360° Introduction to
Connected Car Security

by Li Jun, Qihoo 360

It has been a few years passed since the first car hacking case was reported. Since then, there has been various car security-related research paper, presentations, books, etc. For example, we talked about PKE system relay attack in 2017 at HITB. We reported this issue to Telsa and GM, and Telsa did add certain features to disable PKE. We talked about the key fob rolling code encryption key initialization and management issues at DEFCON in 2016. We report this issue to GM and they are working on solving this issue. We talked about CAN Bus intrusion detection in 2016 at HITB.
In this talk, we are planning to do a summary and forecast of the vulnerabilities that hacker/security researchers used or will be using to attack cars. We will discuss the common mistakes car manufacturers made, for example, firmware signature, feature segregation, etc. We will also talk about potential attacks targeting the novel technologies, for example, the Advanced Driver Assistance Systems (ADAS), Computer Vision (CV) used by autonomous cars to detect lanes, and traffic signs recognition and objects detection that use deep learning.

Infosec in the City. Copyright © 2017-2019
IIC Productions (Pte. Ltd.). All rights reserved.

  • @infoseccity
  • @infosec_city

Contact Us  |  Join Our Mailing List   |  Follow Us :