SlideShare a Scribd company logo
Automotive Exploitation Techniques
Craig Smith
@OpenGarages
Identifying ExploitsIdentifying Exploits
Attack SurfaceAttack Surface
PayloadPayload
Attack Surface
Common Components
Payloads
● Run on IVI
– Listen over MIC
– Pull contacts
– Communicate with CELL
● Manipulate vehicle Components
– Affect Steering and Controls
– Unlock Vehicle
– Start Car
● Reflash firmware
– Permanent Changes
– Bypass protections
Vehicle Network Payloads
CAN Bus Complications
● Can't shutoff the device you want to spoof
● Need to talk more often than original source
● Each Make/Model is different
● IDS Systems?
Passive Vehicle Detection
● CAN of Fingers (c0f)
How c0f works
Utilizing c0f results in Exploits
$ c0f --fpdb test/sample.db --logfile test/honda-civic-
2007.dump
Loaded 1 fingerprints from DB
{"Make":"Honda","Model":"Civic","Year":"2009","Trim":"Hyb
rid","Dynamic":"true","Common":[{"ID":"164"},{"ID":"136"},
{"ID":"13A"},{"ID":"13F"},{"ID":"17C"},{"ID":"158"},
{"ID":"188"}],"MainID":"17C","MainInterval":"0.0099985711
7722198","Confidence":64}
Bonus Identification
$ c0f --find-pattern bBbBbbbB --logfile test/sample-can.log --quiet --no-print-fp
{ "Matches": [ { "ID": "095", "Position": "6", "Values": [ "0", "1" ] }] }
$ grep 095# test/sample-can.log | head
(1398128223.810456) can0 095#800007F400000108
(1398128223.820460) can0 095#800007F400000017
(1398128223.830460) can0 095#800007F400000126
(1398128223.840462) can0 095#800007F400000035
(1398128223.850465) can0 095#800007F400000108
(1398128223.860468) can0 095#800007F400000117
(1398128223.870470) can0 095#800007F400000126
(1398128223.880471) can0 095#800007F400000035
(1398128223.890477) can0 095#800007F400000108
(1398128223.900480) can0 095#800007F400000017
Where to get c0f?
● https://github.com/zombieCraig/c0f
● Gem install c0f
F1337 Management
F1337 Mgmt Structure
Checks Server
For Commands
In Queue
Enter Commands
For Vehicles over
Web Interface
NBC Demo
Client API
● Request
– ?poll=<VIN|UID>&methods=<SUPPORTED>
● Response (multi-line)
– Wipers <on|off>
– Lights <on|off|flash>
– Flood <rpm|temp|fuel>
– Cansend <dev> <packet>
– Cansend stop
Command Interface
● Web based AJAX. PHP back-end
● Terminal Emulation
● Login Credentials
● Fleet Management
● Basic scripting capabilities
Future Direction
● Grouping of vehicles
● DB Backend with saved state
● Additional reporting (DTC, GEO Location)
Where to get F1337?
What Can Be Done?
Further Research
● Open Garages
– http://opengarages.org
– @OpenGarages
● IamTheCavalry
– http://iamthecavalry.org
– @IAmTheCavalry
Car Hacker's Handbook
Next Version Teaser ToC (3x size):
00_ReadMe
01_Intro
02_Policies
03_ThreadModeling
04_SocketCAN
05_Vehicle_Comm
06_DiagnosticComm
07_Canbus_RE
08_ECU_Hacking
09_ECU_Test_Benches
10_BreakingIt
11_Infotainment
12_V2V
13_Weaponizing
14_TPMS
15_Keysystems
16_HotWiring
17_EmbeddedSystemAttacks
18_PerformanceTuning
19_OpenGarages
20_Legal
Automotive Exploitation Techniques by Craig Smith

More Related Content

What's hot

Adoption of Connected Automated Vehicles for Traffic Safety
Adoption of Connected Automated Vehicles for Traffic SafetyAdoption of Connected Automated Vehicles for Traffic Safety
Adoption of Connected Automated Vehicles for Traffic Safety
Texas A&M Transportation Institute
 
Connected Car Investment Thesis
Connected Car Investment ThesisConnected Car Investment Thesis
Connected Car Investment Thesis
James Harris
 
Adrian Pearmine, DKS Associates - Connected & Autonomous Vehicles 101 (Octobe...
Adrian Pearmine, DKS Associates - Connected & Autonomous Vehicles 101 (Octobe...Adrian Pearmine, DKS Associates - Connected & Autonomous Vehicles 101 (Octobe...
Adrian Pearmine, DKS Associates - Connected & Autonomous Vehicles 101 (Octobe...
Forth
 
Future Of Driving
Future Of DrivingFuture Of Driving
Future Of Driving
German Auto Specialist
 
Developing for the Connected Car
Developing for the Connected CarDeveloping for the Connected Car
Developing for the Connected Car
Qualcomm Developer Network
 
Automated Driving: Innovative Product Development & Safety
Automated Driving: Innovative Product Development & SafetyAutomated Driving: Innovative Product Development & Safety
Automated Driving: Innovative Product Development & Safety
AssociationofEquipmentManufacturers
 
