Automotive Cybersecurity: Test Like a Hacker

Mar. 30, 2023
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
Automotive Cybersecurity: Test Like a Hacker
1 of 46

More Related Content

What's hot

Comparison Between CAN and CAN FDComparison Between CAN and CAN FD
Comparison Between CAN and CAN FDEmbitel Technologies (I) PVT LTD
ISO 26262: Automotive Functional SafetyISO 26262: Automotive Functional Safety
ISO 26262: Automotive Functional SafetyEmbitel Technologies (I) PVT LTD
Automotive Security (Connected Vehicle Security Issues)Automotive Security (Connected Vehicle Security Issues)
Automotive Security (Connected Vehicle Security Issues)Priyanka Aash
Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System
Simultaneously Leveraging Linux and Android in a GENIVI compliant IVI System mentoresd
Autonomous Vehicles: Technologies, Economics, and OpportunitiesAutonomous Vehicles: Technologies, Economics, and Opportunities
Autonomous Vehicles: Technologies, Economics, and OpportunitiesJeffrey Funk
Smart transportation | Intelligent transportation system (ITS)Smart transportation | Intelligent transportation system (ITS)
Smart transportation | Intelligent transportation system (ITS)Qualcomm Wireless Evolution

What's hot(20)

Similar to Automotive Cybersecurity: Test Like a Hacker

theVIVI-AD-Security-Workshop_AfricaHackon2019.pdftheVIVI-AD-Security-Workshop_AfricaHackon2019.pdf
theVIVI-AD-Security-Workshop_AfricaHackon2019.pdfGabriel Mathenge
Penetrating Windows 8 with syringe utilityPenetrating Windows 8 with syringe utility
Penetrating Windows 8 with syringe utilityIOSR Journals
Sp Security 101 Primer 2 1Sp Security 101 Primer 2 1
Sp Security 101 Primer 2 1Barry Greene
Code instrumentationCode instrumentation
Code instrumentationMennan Tekbir
Proving the Security of Low-Level Software Components & TEEsProving the Security of Low-Level Software Components & TEEs
Proving the Security of Low-Level Software Components & TEEsAshley Zupkus
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1  Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1
Advanced Malware Analysis Training Session 2 - Botnet Analysis Part 1 securityxploded

Recently uploaded

Vintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdfVintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdf
Vintage Computing Festival Midwest 18 2023-09-09 What's In A Terminal.pdfRichard Thomson
ComputerIntroduction.pptComputerIntroduction.ppt
ComputerIntroduction.pptIlaiyarajaS2
Introduction to Data Science.pptxIntroduction to Data Science.pptx
Introduction to Data Science.pptxAnusuya123
Work Pattern Analysis with and without Site-specific Information in a Manufac...Work Pattern Analysis with and without Site-specific Information in a Manufac...
Work Pattern Analysis with and without Site-specific Information in a Manufac...Kurata Takeshi
Bricks.pptxBricks.pptx
Bricks.pptxSubhamSharma20947
Data Communication & Computer NetworksData Communication & Computer Networks
Data Communication & Computer NetworksSreedhar Chowdam

Automotive Cybersecurity: Test Like a Hacker

Editor's Notes

  1. We can try to reproduce their steps ourselves and it will get fairly technical. Could walk through all the details, but this is mostly if you are interested in exploitation research. At this point, as Defenders we already validated the finding and understand impact. However, it is important to understand the attacker mindset and also capabilities.
  2. Mayhem plugs into your existing development process where-ever you are doing software tests already. In cyber-physical systems this is typically in the software in the loop testing process (SIL). The advantage of plugging in is that all your existing processes, including tracing results back to requirements, don’t need to change. Mayhem outputs the equivalent of a new test case, either for new code coverage or an actual exploit.
  3. Mayhem plugs into your existing development process where-ever you are doing software tests already. In cyber-physical systems this is typically in the software in the loop testing process (SIL). The advantage of plugging in is that all your existing processes, including tracing results back to requirements, don’t need to change. Mayhem outputs the equivalent of a new test case, either for new code coverage or an actual exploit.
  4. Mayhem plugs into your existing development process where-ever you are doing software tests already. In cyber-physical systems this is typically in the software in the loop testing process (SIL). The advantage of plugging in is that all your existing processes, including tracing results back to requirements, don’t need to change. Mayhem outputs the equivalent of a new test case, either for new code coverage or an actual exploit.
  5. multiply that by a 1000 and you get an idea