Главная
Study mode:
on
1
Intro
2
USB Fuzzing in the Automotive Industry
3
Current USB Fuzzing Procedures
4
New USB Fuzzing for Car
5
Remove the limitations
6
Automotive Media Player Fuzzing by USB
7
USB Gadget Mode Init Configuration
8
How to generate malformed media files?
9
Failure Detection
10
How to detect failures?
11
How to fuzz USB kernel drivers?
12
Fuzzing USB with Raw Gadget
13
Syzkaller Reproduction Codes
14
How to test with real cars?
15
Vulnerabilities
16
Demo #4: Kernel
17
Conclusion
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Learn about efficient automotive USB fuzzing techniques in this DEF CON 31 Car Hacking Village presentation. Discover how to perform direct USB fuzzing on vehicles by connecting fuzzers directly to cars, moving beyond traditional inefficient commercial media fuzzing methods that require extensive manual testing. Explore practical approaches to both kernel area and media fuzzing, demonstrated through real-world vulnerability discoveries in vehicles like Volkswagen Jetta, Renault Zoe, and GM Chevrolet Equinox. Master key concepts including USB gadget mode configuration, malformed media file generation, failure detection mechanisms, and kernel driver fuzzing using raw gadget implementations. Follow along with detailed demonstrations and gain insights into testing methodologies that can be applied to actual vehicles, complete with Syzkaller reproduction codes and practical vulnerability examples.

Automotive USB Fuzzing: Efficient Methods and Real-World Vulnerabilities

DEFCONConference
Add to list