.<\/span><\/p>\n<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.007.jpeg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3285\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/10\/25\/vulnerable-vehicles\/pra%cc%88sentation-007\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.007.jpeg\" data-orig-size=\"1920,1080\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Pra\u0308sentation.007\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.007-1024x576.jpeg\" class=\"alignnone wp-image-3285 size-large\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.007-1024x576.jpeg\" alt=\"\" width=\"656\" height=\"369\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.007-1024x576.jpeg 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.007-300x169.jpeg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.007-768x432.jpeg 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.007.jpeg 1920w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><\/a><\/p>\n<p class=\"p4\"><span class=\"s1\">Owing to the described bidirectional data transfer, cars with those capabilities are now labeled as <i>Connected Car 2.0. <\/i>Like on other devices, which send and receive data from the internet, more and more new features were developed for connected cars. For example, new cars can be ordered as kind of a rolling WiFi-hotsport, which use the sim card and its cellular-communication module as a gateway to the network. <\/span><\/p>\n<p class=\"p6\"><span class=\"s1\"><b>Different roads to connectivity <\/b><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Since this blog post is not focused on the evaluation of new features or use cases for connected cars, we now take a look on the technical implementations of how to connect a car to the internet and its environment and the possible attack surfaces for hackers. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"> At the moment, the paradigm of connecting a car splits into three different variations.<\/span><\/p>\n<p><strong>1) Direct Integration<\/strong><\/p>\n<p class=\"p4\"><span class=\"s1\">The most holistic way for a connected car-approach is the direct integration. The built-in infotainment systems contain an e-simcard and a cellular module for the connection to the internet. In most cases, those systems also have a built in screen with an advanced graphical user interface, applications for entertainment, navigation and productivity purposes, like an email browser and a calendar. Moreover, those systems have options to influence the state of the car, like the climate control or the engine response, as well as functions to get various information from the car itself. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">To get these type of information and to control physical parameters of the car, integrated and connected infotainment systems are often more or less directly connected to the Controller Area Network(CAN)-Bus. The CAN-Bus is known as the vehicle\u2019s internal network. It\u2019s a robust bus standard, designed to allow microcontrollers and devices like the electronic control units (ECUs) for viable vehicle functions to communicate with each other in a serial, democratic way. The CAN-Bus was introduced 1986 and became standard for intra-vehicle-networks. Modern cars could have various CAN-Busses with different broadcast rates, depending on the devices connected on. The typical methods to secure the CAN against compromising are bit monitoring, form check or cycling redundancy check. These are basically techniques to check if there is something unexpected going on inside the CAN, but don\u2019t offer any methods to verify where the commands for the different ECUs came from. The lacking hedge against remote compromising constitutes the first possible attack surface.<\/span><\/p>\n<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.010.jpeg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3287\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/10\/25\/vulnerable-vehicles\/pra%cc%88sentation-010\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.010.jpeg\" data-orig-size=\"1920,1080\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Pra\u0308sentation.010\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.010-1024x576.jpeg\" class=\"alignnone wp-image-3287 size-large\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.010-1024x576.jpeg\" alt=\"\" width=\"656\" height=\"369\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.010-1024x576.jpeg 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.010-300x169.jpeg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.010-768x432.jpeg 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.010.jpeg 1920w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><\/a><\/p>\n<p class=\"p4\"><span class=\"s1\">In most cases, directly integrated connected car systems offer also a control application for the driver\u2019s smartphone. Due to their direct internet connectivity, they can send data from the car\u2019s state to the application. More advanced systems also offer remote controls to viable car functions like the lights, the horn and even the door locks. Seen in a technical way, those apps communicate via a server with the connected infotainment system, which controls different parameters on one of the internal car networks, like the CAN-Bus. Below is a graphic, which illustrates the basic architecture of a direct integration.