Главная
Study mode:
on
1
Intro
2
Transformation of the Automotive Industry
3
Securing the Connected Car & Defending a Fleet
4
Diversity of a Fleet
5
Three Key Challenges of Ongoing Fleet Defense
6
Principles of FleetSecOps
7
Strong White Hot Community Is Key
8
Security Solutions for Connected Car
9
Research Procedure
10
Attack surfaces of Connected Cars Cloud Side
11
Attack chains - Near field
12
Build a Testbench-key components
13
Build a Testbench - Source the key components
14
Build a Testbench - Telematics Control Unit
15
Build a Testbench - In-vehicle infotainment System
16
Build a Testbench - Connection
17
Build a Testbench - Against the anti-theft system
18
Build a Testbench - Obtain signals from a real car
19
Build a Testbench - Successful testbench
20
Timeline
21
Impact of our findings
22
Global Cyber Security Program
23
Summary
Description:
Explore a conference talk detailing Mercedes-Benz's approach to cybersecurity and 360 Group's research on Mercedes-Benz vehicles. Delve into the transformation of the automotive industry, challenges in securing connected cars, and principles of fleet security operations. Learn about attack surfaces, near-field attack chains, and the process of building a testbench for security research. Discover the impact of findings and gain insights into Mercedes-Benz's Global Cyber Security Program, emphasizing the importance of leveraging the security community's skills to defend a diverse luxury fleet.

Mercedes-Benz and 360 Group - Defending a Luxury Fleet with the Community

RSA Conference
Add to list
0:00 / 0:00