Safety Impacts of Connected and Automated Vehicles
Safety Impacts of Connected and Automated VehiclesSafety Impacts of Connected and Automated Vehicles
Safety Impacts of Connected and Automated Vehicles
Texas A&M Transportation Institute
 
Autonomous vehicles
Autonomous vehiclesAutonomous vehicles
Autonomous vehicles
Rabiya Khalid
 
Autonomous cars
Autonomous carsAutonomous cars
Autonomous cars
NoumanAmjad6
 
The Internet of Cars - Towards the Future of the Connected Car
The Internet of Cars - Towards the Future of the Connected CarThe Internet of Cars - Towards the Future of the Connected Car
The Internet of Cars - Towards the Future of the Connected Car
Jorgen Thelin
 
Tesla as io t case study brief for learning purpuses
Tesla as io t case study brief for learning purpusesTesla as io t case study brief for learning purpuses
Tesla as io t case study brief for learning purpuses
Kristina Turilova
 
Connected and Automated Vehicles: Where Are We Going and What Happens When We...
Connected and Automated Vehicles: Where Are We Going and What Happens When We...Connected and Automated Vehicles: Where Are We Going and What Happens When We...
Connected and Automated Vehicles: Where Are We Going and What Happens When We...
Center for Transportation Research - UT Austin
 
The Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris ValasekThe Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris Valasek
CODE BLUE
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
Security Innovation
 
Connected and Autonomous Vehicle Systems R&D Overview
Connected and Autonomous Vehicle Systems R&D OverviewConnected and Autonomous Vehicle Systems R&D Overview
Connected and Autonomous Vehicle Systems R&D Overview
Center for Transportation Research - UT Austin
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
Sasken Technologies Ltd.
 
IoT for V2V and Connected Car - AW Megatrends `14 panel
IoT for V2V and Connected Car - AW Megatrends `14 panelIoT for V2V and Connected Car - AW Megatrends `14 panel
IoT for V2V and Connected Car - AW Megatrends `14 panel
Joe Speed
 
2015 Florida Automated Vehicles Initiative - FDOT - FTA
2015 Florida Automated Vehicles Initiative - FDOT - FTA2015 Florida Automated Vehicles Initiative - FDOT - FTA
2015 Florida Automated Vehicles Initiative - FDOT - FTA
Florida Trucking Association
 
Auto Cars and IOT
Auto Cars and IOTAuto Cars and IOT
Auto Cars and IOT
pinumalla sumanth
 
Automated Vehicles: lead or follow
Automated Vehicles: lead or followAutomated Vehicles: lead or follow
Automated Vehicles: lead or follow
Advisian
 

What's hot (20)

Adoption of Connected Automated Vehicles for Traffic Safety
Adoption of Connected Automated Vehicles for Traffic SafetyAdoption of Connected Automated Vehicles for Traffic Safety
Adoption of Connected Automated Vehicles for Traffic Safety
 
Connected Car Investment Thesis
Connected Car Investment ThesisConnected Car Investment Thesis
Connected Car Investment Thesis
 
Adrian Pearmine, DKS Associates - Connected & Autonomous Vehicles 101 (Octobe...
Adrian Pearmine, DKS Associates - Connected & Autonomous Vehicles 101 (Octobe...Adrian Pearmine, DKS Associates - Connected & Autonomous Vehicles 101 (Octobe...
Adrian Pearmine, DKS Associates - Connected & Autonomous Vehicles 101 (Octobe...
 
Future Of Driving
Future Of DrivingFuture Of Driving
Future Of Driving
 
Developing for the Connected Car
Developing for the Connected CarDeveloping for the Connected Car
Developing for the Connected Car
 
Automated Driving: Innovative Product Development & Safety
Automated Driving: Innovative Product Development & SafetyAutomated Driving: Innovative Product Development & Safety
Automated Driving: Innovative Product Development & Safety
 
Safety Impacts of Connected and Automated Vehicles
Safety Impacts of Connected and Automated VehiclesSafety Impacts of Connected and Automated Vehicles
Safety Impacts of Connected and Automated Vehicles
 
Autonomous vehicles
Autonomous vehiclesAutonomous vehicles
Autonomous vehicles
 
Autonomous cars
Autonomous carsAutonomous cars
Autonomous cars
 
The Internet of Cars - Towards the Future of the Connected Car
The Internet of Cars - Towards the Future of the Connected CarThe Internet of Cars - Towards the Future of the Connected Car
The Internet of Cars - Towards the Future of the Connected Car
 
Tesla as io t case study brief for learning purpuses
Tesla as io t case study brief for learning purpusesTesla as io t case study brief for learning purpuses
Tesla as io t case study brief for learning purpuses
 
Connected and Automated Vehicles: Where Are We Going and What Happens When We...
Connected and Automated Vehicles: Where Are We Going and What Happens When We...Connected and Automated Vehicles: Where Are We Going and What Happens When We...
Connected and Automated Vehicles: Where Are We Going and What Happens When We...
 
The Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris ValasekThe Current State of Automotive Security by Chris Valasek
The Current State of Automotive Security by Chris Valasek
 
Connected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality CheckConnected Cars - Poster Child for the IoT Reality Check
Connected Cars - Poster Child for the IoT Reality Check
 
Connected and Autonomous Vehicle Systems R&D Overview
Connected and Autonomous Vehicle Systems R&D OverviewConnected and Autonomous Vehicle Systems R&D Overview
Connected and Autonomous Vehicle Systems R&D Overview
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
 
IoT for V2V and Connected Car - AW Megatrends `14 panel
IoT for V2V and Connected Car - AW Megatrends `14 panelIoT for V2V and Connected Car - AW Megatrends `14 panel
IoT for V2V and Connected Car - AW Megatrends `14 panel
 
2015 Florida Automated Vehicles Initiative - FDOT - FTA
2015 Florida Automated Vehicles Initiative - FDOT - FTA2015 Florida Automated Vehicles Initiative - FDOT - FTA
2015 Florida Automated Vehicles Initiative - FDOT - FTA
 
Auto Cars and IOT
Auto Cars and IOTAuto Cars and IOT
Auto Cars and IOT
 
Automated Vehicles: lead or follow
Automated Vehicles: lead or followAutomated Vehicles: lead or follow
Automated Vehicles: lead or follow
 

Viewers also liked

Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin VigoBreaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Shakacon
 
802.11 mgt-opern
802.11 mgt-opern802.11 mgt-opern
802.11 mgt-opern
akruthi k
 
802.11: Ethernet Marches On
802.11: Ethernet Marches On802.11: Ethernet Marches On
802.11: Ethernet Marches On
Robert Berger
 
Keeping warm in a cooler house
Keeping warm in a cooler houseKeeping warm in a cooler house
Keeping warm in a cooler house
Ronald Veisenberger
 
1.9 VW TDI with Pumpe Duse
1.9 VW TDI with Pumpe Duse1.9 VW TDI with Pumpe Duse
1.9 VW TDI with Pumpe Duse
Ronald Veisenberger
 
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
FFRI, Inc.
 
Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean M...
Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean M...Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean M...
Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean M...
Shakacon
 
Social Engineering the Windows Kernel by James Forshaw
Social Engineering the Windows Kernel by James ForshawSocial Engineering the Windows Kernel by James Forshaw
Social Engineering the Windows Kernel by James Forshaw
Shakacon
 
Trans&logistics perspective v6
Trans&logistics perspective v6Trans&logistics perspective v6
Trans&logistics perspective v6
James Harris
 
Cyber Security for the Connected Car
Cyber Security for the Connected Car Cyber Security for the Connected Car
Cyber Security for the Connected Car
Real-Time Innovations (RTI)
 
CSW2017 Harri hursti csw17 final
CSW2017 Harri hursti csw17 finalCSW2017 Harri hursti csw17 final
CSW2017 Harri hursti csw17 final
CanSecWest
 
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CanSecWest
 
CSW2017 jun li_car anomaly detection
CSW2017  jun li_car anomaly detectionCSW2017  jun li_car anomaly detection
CSW2017 jun li_car anomaly detection
CanSecWest
 
ppt
pptppt
Connected Car Technology
Connected Car TechnologyConnected Car Technology
Connected Car Technology
Pro Car Mechanics
 
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu securityCSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CanSecWest
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CanSecWest
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
Cisco Canada
 
The Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use casesThe Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use cases
Deloitte United States
 
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Qinghao tang+Xinlei ying vmware_escape_finalCSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CanSecWest
 

Viewers also liked (20)

Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin VigoBreaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
Breaking Vaults - Stealing Lastpass Protected Secrets by Martin Vigo
 
802.11 mgt-opern
802.11 mgt-opern802.11 mgt-opern
802.11 mgt-opern
 
802.11: Ethernet Marches On
802.11: Ethernet Marches On802.11: Ethernet Marches On
802.11: Ethernet Marches On
 
Keeping warm in a cooler house
Keeping warm in a cooler houseKeeping warm in a cooler house
Keeping warm in a cooler house
 
1.9 VW TDI with Pumpe Duse
1.9 VW TDI with Pumpe Duse1.9 VW TDI with Pumpe Duse
1.9 VW TDI with Pumpe Duse
 
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
 
Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean M...
Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean M...Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean M...
Red vs Blue- Modern Atice Directory Attacks, Detection & Protection by Sean M...
 
Social Engineering the Windows Kernel by James Forshaw
Social Engineering the Windows Kernel by James ForshawSocial Engineering the Windows Kernel by James Forshaw
Social Engineering the Windows Kernel by James Forshaw
 
Trans&logistics perspective v6
Trans&logistics perspective v6Trans&logistics perspective v6
Trans&logistics perspective v6
 
Cyber Security for the Connected Car
Cyber Security for the Connected Car Cyber Security for the Connected Car
Cyber Security for the Connected Car
 
CSW2017 Harri hursti csw17 final
CSW2017 Harri hursti csw17 finalCSW2017 Harri hursti csw17 final
CSW2017 Harri hursti csw17 final
 
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg dayCSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
CSW2017 Kyle ehmke lots of squats- ap-ts never miss leg day
 