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><b>2) Mobile device connectivity <\/b><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Car connectivity via mobile device is not that sophisticated as a fully integrated approach. However, besides the out-of-car remote control functionalities, where you need a connected sender (smartphone) and receiver (car), a infotainment system, which is connected to the smartphone\u2019s data network could offer pretty similar features. Since 2015, you also have the possibility to mirror some applications from your smartphone directly on the infotainments screen via <i>Apple Carplay<\/i> and <i>Android Auto<\/i>. The basic architecture on this type of implementation does not vary fundamentally from the first approach, apart from the way the systems are connected to the internet. That means, that the infotainment still could have access to one of the viable busses of the car\u2019s internal network. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\"><b>3) Connectivity via On-board diagnostics (OBD)-II-device<\/b><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">OBD-devices are dongles or adaptors, which you connect directly to a CAN-Bus gateway (BCM in the shown picture). The devices are plugged into the female OBD-II-socket of the car. OBD systems give the vehicle owner or repair technician access to the status of various vehicle subsystems. They\u2019re mostly used for software-updates or diagnostic purposes.<\/span><\/p>\n<p><a href=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.012.jpeg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"3288\" data-permalink=\"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/10\/25\/vulnerable-vehicles\/pra%cc%88sentation-012\/\" data-orig-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.012.jpeg\" data-orig-size=\"1920,1080\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Pra\u0308sentation.012\" data-image-description=\"\" data-image-caption=\"\" data-large-file=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.012-1024x576.jpeg\" class=\"alignnone wp-image-3288 size-medium_large\" src=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.012-768x432.jpeg\" alt=\"\" width=\"656\" height=\"369\" srcset=\"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.012-768x432.jpeg 768w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.012-300x169.jpeg 300w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.012-1024x576.jpeg 1024w, https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/Pra\u0308sentation.012.jpeg 1920w\" sizes=\"auto, (max-width: 656px) 100vw, 656px\" \/><\/a><\/p>\n<p class=\"p4\"><span class=\"s1\">Since several years however, the OBD-II is not only used by professionals and hobbyists to repair vehicles. Different dongle-sized devices are now available to retrofit your car with a variant of connected features, like tracking, telematics analysis and even remote controls. The amount of possible functionalities depends on the type of plugged-in-device and the features of the car. Connectivity is implemented with e-simcards in the actual devices or via Bluetooth or WiFi-connection to your smartphone. The first implementation theoretically allows all the possibilities of a direct integration whereas the second variant has the same limitations in terms of connected sender and receiver-issues like the mobile device connectivity. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">So we see, that there are different ways to connect a vehicle to the network and make it part of the IoT. But as with all others connected devices, you should ask yourself how secure they actually are? Especially considering the fact, that the connected device in this case weighs several tons and can accelerate to over 200 km\/h. Speaking about vehicle hacking, which occurs, when someone with a computer gains unauthorized access to vehicle systems to manipulate the vehicle functionality or to query it for driver data and other sensitive information, we just have to make clear, which fatal effect a remotely hacked car can have. That\u2019s why we now take a closer look on possible attack surfaces and therefore controllable units of a vehicle. <\/span><\/p>\n<p class=\"p6\"><span class=\"s1\"><b>Attack surfaces on connected vehicles<\/b><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Referring to the different methods to implement connectivity into a vehicle, you can see all three ways as possible open gates