The networked electronics found in modern vehicles provide many useful and cool benefits, such as fuel savings, parking assist, and collision avoidance. Most of these features involve passing data among vehicle systems and human drivers. This connectivity also offers hackers new potential exploits. According to research presented last month by U-M researchers Kyong-Tak Cho and Kang Shin at the ACM Conference on Computer and Communications Security in Vienna, the controller area network (CAN) protocol implemented by in-vehicle networks has a new and potentially quite dangerous vulnerability. The attack, known as a bus-off attack, exploits the CAN’s built-in error handling facilities to potentially nuke both contemporary insecure CANs and future secured versions.