Главная
Study mode:
on
1
Introduction
2
Remote Compromise
3
CAN Injection
4
Remote Attack Surface
5
Bluetooth
6
Radio Data System
7
Internet / Apps
8
Cyber Physical: 050 Distance Control
9
Cyber Physical: 050 Adaptive Front Lighting
10
Cyber Physical: 050 Intelligent Cruise Control
11
Cyber Physical: 050 Active Lane Control
12
Cyber Physical: Cherokee Self Parking
13
Collision prevention
14
Goals
15
The internet is hard, let's go shopping
16
Legend
17
Audi A8 (2014)
18
Honda Accord LX (2014)
19
Infiniti Q50 (2014)
20
Infiniti G37 (2010)
21
Jeep Cherokee (2014)
22
Dodge Ram 3500 (2014)
23
Chrysler 300 (2014)
24
Dodge Viper (2014)
25
Range Rover Sport (2006)
26
Analysis
27
Learn, Detect, Prevent
28
Conclusions
Description:
Explore a comprehensive survey of remote automotive attack surfaces in this 58-minute Black Hat conference talk by Charlie Miller and Chris Valasek. Delve into the security vulnerabilities of modern vehicles, examining potential remote attacks that could enable eavesdropping, manipulate steering, or disable brakes. Analyze automotive networks across various manufacturers to compare security levels, track changes over time, and anticipate future trends. Investigate specific cyber-physical systems, including distance control, adaptive front lighting, and self-parking features. Gain insights into remote compromise methods, CAN injection, and various attack vectors such as Bluetooth and internet-connected apps. Evaluate security measures for different car models, including Audi, Honda, Infiniti, Jeep, Dodge, Chrysler, and Range Rover. Learn strategies for detecting and preventing automotive cyber attacks, and understand the implications for future vehicle security.

A Survey of Remote Automotive Attack Surfaces

Black Hat
Add to list
0:00 / 0:00