for an exploitation. A potential attack could go through the connected infotainment system\u2019s WiFi- or bluetooth-port, as wells as via its cellular-network-module. Applications on the system, which require the internet and even the USB-Port of the system could also be potential gates for an attack. A mobile device that is connected to a vehicle is also a potential attack surface, especially when you have remote functionalities via an app. That those scenarios aren\u2019t science fiction, showed a <a href=\"https:\/\/jalopnik.com\/bmws-can-now-be-hacked-through-a-web-browser-convienen-1783371533\">zero-day vulnerability in BMW\u2019s ConnectedDrive app <\/a>for iOS and Android in 2016. A client-side cross site scripting web base vulnerability allowed remote attack to inject own malicious script codes to the client-side of the affected module context. These allowed the attacker to block some functions of the application or even to execute them. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">A pretty similar flaw showed the Tesla app for remote control and monitor functionalities of the Model S in 2015. Even unlocking the car was possible for attackers. The way, the compromising was executed, was nothing new for connected devices. The only \u201cgood\u201d thing on these attacks was the fact, that the attacker was not able to access viable vehicle functions like the ignition. But there\u2019s also a pretty easy solution for this, although it has nothing to do with hacking a fairly connected car. If you are interested you can read the linked article about <a href=\"https:\/\/www.heise.de\/ct\/ausgabe\/2015-26-Autodiebe-tricksen-kontaktlose-Schliesssysteme-aus-3013915.html\">keyless-go-hacking<\/a>, which is indeed also a potential attack surface to hack a car.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">The OBD-II-port and all the newly available connected devices to plug in, could also be an open gate for attackers. Especially because the security measures to prevent remote hacking attacks are mostly implemented in the devices itself. Since the OBD-II-port exists since the early 90s, an era, where connected vehicles were dreams of the future, you can imagine, that there\u2019s a certain lack in security measures against remote exploitations. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Besides the attack gates, which were made possible through the different ways of connectivity, modern cars provide even more ways for remote exploitations. Examples for a \u201cnon-connected\u201d gate are the sensors of the Tire Pressure Monitor System (TPMS), which is a required standard feature in the European Union and the North American markets. Besides the components for pressure monitoring, those sensors have radio frequency(RF)-components to talk to a receiver inside the car, which sends the data to one of the ECUs, that monitor the general state of the car. The receiver is usually the same one that is used for the remote key. The TPMS sends either on 315Mhz or 433Mhz-frequency and uses encoding but no signal encryption. Therefore it\u2019s possible to compromise the signal in a fairly easy way and forcing the sensors to send false signals. This leads to a tire pressure warning light on your dashboard, which may cause you to stop your car. On first hand, this is annoying, but when you think about it twice, this can lead to a scenario where a possible thief can force you to stop and leave your car. This could may be a stressful moment, where you leave the doors open, which is a pretty obvious invitation for a carjacking, especially when you consider that the attack range of this kind of exploitation is up to 50 meters. This issue is known since the introduction of TPMS-systems, which send on radio frequencies. Sensor and car manufacturers rate the effect of those attacks as rather low and don\u2019t have any aspirations to implement any cryptographic mechanisms, which seems to be a mostly cost-related decision. <\/span><\/p>\n<p class=\"p6\"><span class=\"s1\"><b>Real sized remote control cars? <\/b><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Since we already spoke about one possible scenario and its effect in context with the TPMS, we now just take a quick look on possible controllable units in a theoretical exploitation scenario. After compromising one of the attack surfaces and getting access to the internal car networks like the CAN-Bus, an attacker may could have also access on ECUs, which control viable vehicle functions. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Due to the persistent development of new assistance systems in our cars, many components got electrified.<span class=\"Apple-converted-space\">&nbsp; <\/span>The steering power support for example, was up to the mid-2000s driven hydraulically. With the introduction of features like self-parking-pilot or line-keeping-assistance, the steering got electric power support, which enables the control units of various assistance systems to self-perform steering maneuvers. The brake system, accelerator pedal, transmission and many other systems undergone the same electrification, which made them completely controllable by an electric unit without any mechanical input. