Главная
Study mode:
on
1
Intro
2
Recap: normal unmodified cars can be remotely compromised
3
A typical automobile network
4
Car insides are not hardened...
5
Remote compromise vectors
6
Involuntary braking demo
7
The story of our disclosure
8
What happened?
9
Contrast: Miller & Valasek
10
Summary
Description:
Explore the evolution of automotive security in this 22-minute conference talk from USENIX Enigma 2016. Delve into how modern vehicles have transformed from mechanical conveyances to complex distributed systems, and learn about the potential vulnerabilities in automotive firmware that could allow adversaries to gain control over vehicles. Examine the changing landscape of automotive security vulnerabilities, the unique challenges within the automotive sector, and the impact of different disclosure approaches on industry and government responses. Gain insights into typical automobile networks, remote compromise vectors, and real-world demonstrations of involuntary braking. Compare and contrast disclosure methods, and understand their consequences for the automotive industry's security practices.

Modern Automotive Security: History, Disclosure, and Consequences - USENIX Enigma 2016

USENIX Enigma Conference
Add to list