Главная
Study mode:
on
1
Introduction
2
Car Hacking
3
Jeep Cherokee Hack
4
Attack Surfaces
5
Network Connectivity
6
Software Complexity
7
Remote Connectivity
8
PointtoPoint Networking
9
Controller Area Network
10
Network Architectures
11
Exploits
12
Spoofing
13
What can we do
14
Signature vs Anomaly
15
Based Approaches
16
RealTime Model
17
Classification Approach
18
Evaluation
19
Future Work
Description:
Explore the critical field of automotive security in this comprehensive 59-minute lecture by Gedare Bloom from the University of Colorado Colorado Springs. Delve into current trends, challenges, and potential solutions in vehicle cybersecurity. Examine high-profile car hacking incidents, such as the Jeep Cherokee hack, and analyze various attack surfaces including network connectivity, software complexity, and remote access. Understand the intricacies of automotive network architectures, including Controller Area Networks and point-to-point networking. Learn about common exploits like spoofing and discover effective countermeasures. Compare signature-based and anomaly-based approaches to threat detection, and explore real-time model classification techniques. Evaluate the effectiveness of different security strategies and gain insights into future developments in automotive cybersecurity.

Automotive Security - Trends, Problems, Solutions, and Future Work

CAE in Cybersecurity Community
Add to list