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">With this paradigm change in mind, the theoretical risks of compromising a connected vehicle are devastating. Imagine the following scenario. An attacker gets remote access to one of the internal car networks via a compromised gateway, such as the connected infotainment system. The system itself also has a gateway to the main CAN-Bus, providing functionalities such as the activation and deactivation of driver assistance systems. After compromising the infotainment systems and gaining access to the CAN-Bus gateway, the attacker can infiltrate the bus with malicious commands for those ECUs, which are responsible for the control of fundamental vehicle functions. As a result, the attacker has now fully remote control over a vehicle, just over the network. One would rather not think about the disastrous consequences such a worst-case-scenario could have. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">You think, that this whole scenario is exaggerated and only theoretical? Well, maybe in the eyes of the carmakers and suppliers, who develop and sale connected car devices. The majority of them is pretty convinced about the security of their solutions, but the reality says something different, like we see in the following example.&nbsp;<\/span><\/p>\n<p class=\"p6\"><span class=\"s1\"><b>Jeep Hack 2015 \u2013 The mother of all car hacks <\/b><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">In 2015, the automotive cybersecurity researchers Charlie Miller and Chris Valasek caused with their experiments on a 2014-MY Jeep Cherokee a worldwide recall for 1.4 million vehicles. How they did that? They demonstrated that the imagined horror-scenario from above is actually not that \u201cJames Bond-ish\u201d as you might think. The two researches worked in this field since 2010 and showed already various showcases to infiltrate a car, but with the Jeep Hack, which was actually a zero-day exploit, they took the whole thing to the next level, since they implemented a remote exploitation along with getting remote control of fundamental vehicle functions. Their code was and still is a nightmare for the manufacturers and suppliers in the connected car industry.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Due to the <a href=\"http:\/\/illmatics.com\/Remote%20Car%20Hacking.pdf\">already existing research paper&nbsp;<\/a>and many other articles and blog posts about the Jeep Hack, we just take a brief look on the details and technical execution to understand the security flaws of the system. For a better understanding we subdivide the attack paradigm now in three steps<\/span><\/p>\n<p class=\"p4\"><b>1) Remote compromise<\/b><\/p>\n<p class=\"p4\"><span class=\"s1\">Fiat Chrysler Automobiles (FCA), the corporation behind Jeep, like practically all carmakers, is doing its best to integrate their cars in the IoT-environment. To realize those efforts, they launched the so called Uconnect-systems in their cars. Uconnect is an internet-connected system in hundreds of thousands of Fiat Chrysler cars, SUVs and trucks. It controls the vehicles entertainment functionalities, the satellite navigation, enables phone calls and connected services like real time traffic information or point of interests on the navigation. It even offers a WiFi-hotspot. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">The Uconnect-version in the compromised vehicle is built by Harman and contains a mainboard with a texas-instrument chip running on QNX. It also has two daughter boards. One is the cellular-communication module (Sierra Wireless) with a built-in sim card from Sprint and the other is a so called Reneseas V850 processor, which serves as a gateway to the CAN-Bus of the car. There is an air gap between the two daughter boards, but both are physically connected to the mainboard. This is a fairly typical setup for connected infotainment systems in cars and served as the pivot point for the researchers\u2019 attack.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">The first attempt to compromise the Uconnect system was conducted via the WiFi-port and due to the fact, that the WPA2-passphrase is generated automatically, based on the time when the car and its infotainment system is turned on for the very first time, not that difficult as expected.<span class=\"Apple-converted-space\">&nbsp; <\/span>So in fact, if you know the year and month, when the car is produced, which isn\u2019t that hard to guess, and you can suppose that the car is produced at day time, you have about seven million possible combinations. A brute force attack could get the passphrase in about one hour. But \u2013 surprise \u2013 there\u2019s a much easier solution.