Главная
Study mode:
on
1
Intro
2
About me
3
Session overview
4
Software defined car: New revenues
5
Cost savings by using open sour
6
The software defined car requires OTA updates
7
Jeep Cherokee hacked in July 2015
8
Jeep Cherokee Head Unit with Wifi
9
Wifi-based breach: Short-range
10
Cellular-based breach: Country-wide
11
CAN bus
12
Putting it together
13
The Controller Area Network (CAN) bus
14
More complexity leads to larger attack surface
15
Security patching is done too late
16
Why security patching happens too late
17
Patching connected devices is harder
18
Embedded client patching process Overview
19
Choice of update type has tradeoffs
20
Strategies to reduce the risk of bricking
21
Prepare for securing the software defined ca
Description:
Explore the critical aspects of securing connected vehicles in this 43-minute conference talk by Eystein Stenberg, Product Manager at Mender.io. Delve into real-world examples of connected car opportunities, including Tesla's over-the-air updates and their impact on accident reduction. Examine the technical details of the Jeep Cherokee hack, learning how attackers gained remote control and what steps can be taken to mitigate such risks. Discover best practices for implementing secure over-the-air software updates with failover management. Gain insights from Stenberg's extensive experience in security and systems management, covering topics such as the anatomy of car hacks, the importance of timely security patching, and strategies to reduce attack surfaces in increasingly complex automotive systems.

Securing the Connected Car: Opportunities, Risks, and Best Practices

Linux Foundation
Add to list