CSW2017 jun li_car anomaly detection
CSW2017  jun li_car anomaly detectionCSW2017  jun li_car anomaly detection
CSW2017 jun li_car anomaly detection
 
ppt
pptppt
ppt
 
Connected Car Technology
Connected Car TechnologyConnected Car Technology
Connected Car Technology
 
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu securityCSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
CSW2017 Qiang li zhibinhu_meiwang_dig into qemu security
 
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoTCSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
CSW2017 Yuhao song+Huimingliu cyber_wmd_vulnerable_IoT
 
101 Use Cases for IoT
101 Use Cases for IoT101 Use Cases for IoT
101 Use Cases for IoT
 
The Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use casesThe Internet of Things: Exploring revenue generating use cases
The Internet of Things: Exploring revenue generating use cases
 
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Qinghao tang+Xinlei ying vmware_escape_finalCSW2017 Qinghao tang+Xinlei ying vmware_escape_final
CSW2017 Qinghao tang+Xinlei ying vmware_escape_final
 

Similar to Automotive Exploitation Techniques by Craig Smith

From Driver Distraction to Driver Augmentation: Open Source in Cars
From Driver Distraction to Driver Augmentation: Open Source in CarsFrom Driver Distraction to Driver Augmentation: Open Source in Cars
From Driver Distraction to Driver Augmentation: Open Source in Cars
Alison Chaiken
 
Edmunds presentation
Edmunds presentationEdmunds presentation
Edmunds presentation
Alison Chaiken
 
Владимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challengesВладимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challenges
HackIT Ukraine
 
Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?
Gilad Bandel
 
Microsoft Automotive Business Unit - J Za
Microsoft Automotive Business Unit - J ZaMicrosoft Automotive Business Unit - J Za
Microsoft Automotive Business Unit - J Za
mfrancis
 
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systems
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systemsSolutions for ADAS and AI data engineering using OpenPOWER/POWER systems
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systems
Ganesan Narayanasamy
 
Why Cars Need Free Software
Why Cars Need Free SoftwareWhy Cars Need Free Software
Why Cars Need Free Software
Alison Chaiken
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Mahbubul Alam
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
null - The Open Security Community
 
Mobileye Project
Mobileye ProjectMobileye Project
Mobileye Project
Albert Jordan
 
droidcon 2012: The Android passenger, Joerg Decker, Capgemini
droidcon 2012: The Android passenger, Joerg Decker, Capgeminidroidcon 2012: The Android passenger, Joerg Decker, Capgemini
droidcon 2012: The Android passenger, Joerg Decker, Capgemini
Droidcon Berlin
 
Tier X and the Coming of the Whitebox Car
Tier X and the Coming of the Whitebox CarTier X and the Coming of the Whitebox Car
Tier X and the Coming of the Whitebox Car
Alison Chaiken
 
SCALE 2012: Automotive: new frontier for mobile Linux
SCALE 2012: Automotive: new frontier for mobile LinuxSCALE 2012: Automotive: new frontier for mobile Linux
SCALE 2012: Automotive: new frontier for mobile Linux
Alison Chaiken
 
Automotive: the Next Hot Mobile Platform for Linux
Automotive: the Next Hot Mobile Platform for LinuxAutomotive: the Next Hot Mobile Platform for Linux
Automotive: the Next Hot Mobile Platform for Linux
Alison Chaiken
 
In Automotive Environments - HU Michel
In Automotive Environments - HU MichelIn Automotive Environments - HU Michel
In Automotive Environments - HU Michel
mfrancis
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
Seungjoo Kim
 
Android Mobile Application Testing: Human Interface Guideline, Tools
Android Mobile Application Testing: Human Interface Guideline, ToolsAndroid Mobile Application Testing: Human Interface Guideline, Tools
Android Mobile Application Testing: Human Interface Guideline, Tools
SoftServe
 
Principles of a vehicle infotainment platform - Hans-Ulrich Michel, BMW
Principles of a vehicle infotainment platform - Hans-Ulrich Michel, BMWPrinciples of a vehicle infotainment platform - Hans-Ulrich Michel, BMW
Principles of a vehicle infotainment platform - Hans-Ulrich Michel, BMW
mfrancis
 
Booth content from Maker Faire Bay Area 2012
Booth content from Maker Faire Bay Area 2012Booth content from Maker Faire Bay Area 2012
Booth content from Maker Faire Bay Area 2012
Alison Chaiken
 
Automatic generation of dynamic behavior data of surrounding vehicles to ensu...
Automatic generation of dynamic behavior data of surrounding vehicles to ensu...Automatic generation of dynamic behavior data of surrounding vehicles to ensu...
Automatic generation of dynamic behavior data of surrounding vehicles to ensu...
Yoshifumi Sakamoto
 

Similar to Automotive Exploitation Techniques by Craig Smith (20)

From Driver Distraction to Driver Augmentation: Open Source in Cars
From Driver Distraction to Driver Augmentation: Open Source in CarsFrom Driver Distraction to Driver Augmentation: Open Source in Cars
From Driver Distraction to Driver Augmentation: Open Source in Cars
 
Edmunds presentation
Edmunds presentationEdmunds presentation
Edmunds presentation
 
Владимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challengesВладимир Махитко - Automotive security. New challenges
Владимир Махитко - Automotive security. New challenges
 
Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?Is cybersecurity protection of commercial vehicles harder?
Is cybersecurity protection of commercial vehicles harder?
 
