Главная
Study mode:
on
1
Intro
2
Session overview
3
Software defined car: New revenue streams
4
Cost savings by using open source platforms
5
The software defined car requires OTA updates
6
Jeep Cherokee hacked in July 2015
7
Jeep Cherokee Head Unit with Wifi
8
Wifi-based breach: Short-range
9
The Controller Area Network (CAN) bus
10
Putting it together
11
More complexity leads to larger attack surface
12
Security patching is done too late
13
Why security patching happens too late
14
Patching connected devices is harder
15
Generic embedded updater workflow
16
Choice of update type has tradeoffs
17
Strategies to reduce the risk of bricking
18
Prepare for securing the software defined car
19
The best way to respond to hacking?
Description:
Explore the critical aspects of securing connected vehicles in this informative conference talk by Eystein Stenberg, CTO at Mender.io. Delve into the opportunities presented by connected cars, exemplified by Tesla's over-the-air (OTA) software updates, and gain insights into the technical details of the Jeep Cherokee hack. Learn best practices for delivering secure OTA software updates with failover management, and understand the anatomy of cyber attacks on connected vehicles. Discover strategies to reduce attack surfaces, implement timely security patching, and navigate the complexities of updating connected devices. Gain valuable knowledge on preparing for the future of software-defined cars and effectively responding to potential security breaches in the automotive industry.

Securing the Connected Car - Opportunities and Security Risks

Linux Foundation
Add to list
0:00 / 0:00