Главная
Study mode:
on
1
Introduction
2
Who am I
3
My car hacking history
4
Charlie Miller
5
Bugcrowd Bug Bash
6
I can steal a vehicle
7
My own car
8
Radar hack
9
Car theft
10
New job
11
Vehicle in motion
12
Fuel gauge update
13
Mito Direct notifications
14
Initial investigations
15
Second vehicle
16
Emergency start device
17
Claimed devices
18
Electronics
19
Reverse Engineering
20
Bench Testing
21
Inject Chip Select
22
The Circuit
23
How it works
24
Top 3 FAQs
25
Firewall
26
Headlight Cluster
27
Media Coverage
28
Vice
29
Industry Coverage
30
The CV
31
Testing
32
Disclosure Process
33
LinkedIn Post
34
Potential fixes
35
Short term fix
36
Permanent fix
37
Tacoma speaker
38
Jaguar Land Rover
39
Thank you
Description:
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only! Grab it Learn about a real-world car theft investigation in this DEF CON 31 Car Hacking Village presentation that details how a security researcher's Toyota RAV4 was stolen using CAN injection techniques. Explore the technical aspects of CAN bus operations, frame spoofing methods, and modified transceiver usage to disable ECU communications. Follow the investigative journey from initial discovery through electronics reverse engineering, bench testing, and circuit analysis. Gain insights into the disclosure process with manufacturers, media coverage, and potential security fixes for the automotive industry. Understand the implications of vehicle security vulnerabilities through firsthand experience, complete with detailed explanations of the theft device's functionality, industry response, and proposed countermeasures. Discover practical knowledge about automotive security weaknesses and their real-world exploitation through this comprehensive analysis of a sophisticated car theft case study.

CAN Injection and Vehicle Security: Investigation of Modern Car Theft Techniques

DEFCONConference
Add to list