Microsoft Automotive Business Unit - J Za
Microsoft Automotive Business Unit - J ZaMicrosoft Automotive Business Unit - J Za
Microsoft Automotive Business Unit - J Za
 
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systems
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systemsSolutions for ADAS and AI data engineering using OpenPOWER/POWER systems
Solutions for ADAS and AI data engineering using OpenPOWER/POWER systems
 
Why Cars Need Free Software
Why Cars Need Free SoftwareWhy Cars Need Free Software
Why Cars Need Free Software
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Mobileye Project
Mobileye ProjectMobileye Project
Mobileye Project
 
droidcon 2012: The Android passenger, Joerg Decker, Capgemini
droidcon 2012: The Android passenger, Joerg Decker, Capgeminidroidcon 2012: The Android passenger, Joerg Decker, Capgemini
droidcon 2012: The Android passenger, Joerg Decker, Capgemini
 
Tier X and the Coming of the Whitebox Car
Tier X and the Coming of the Whitebox CarTier X and the Coming of the Whitebox Car
Tier X and the Coming of the Whitebox Car
 
SCALE 2012: Automotive: new frontier for mobile Linux
SCALE 2012: Automotive: new frontier for mobile LinuxSCALE 2012: Automotive: new frontier for mobile Linux
SCALE 2012: Automotive: new frontier for mobile Linux
 
Automotive: the Next Hot Mobile Platform for Linux
Automotive: the Next Hot Mobile Platform for LinuxAutomotive: the Next Hot Mobile Platform for Linux
Automotive: the Next Hot Mobile Platform for Linux
 
In Automotive Environments - HU Michel
In Automotive Environments - HU MichelIn Automotive Environments - HU Michel
In Automotive Environments - HU Michel
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
 
Android Mobile Application Testing: Human Interface Guideline, Tools
Android Mobile Application Testing: Human Interface Guideline, ToolsAndroid Mobile Application Testing: Human Interface Guideline, Tools
Android Mobile Application Testing: Human Interface Guideline, Tools
 
Principles of a vehicle infotainment platform - Hans-Ulrich Michel, BMW
Principles of a vehicle infotainment platform - Hans-Ulrich Michel, BMWPrinciples of a vehicle infotainment platform - Hans-Ulrich Michel, BMW
Principles of a vehicle infotainment platform - Hans-Ulrich Michel, BMW
 
Booth content from Maker Faire Bay Area 2012
Booth content from Maker Faire Bay Area 2012Booth content from Maker Faire Bay Area 2012
Booth content from Maker Faire Bay Area 2012
 
Automatic generation of dynamic behavior data of surrounding vehicles to ensu...
Automatic generation of dynamic behavior data of surrounding vehicles to ensu...Automatic generation of dynamic behavior data of surrounding vehicles to ensu...
Automatic generation of dynamic behavior data of surrounding vehicles to ensu...
 

More from Shakacon

Web (dis)assembly
Web (dis)assemblyWeb (dis)assembly
Web (dis)assembly
Shakacon
 
Macdoored
MacdooredMacdoored
Macdoored
Shakacon
 
I can be apple and so can you
I can be apple and so can youI can be apple and so can you
I can be apple and so can you
Shakacon
 
Cloud forensics putting the bits back together
Cloud forensics putting the bits back togetherCloud forensics putting the bits back together
Cloud forensics putting the bits back together
Shakacon
 
Pwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCEPwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCE
Shakacon
 
Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS
Shakacon
 
Modern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerModern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layer
Shakacon
 
Shamoon
ShamoonShamoon
Shamoon
Shakacon
 
A Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts BytecodeA Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts Bytecode
Shakacon
 
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server:  A Dive into Attacker InfrastructureHoney, I Stole Your C2 Server:  A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Shakacon
 
Dock ir incident response in a containerized, immutable, continually deploy...
Dock ir   incident response in a containerized, immutable, continually deploy...Dock ir   incident response in a containerized, immutable, continually deploy...
Dock ir incident response in a containerized, immutable, continually deploy...
Shakacon
 
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android Kernel
Shakacon
 
Silent Protest: A Wearable Protest Network
Silent Protest:  A Wearable Protest NetworkSilent Protest:  A Wearable Protest Network
Silent Protest: A Wearable Protest Network
Shakacon
 
WiFi-Based IMSI Catcher
WiFi-Based IMSI CatcherWiFi-Based IMSI Catcher
WiFi-Based IMSI Catcher
Shakacon
 
Sad Panda Analysts: Devolving Malware
Sad Panda Analysts:  Devolving MalwareSad Panda Analysts:  Devolving Malware
Sad Panda Analysts: Devolving Malware
Shakacon
 
reductio [ad absurdum]
reductio [ad absurdum]reductio [ad absurdum]
reductio [ad absurdum]
Shakacon
 
