Check out the informative presentation Grant Bodley put together for the last Automotive Cyber Security Summit.
What is your position on vigilante hackers? You will have a chance to meet one in March. Chris Valasek, Security Lead at Uber's Advanced Technologies Center, and famed Jeep hacker, will be speaking at the 3rd Automotive Cyber Security Summit. We tracked him down in advance of his session to ask him about his motivations, which arm of the auto industry was responsible for the openings he expolited, and his experience as a white hat.
The US telecommunications company, according to a Reuters news article, wishes to strengthen its position on the market for internet-connected devices. This way, it could provide a competitive platform against other internet and communications companies, such as Verizon and Google Inc. AT&T’s products, ‘Digital Life’ for the home security and automation service and ‘Drive’ for the connected car service, will operate as one, users being able to control various home functions from the car’s dashboard.
For your convenience, we've provided a transcript of our exclusive interview with Chris Valasek, Director of Director of Vehicle Security Research at IOActive, and past speaker at our Summit. Within he discusses how he breached a vehicle on the highway last month to expose its cyber security vulnerabilities.
Chris Valasek, Director of Director of Vehicle Security Research at IOActive, and past speaker at our Summit, discusses how he breached a vehicle on the highway to expose its cyber security vulnerabilities in this exclusive video interview.
Check out this super informative article about the cars of the future and their susceptibility to hackers taken director from Automotive IQ!
Barbara Ciaramitaro presents "Technology Overdrive," Understanding the Security Impact that the Advanced Machinery has throughout Infrastructure of the Car.
This thorough, 200-page report, courtesy of the RAND Transportation, Space, and Technology Program, explores legislative activity, cyber hacks, the role of telematics and communications, and liability implications, among many other topics surrounding autonomous cars.
Doug Moeller reviews the "Principles of Automotive Cyber Security" in this informational presentation.
Automotive cybersecurity issues have emerged as information technologies are increasingly deployed in modern vehicles, and security researchers have already demonstrated the associated threats and risks. Although many security protocols have been proposed, they have not considered the threats posed by denial-of-service (DoS) attacks and external connectivity vulnerabilities.
Automotive IQ recently spoke with Florian Netter of Audi Electronics Venture about the current state of Automotive BUS Systems and Ethernet. Cyber security is a real challenge within BUS systems. Cyber security is and will ever be a challenge for the E/E architecture. And the more holistic the driver-supporting software interacts, the more important cyber security is.
This 2015 report still holds true in the automotive cyber security industry currently. Check out what the automakers really think is going on in the world of all things automotive technology!
Henry Bzeih, CTO & Head of Connected Car at KIA Motors America, and past speaker at our summit, discusses the main challenges that OEMS and Tier 1 companies are experiencing in in the automotive security space, in this exclusive on-site video interview.
The Automotive Industry is stepping up their protection in order to keep hackers at bay in their connected vehicles. Both state and federal government are in agreement to make a change! Download this article to check out what individual states and groups have in the works.
Andre is no stranger to analyzing automotive cyber security. In fact, in his role at the Lear Corporation he heads up their V2X department working with the analytics that encompass why consumer vehicles are susceptible to hacking and how to improve their security. Download his interview to read more!
Josh Corman, Founder of I am the Cavalry, and returning speaker at the approaching summit, goes into industry challenges, and makes predictions for where automotive security is going in the next few years, in this exclusive on-site video interview.
Kyusuk Han, University of Michigan, and past speaker at our summit, presents case studies of cyber attacks on automobiles, discusses types of attackers and their capabilities, and suggests countermeasures against attacks in this thorough past presentation.
The Ponemon Institute recently conducted a cybersecurity survey sponsored by Rogue Wave Software and Security Innovation of over 500 automotive developers, engineers, and executives, primarily from automotive OEMs and Tier One suppliers. Find out the key findings of the developer survey within!
Matthew Carpenter, Principal Security Researcher at Grimm, and past speaker at our summit, talks industry challenges, and what it would take to overhaul cyber security incident mapping, in this exclusive on-site video interview.
Henry Bzeih, CTO at KIA, and past speaker at our summit, explores privacy management & transparency, data minimization, and examples of sensitive information in this in-depth case study.
Bradley Miller, Legal & Regulatory Affairs at NADA, Saylor Frase, President and CEO at nuspire, Tim Vidas, Security Futurist & Senior Research Analyst at Dell, Jim Foote, VP & Business Security officer at CDK Global, and Dave Austin, CIO at Berkshire Hathaway Automotive, all past speakers at our summit, provide statistics on the areas to protect, retail complexity, and securing the retail environment in this informative past presentation.
Previous research has shown that it is possible for an attacker to get remote code execution on the electronic control units (ECU) in automotive vehicles via various interfaces such as the Bluetooth interface and the telematics unit. This paper aims to expand on the ideas of what such an attacker could do to influence the behavior of the vehicle after that type of attack. In particular, we demonstrate how on two different vehicles that in some circumstances we are able to control the steering, braking, acceleration and display. We also propose a mechanism to detect these kinds of attacks. In this paper we release all technical information needed to reproduce and understand the issues involved including source code and a description of necessary hardware. Courtesy of: Charlie Miller
This paper investigates why physical control inconsistencies exist and present techniques that can be leveraged to more fully obtain control of the physical systems of the car while only injecting CAN bus messages. It also discusses ways to makes these systems more robust to CAN message injection. Courtesy of: Charlie Miller
This exclusive ebook includes:
- ARTICLE #1 "How vulnerable are automakers to cyber attacks?"
- INFOGRAPHIC "Carjacking - risks of the internet-connected car"
- WHITEPAPER "Connected car driving change in defect detection"
- ARTICLE #2 "When does a cyber attack become a functional safety issue?"
- PRESENTATION #1 "Volvo presents collaborative security"
- PRESENTATION #2 "Stanley Law Group presents legal concerns for stakeholders: the Cahen case and beyond"
Safety Expectations for Automated and Autonomous Vehicles - Liability arising from basic technology vs. future technology
These are some of the most influential presentations taken from the top experts within the automotive cyber security industry coming from:
- Volvo Car Group
- Siemens Corporate Technology Safety
- Jaguar Land Rover, UK
- HELLA KGaA Hueck & Co.
Solutions to Address the Cybersecurity Risks Faced by Automotive IoT Applications and Connected Cars
Explore this complementary Technical Paper from SAE’s Cybersecurity Collection. SAE’s Cybersecurity Knowledge Hub is a comprehensive source for timely, authoritative information related to the cyber-physical security of end-to-end vehicle and product design, risk mitigation, workforce development resources, training, standards, and more.
Most organizations have some idea about how to make their software more secure, but it is almost always at odds with the goals of their DevOps culture. Find out more about DevOps, threat modeling, secure development, automated testing and more!
In partnership with our 2018 speaker faculty, we created this list of the Top 5 Automotive Cyber Security Vulnerabilities expected to take center stage in 2018. Learn more about the major cyber security threats the auto industry currently face, how the industry is collectively addressing them and more in this infographic.
To receive this document via email, please contact us at firstname.lastname@example.org with "Content Request - Top 5 Automotive Cyber Security Vulnerabilities" in the subject line.