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Instead of being based on the real time, it turned out, that the Wi-Fi passphrase is generated before the actual time is set and therefore based on a default system time plus a few seconds, depending how long the head unit needs to boot up. So the number of possible variations shrinks to roughly 30, which is even for an amateur hacker a pretty easy task to solve.<\/span><\/p>\n<p class=\"p4\"><b>2) Lateralization<\/b><\/p>\n<p class=\"p4\"><span class=\"s1\">Once connected with the system, they used a network mapper (Nmap) to scan the system for open ports on the default gateway. As a result, they found the open port 6667, which provided access to the so called D-Bus. D-Bus is an inter-process and remote procedure call, which is used for communication between processes and contains an execute method, which is designed to perform arbitrary shell commands on the system. This opened a quite impressive set of possibilities for the hackers. Valasek and Miller were now able to completely control the entertainment system and track the GPS-signal from the navigation system. To exploit this possibilities you don\u2019t even needed to change Uconnect\u2019s software, it\u2019s virtually a built-in option. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">The only drawback in this scenario was that only a minor part of the Uconnect systems had the WiFi-option permanently on. Since the system is also connected to the cellular network with its Sprint (mobile connection provider) sim card, they researched for a flaw in this way of connectivity and tried to exploit it \u2013 with success. With a so called femtocell, which is a compact cellular base station, they were able to get into Sprint\u2019s internal network and manage a mass scan of IP-addresses, listening to the certain calls they already knew from their experiences with the WiFi-compromising. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Since the D-Bus related port 6667 was also open in the cellular network, they could perform the same attacks as on the WiFi-hack \u2013 theoretically for all vehicles, equipped with the Uconnect. So it was possible for them to track the position of over one million cars in the United States of America, easily from their notebooks at home on their couch \u2013 hail to the privacy<\/span><\/p>\n<p class=\"p4\"><b>3) CAN-Bus infiltration<\/b><\/p>\n<p class=\"p4\"><span class=\"s1\">Obviously, the next step was to find a way to get access to the CAN-Bus and its sensitive ECUs. Like mentioned before, there is an air gap between the infotainment\u2019s cellular- and WiFi-connection-module, but unfortunately it\u2019s only a theoretical isolation. Speaking about the V850-gateway to the CAN-Bus. The V850 controller\u2019s software was designed in some cautious way, making it possible to listen to CAN bus, but not to send commands over it. But you know, it\u2019s a computer after all. And if there\u2019s no capability you need out-of-the-box, you can simply add one by reprogramming the computer. The researchers found a way to reprogram the firmware of the V850 through a software update for the whole system. The maliciously crafted software update made it possible to interconnect all hardware modules inside the Uconnect, which offered the actual possibility to remotely send CAN-messages via the infiltrated system. After this move, Miller and Valasek were able to control nearly every fundamental component of the car remotely, since the majority of viable functions were controlled by an ECU and supported with electric motors. The video below demonstrates the performed attack and its consequences. <\/span><\/p>\n<p><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/MK0SrxBC1xs\" allowfullscreen=\"allowfullscreen\" width=\"560\" height=\"315\" frameborder=\"0\"><\/iframe><\/p>\n<p class=\"p4\"><span class=\"s1\">The result was devastating for FCA. After the release of the research results, Chrysler recalled nearly 1.4 million vehicles to fix the security issues with a software update. For the concern, this fix was embarrassing and costly. But as a positive effect, you can see that the security awareness for connected cars increased a bit. However, car hacks still occurred afterwards, as another research team demonstrated last year on a Tesla Model S, which was also remotely exploited via the Wi-Fi hotspot of the infotainment including access to the CAN-Bus. And also Tesla reacted with a software update over the air to close the gap. Read more <a href=\"https:\/\/electrek.co\/2016\/09\/20\/first-tesla-model-s-remotely-controlled-hackers-tesla-pushed-a-fix\/\">here.