XFLTReat: a new dimension in tunnelling
XFLTReat:  a new dimension in tunnellingXFLTReat:  a new dimension in tunnelling
XFLTReat: a new dimension in tunnelling
Shakacon
 
Windows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul RascagneresWindows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul Rascagneres
Shakacon
 
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
Shakacon
 
The Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant OllamThe Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant Ollam
Shakacon
 

More from Shakacon (20)

Web (dis)assembly
Web (dis)assemblyWeb (dis)assembly
Web (dis)assembly
 
Macdoored
MacdooredMacdoored
Macdoored
 
I can be apple and so can you
I can be apple and so can youI can be apple and so can you
I can be apple and so can you
 
Cloud forensics putting the bits back together
Cloud forensics putting the bits back togetherCloud forensics putting the bits back together
Cloud forensics putting the bits back together
 
Pwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCEPwned in Translation - from Subtitles to RCE
Pwned in Translation - from Subtitles to RCE
 
Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS Oversight: Exposing spies on macOS
Oversight: Exposing spies on macOS
 
Modern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layerModern Reconnaissance Phase on APT - protection layer
Modern Reconnaissance Phase on APT - protection layer
 
Shamoon
ShamoonShamoon
Shamoon
 
A Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts BytecodeA Decompiler for Blackhain-Based Smart Contracts Bytecode
A Decompiler for Blackhain-Based Smart Contracts Bytecode
 
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server:  A Dive into Attacker InfrastructureHoney, I Stole Your C2 Server:  A Dive into Attacker Infrastructure
Honey, I Stole Your C2 Server: A Dive into Attacker Infrastructure
 
Dock ir incident response in a containerized, immutable, continually deploy...
Dock ir   incident response in a containerized, immutable, continually deploy...Dock ir   incident response in a containerized, immutable, continually deploy...
Dock ir incident response in a containerized, immutable, continually deploy...
 
Reviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android KernelReviewing the Security of ASoC Drivers in Android Kernel
Reviewing the Security of ASoC Drivers in Android Kernel
 
Silent Protest: A Wearable Protest Network
Silent Protest:  A Wearable Protest NetworkSilent Protest:  A Wearable Protest Network
Silent Protest: A Wearable Protest Network
 
WiFi-Based IMSI Catcher
WiFi-Based IMSI CatcherWiFi-Based IMSI Catcher
WiFi-Based IMSI Catcher
 
Sad Panda Analysts: Devolving Malware
Sad Panda Analysts:  Devolving MalwareSad Panda Analysts:  Devolving Malware
Sad Panda Analysts: Devolving Malware
 
reductio [ad absurdum]
reductio [ad absurdum]reductio [ad absurdum]
reductio [ad absurdum]
 
XFLTReat: a new dimension in tunnelling
XFLTReat:  a new dimension in tunnellingXFLTReat:  a new dimension in tunnelling
XFLTReat: a new dimension in tunnelling
 
Windows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul RascagneresWindows Systems & Code Signing Protection by Paul Rascagneres
Windows Systems & Code Signing Protection by Paul Rascagneres
 
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
When Encryption is Not Enough...Sumanth Naropanth, Chandra Prakash Gopalaiah ...
 
The Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant OllamThe Search for the Perfect Door - Deviant Ollam
The Search for the Perfect Door - Deviant Ollam
 

Recently uploaded

Unlimited Short Call Girls Thane ✅ 9004268417 FULL CASH PAYMENT
Unlimited Short Call Girls Thane ✅ 9004268417 FULL CASH PAYMENTUnlimited Short Call Girls Thane ✅ 9004268417 FULL CASH PAYMENT
Unlimited Short Call Girls Thane ✅ 9004268417 FULL CASH PAYMENT
siqbal9337
 
The last lesson in comic form for English art integrated project class 12
The last lesson in comic form for English art integrated project class 12The last lesson in comic form for English art integrated project class 12
The last lesson in comic form for English art integrated project class 12
YaiphabaChanam
 
一比一原版南昆士兰大学毕业证(USQ毕业证书)学历如何办理
一比一原版南昆士兰大学毕业证(USQ毕业证书)学历如何办理一比一原版南昆士兰大学毕业证(USQ毕业证书)学历如何办理
一比一原版南昆士兰大学毕业证(USQ毕业证书)学历如何办理
pycfbo
 
一比一原版悉尼大学毕业证(USYD毕业证书)学历如何办理
一比一原版悉尼大学毕业证(USYD毕业证书)学历如何办理一比一原版悉尼大学毕业证(USYD毕业证书)学历如何办理
一比一原版悉尼大学毕业证(USYD毕业证书)学历如何办理
cenaws
 
Unlimited Short Call Girls Navi Mumbai ✅ 9930245274 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9930245274 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9930245274 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9930245274 FULL CASH PAYMENT
siqbal9337
 
美洲杯买球-美洲杯买球在哪里押注-美洲杯买球在哪里投注|【​网址​🎉ac44.net🎉​】
美洲杯买球-美洲杯买球在哪里押注-美洲杯买球在哪里投注|【​网址​🎉ac44.net🎉​】美洲杯买球-美洲杯买球在哪里押注-美洲杯买球在哪里投注|【​网址​🎉ac44.net🎉​】
美洲杯买球-美洲杯买球在哪里押注-美洲杯买球在哪里投注|【​网址​🎉ac44.net🎉​】
jafiradnan336
 
欧洲杯竞猜-欧洲杯竞猜下注平台-欧洲杯竞猜投注平台|【​网址​🎉ac44.net🎉​】
欧洲杯竞猜-欧洲杯竞猜下注平台-欧洲杯竞猜投注平台|【​网址​🎉ac44.net🎉​】欧洲杯竞猜-欧洲杯竞猜下注平台-欧洲杯竞猜投注平台|【​网址​🎉ac44.net🎉​】
欧洲杯竞猜-欧洲杯竞猜下注平台-欧洲杯竞猜投注平台|【​网址​🎉ac44.net🎉​】
arcosarturo900
 
hays salary report for 2024: check out your salaries here
hays salary report for 2024: check out your salaries herehays salary report for 2024: check out your salaries here
hays salary report for 2024: check out your salaries here
johnconnor370852
 
定制(london学位证书)英国伦敦大学毕业证本科学历原版一模一样
定制(london学位证书)英国伦敦大学毕业证本科学历原版一模一样定制(london学位证书)英国伦敦大学毕业证本科学历原版一模一样
定制(london学位证书)英国伦敦大学毕业证本科学历原版一模一样
utuvvas
 
Kenwood DDX71/491/471/371/3108/30718/271/2071 User Manual
Kenwood DDX71/491/471/371/3108/30718/271/2071 User ManualKenwood DDX71/491/471/371/3108/30718/271/2071 User Manual
Kenwood DDX71/491/471/371/3108/30718/271/2071 User Manual
derekmelino
 
Automotive power train system- A final report
Automotive power train system- A final reportAutomotive power train system- A final report
Automotive power train system- A final report
KartikThakkar24
 
一比一原版(ucb毕业证书)白金汉大学毕业证如何办理
一比一原版(ucb毕业证书)白金汉大学毕业证如何办理一比一原版(ucb毕业证书)白金汉大学毕业证如何办理
一比一原版(ucb毕业证书)白金汉大学毕业证如何办理
lfn5dlg2q
 
按照学校原版(UTS文凭证书)悉尼科技大学毕业证快速办理
按照学校原版(UTS文凭证书)悉尼科技大学毕业证快速办理按照学校原版(UTS文凭证书)悉尼科技大学毕业证快速办理
按照学校原版(UTS文凭证书)悉尼科技大学毕业证快速办理
ggany
 
Unlimited Short Call Girls Mumbai ✅ 9930496246 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9930496246 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9930496246 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9930496246 FULL CASH PAYMENT
siqbal9337
 
按照学校原版(UniSA文凭证书)南澳大学毕业证快速办理
按照学校原版(UniSA文凭证书)南澳大学毕业证快速办理按照学校原版(UniSA文凭证书)南澳大学毕业证快速办理
按照学校原版(UniSA文凭证书)南澳大学毕业证快速办理
ggany
 
Top-Quality AC Service for Mini Cooper Optimal Cooling Performance
Top-Quality AC Service for Mini Cooper Optimal Cooling PerformanceTop-Quality AC Service for Mini Cooper Optimal Cooling Performance
Top-Quality AC Service for Mini Cooper Optimal Cooling Performance
Motor Haus
 
原版定做(mmu学位证书)英国曼彻斯特城市大学毕业证本科文凭原版一模一样
原版定做(mmu学位证书)英国曼彻斯特城市大学毕业证本科文凭原版一模一样原版定做(mmu学位证书)英国曼彻斯特城市大学毕业证本科文凭原版一模一样
原版定做(mmu学位证书)英国曼彻斯特城市大学毕业证本科文凭原版一模一样
utuvvas
 
Annual report on mahindra and mahindra on supply chain analysisdf
Annual report on mahindra and mahindra on supply chain analysisdfAnnual report on mahindra and mahindra on supply chain analysisdf
Annual report on mahindra and mahindra on supply chain analysisdf
ssuser470fe9
 
physics-project-final.pdf khdkkdhhdgdjgdhdh
physics-project-final.pdf khdkkdhhdgdjgdhdhphysics-project-final.pdf khdkkdhhdgdjgdhdh
physics-project-final.pdf khdkkdhhdgdjgdhdh
isaprakash1929
 
Toyota Land Cruiser Owners Manual 1968-1971 FJ40 FJ43 FJ45.pdf
Toyota Land Cruiser Owners Manual 1968-1971 FJ40 FJ43 FJ45.pdfToyota Land Cruiser Owners Manual 1968-1971 FJ40 FJ43 FJ45.pdf
Toyota Land Cruiser Owners Manual 1968-1971 FJ40 FJ43 FJ45.pdf
ssuser5e3aa3
 

Recently uploaded (20)