&nbsp;<\/a><\/span><\/p>\n<p class=\"p6\"><span class=\"s1\"><b>The problem is not solved <\/b><\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">The Jeep-, as well as some other vehicle-hacks, which occurred in the last years, impressively demonstrated that mostly all possible attack surfaces show vulnerabilities for different malicious scenarios. Just to get a quick impression, the following list gives a brief summary about theoretical attack scenarios with a following discussion about possible solutions for the security problems in the car industry. <\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li4\"><span class=\"s1\"><b>DDos-Attack<\/b><\/span><\/li>\n<\/ul>\n<p class=\"p9\"><span class=\"s1\">A distributed-denial-of-service attack on a compromised infotainment system could block fundamental functionalities on the device, like the navigation. In the worst-case, the attacker also has access to CAN-functions and is able to immobilize the whole car. Hypothetical it\u2019s also possible, that the compromised infotainment systems becomes part of a DDos-bot net. <\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li4\"><span class=\"s1\"><b>Manipulations<\/b><\/span><\/li>\n<\/ul>\n<p class=\"p9\"><span class=\"s1\">Like in the example with the hacked Jeep Cherokee, remote exploitations of vehicles and compromising viable functions is not science fiction anymore. <\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li4\"><span class=\"s1\"><b>Location-Tracking<\/b><\/span><\/li>\n<\/ul>\n<p class=\"p9\"><span class=\"s1\">The GPS-location of a compromised vehicle can be fetched. This helps to track certain vehicles, which may be interesting for organized crime. Fetching the location of a car and its driver is also a huge issue in terms of privacy. <\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li4\"><span class=\"s1\"><b>Ransomware<\/b><\/span><\/li>\n<\/ul>\n<p class=\"p9\"><span class=\"s1\">A blackmail message on your head unit in style of \u201cPay 10.000$ to the following paypal-account to unlock your vehicle\u201d? Also a potential attack scenario.<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li4\"><span class=\"s1\"><b>Spying<\/b><\/span><\/li>\n<\/ul>\n<p class=\"p9\"><span class=\"s1\">Since modern vehicles are equipped with several cameras for various driving assistance systems, a compromised vehicle could also be used for spying and tapping purposes. <\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li4\"><span class=\"s1\"><b>Fraud<\/b><\/span><\/li>\n<\/ul>\n<p class=\"p9\"><span class=\"s1\">Analogue to malicious fraud on mobile phones, connected cars with built-in e-simcards and the corresponding provider contracts could also be used for the same purposes.<\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li4\"><span class=\"s1\"><b>Spam <\/b><\/span><\/li>\n<\/ul>\n<p class=\"p9\"><span class=\"s1\">Like on any other device, connected to the internet and equipped with a graphical user interface, the car\u2019s infotainment system could also receive spam messages, or even worse, get part of a spam bot net.<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">As you can see, connected cars suffer the same security and privacy issues as many other \u201cconventional\u201d devices. But how is this possible, for products which stem from companies, where safety is one of the highest development goods? A possible explanation lies in the whole car development culture, which is a rather heavy weight and stiff process. New topics, especially in terms of digitalization are often not prioritized properly, due to a lack of understanding and expertise. Looking at a <a href=\"https:\/\/www.mckinsey.de\/files\/mck_connected_car_report.pdf\">study from McKinsey in 2016<\/a>, which stated, that 75% of all OEMs don\u2019t have an actual strategy in the event of a car hack, emphasizes this assumption.&nbsp;<\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">The general mindset should be \u201csafety through security\u201d since connected features indeed have a big benefit for driving assistance systems. To realize such new development cultures, car manufacturers have to open their systems and collaborate with other OEMs and service providers in this area. This would be the end for the current \u201csecurity through obscurity\u201d-paradigm. White-hat-hackers like Miller and Valasek aren\u2019t researching in this area to cause vehicular mayhem. The intent of researchers like them is to create an awareness for security and possible worst-case-scenarios in the connected car environment and work on solutions against the security gaps. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">As a final point of discussion and inspiration for future research, I want to bump some possible solutions to make connected cars finally secure. <\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li4\"><span class=\"s1\"><b>Secure the bus<\/b><\/span><\/li>\n<\/ul>\n<p class=\"p11\"><span class=\"s1\">Carmakers should implement functions to monitor the CAN network for signs of intrusion. All ECUs on the bus should be authenticated with an input validation, in the best case also using security certificates. A step further is the end to end encryption of all CAN-messages, but these would require less complexity, so the number of<span class=\"Apple-converted-space\">&nbsp; <\/span>ECUs on the CAN has to be reduced or curated. <\/span><\/p>\n<p class=\"p11\"><span class=\"s1\">Maybe the readers of this blog have another ideas to secure the CAN as the last instance of a firewall-system in a connected car. Let me know in the comments! <\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li4\"><span class=\"s1\"><b>Update-culture<\/b><\/span><\/li>\n<\/ul>\n<p class=\"p11\"><span class=\"s1\">No system in this world is \u201cunhackable\u201d. So it\u2019s even more important, that possible point of attacks were made obsolete as quick as possible. On most devices, security gaps are closed as soon as possible via patches, available as download. Some automakers already introduced the \u201cupdate-over-the-air\u201d culture, but there are still connected cars on our roads, which have to be recalled to the workshops for every software-update they get. Some owners don\u2019t even update their car software in years. Just imagine this on your computer at home\u2026 <\/span><\/p>\n<ul class=\"ul1\">\n<li class=\"li4\"><span class=\"s1\"><b>Culture change<\/b><\/span><\/li>\n<\/ul>\n<p class=\"p11\"><span class=\"s1\">As already stated, the whole development culture in the automotive industry has to change and adapt best practices from IT- and tech-companies. An open cooperation with consortiums of all carmakers and service providers is needed, to define standards in car security and combine expertise in the cyberwar against car hackers. Additionally they have to be open for models like a bounty hunting program and the open cooperation with researchers and white-hat-hackers. <\/span><\/p>\n<p class=\"p11\"><span class=\"s1\">And now interaction time \u2013 do you have any other ideas, how to define standards for connected car security and make them bullet-proof against malicious attacks?<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In times of the continuing Internet-of-things- and connectivity-hype, a connected variant of \u201cthe German\u2019s favourite toy\u201d cannot be absent. Modern cars, SUVs and lightweight trucks come with all kinds of connected features, from smartphone interface integration up to social media in the navigation system. But what about the security of these features? Is there a [&hellip;]<\/p>\n","protected":false},"author":675,"featured_media":3293,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,26,651],"tags":[],"ppma_author":[741],"class_list":["post-3283","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-allgemein","category-secure-systems","category-system-designs"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/10\/titkle.jpg","jetpack-related-posts":[{"id":25086,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/07\/28\/botnets-on-wheels-how-hackable-are-connected-autonomous-vehicles-and-what-are-we-doing-about-it\/","url_meta":{"origin":3283,"position":0},"title":"\u201cBotnets on Wheels\u201d \u2013 How Hackable Are Connected Autonomous Vehicles And What Are We Doing About It?","author":"zack walker","date":"28. July 2023","format":false,"excerpt":"Can you imagine the vehicle of the future? The vehicle of the future will not have a steering wheel, no pedals for acceleration and brakes \u2013 you will not be able to drive it at all! Most \u2013 if not all \u2013 of you will have heard a lot about\u2026","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/learning-for-autonomous-driving-header-scaled.jpg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/learning-for-autonomous-driving-header-scaled.jpg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/learning-for-autonomous-driving-header-scaled.jpg?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/learning-for-autonomous-driving-header-scaled.jpg?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/learning-for-autonomous-driving-header-scaled.jpg?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/07\/learning-for-autonomous-driving-header-scaled.jpg?resize=1400%2C800&ssl=1 4x"},"classes":[]},{"id":27440,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2025\/02\/27\/how-i-improved-the-network-security-of-my-live-chat-application-architecture-on-aws\/","url_meta":{"origin":3283,"position":1},"title":"How I Improved the Network Security of My Live Chat Application Architecture on AWS","author":"Jannik Scheider","date":"27. February 2025","format":false,"excerpt":"In an increasingly connected world, the need for robust security measures for cloud infrastructures is constantly growing. Applications that are accessible over the internet must be secured in a way that prevents unnecessary exposure of sensitive backend components. A fully public Virtual Private Cloud (VPC) architecture may be sufficient for\u2026","rel":"","context":"In &quot;Cloud Technologies&quot;","block_context":{"text":"Cloud Technologies","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/scalable-systems\/cloud-technologies\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1907,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/02\/28\/microservices-legolizing-software-development-1\/","url_meta":{"origin":3283,"position":2},"title":"Microservices &#8211; Legolizing Software Development I","author":"Korbinian Kuhn, Steffen Mauser","date":"28. February 2017","format":false,"excerpt":"In the first part, we present an example microservice structure, with multiple services, a foreign API interface and a reverse proxy that also allows load balancing.","rel":"","context":"In &quot;System Designs&quot;","block_context":{"text":"System Designs","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/Architecture-01.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/Architecture-01.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2017\/02\/Architecture-01.png?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":3217,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2017\/09\/14\/embedded-security-using-an-esp32\/","url_meta":{"origin":3283,"position":3},"title":"Embedded Security using an ESP32","author":"benjaminmorgner","date":"14. September 2017","format":false,"excerpt":"Ever wondered why your brand-new Philips Hue suddenly starts blinking SOS? Or why there is an ominous Broadcast on your Samsung TV while watching your daily Desperate Housewives? And didn't you wear an Apple Watch a few minutes ago, and why did you buy 2 TVs in that time? Security\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":24051,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2023\/02\/27\/fog-computing-solving-the-limitations-of-cloud-and-edge-computing\/","url_meta":{"origin":3283,"position":4},"title":"Fog Computing: Solving the limitations of Cloud and Edge Computing","author":"Andreas Nicklaus","date":"27. February 2023","format":false,"excerpt":"Fog computing offers a compromise between cloud and edge computing for real-time, scalable data analysis. Ideal for regional applications and IoT. However, authentication and privacy issues must be addressed.","rel":"","context":"In &quot;Allgemein&quot;","block_context":{"text":"Allgemein","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/allgemein\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/edge-computing-diagram-1024x512.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/edge-computing-diagram-1024x512.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/edge-computing-diagram-1024x512.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2023\/08\/edge-computing-diagram-1024x512.png?resize=700%2C400&ssl=1 2x"},"classes":[]},{"id":3910,"url":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/2018\/08\/14\/beyond-corp-a-new-approach-to-enterprise-security\/","url_meta":{"origin":3283,"position":5},"title":"Beyond Corp &#8211; Google&#8217;s approach to enterprise security","author":"Domenik Jockers","date":"14. August 2018","format":false,"excerpt":"What is Beyond Corp? Beyond corp is a concept which was developed and is used by Google and is by now adopted by some other companies. The idea behind it was to get away from the intranet and its perimeter defense, where, if you breach the perimeter you can access\u2026","rel":"","context":"In &quot;Secure Systems&quot;","block_context":{"text":"Secure Systems","link":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/category\/system-designs\/secure-systems\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/blog.mi.hdm-stuttgart.de\/wp-content\/uploads\/2018\/08\/pipeline.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"jetpack_sharing_enabled":true,"authors":[{"term_id":741,"user_id":675,"is_guest":0,"slug":"christian191017","display_name":"Christian Trendli","avatar_url":"https:\/\/secure.gravatar.com\/avatar\/8cc83da060d246c4a9eef00c7fefedde0271489c7c528ae4e13288bb5a5b2b9a?s=96&d=mm&r=g","0":null,"1":"","2":"","3":"","4":"","5":"","6":"","7":"","8":""}],"_links":{"self":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3283","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/users\/675"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/comments?post=3283"}],"version-history":[{"count":12,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3283\/revisions"}],"predecessor-version":[{"id":25489,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/posts\/3283\/revisions\/25489"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media\/3293"}],"wp:attachment":[{"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/media?parent=3283"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/categories?post=3283"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/tags?post=3283"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.mi.hdm-stuttgart.de\/index.php\/wp-json\/wp\/v2\/ppma_author?post=3283"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}