Unlimited Short Call Girls Thane ✅ 9004268417 FULL CASH PAYMENT
Unlimited Short Call Girls Thane ✅ 9004268417 FULL CASH PAYMENTUnlimited Short Call Girls Thane ✅ 9004268417 FULL CASH PAYMENT
Unlimited Short Call Girls Thane ✅ 9004268417 FULL CASH PAYMENT
 
The last lesson in comic form for English art integrated project class 12
The last lesson in comic form for English art integrated project class 12The last lesson in comic form for English art integrated project class 12
The last lesson in comic form for English art integrated project class 12
 
一比一原版南昆士兰大学毕业证(USQ毕业证书)学历如何办理
一比一原版南昆士兰大学毕业证(USQ毕业证书)学历如何办理一比一原版南昆士兰大学毕业证(USQ毕业证书)学历如何办理
一比一原版南昆士兰大学毕业证(USQ毕业证书)学历如何办理
 
一比一原版悉尼大学毕业证(USYD毕业证书)学历如何办理
一比一原版悉尼大学毕业证(USYD毕业证书)学历如何办理一比一原版悉尼大学毕业证(USYD毕业证书)学历如何办理
一比一原版悉尼大学毕业证(USYD毕业证书)学历如何办理
 
Unlimited Short Call Girls Navi Mumbai ✅ 9930245274 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9930245274 FULL CASH PAYMENTUnlimited Short Call Girls Navi Mumbai ✅ 9930245274 FULL CASH PAYMENT
Unlimited Short Call Girls Navi Mumbai ✅ 9930245274 FULL CASH PAYMENT
 
美洲杯买球-美洲杯买球在哪里押注-美洲杯买球在哪里投注|【​网址​🎉ac44.net🎉​】
美洲杯买球-美洲杯买球在哪里押注-美洲杯买球在哪里投注|【​网址​🎉ac44.net🎉​】美洲杯买球-美洲杯买球在哪里押注-美洲杯买球在哪里投注|【​网址​🎉ac44.net🎉​】
美洲杯买球-美洲杯买球在哪里押注-美洲杯买球在哪里投注|【​网址​🎉ac44.net🎉​】
 
欧洲杯竞猜-欧洲杯竞猜下注平台-欧洲杯竞猜投注平台|【​网址​🎉ac44.net🎉​】
欧洲杯竞猜-欧洲杯竞猜下注平台-欧洲杯竞猜投注平台|【​网址​🎉ac44.net🎉​】欧洲杯竞猜-欧洲杯竞猜下注平台-欧洲杯竞猜投注平台|【​网址​🎉ac44.net🎉​】
欧洲杯竞猜-欧洲杯竞猜下注平台-欧洲杯竞猜投注平台|【​网址​🎉ac44.net🎉​】
 
hays salary report for 2024: check out your salaries here
hays salary report for 2024: check out your salaries herehays salary report for 2024: check out your salaries here
hays salary report for 2024: check out your salaries here
 
定制(london学位证书)英国伦敦大学毕业证本科学历原版一模一样
定制(london学位证书)英国伦敦大学毕业证本科学历原版一模一样定制(london学位证书)英国伦敦大学毕业证本科学历原版一模一样
定制(london学位证书)英国伦敦大学毕业证本科学历原版一模一样
 
Kenwood DDX71/491/471/371/3108/30718/271/2071 User Manual
Kenwood DDX71/491/471/371/3108/30718/271/2071 User ManualKenwood DDX71/491/471/371/3108/30718/271/2071 User Manual
Kenwood DDX71/491/471/371/3108/30718/271/2071 User Manual
 
Automotive power train system- A final report
Automotive power train system- A final reportAutomotive power train system- A final report
Automotive power train system- A final report
 
一比一原版(ucb毕业证书)白金汉大学毕业证如何办理
一比一原版(ucb毕业证书)白金汉大学毕业证如何办理一比一原版(ucb毕业证书)白金汉大学毕业证如何办理
一比一原版(ucb毕业证书)白金汉大学毕业证如何办理
 
按照学校原版(UTS文凭证书)悉尼科技大学毕业证快速办理
按照学校原版(UTS文凭证书)悉尼科技大学毕业证快速办理按照学校原版(UTS文凭证书)悉尼科技大学毕业证快速办理
按照学校原版(UTS文凭证书)悉尼科技大学毕业证快速办理
 
Unlimited Short Call Girls Mumbai ✅ 9930496246 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9930496246 FULL CASH PAYMENTUnlimited Short Call Girls Mumbai ✅ 9930496246 FULL CASH PAYMENT
Unlimited Short Call Girls Mumbai ✅ 9930496246 FULL CASH PAYMENT
 
按照学校原版(UniSA文凭证书)南澳大学毕业证快速办理
按照学校原版(UniSA文凭证书)南澳大学毕业证快速办理按照学校原版(UniSA文凭证书)南澳大学毕业证快速办理
按照学校原版(UniSA文凭证书)南澳大学毕业证快速办理
 
Top-Quality AC Service for Mini Cooper Optimal Cooling Performance
Top-Quality AC Service for Mini Cooper Optimal Cooling PerformanceTop-Quality AC Service for Mini Cooper Optimal Cooling Performance
Top-Quality AC Service for Mini Cooper Optimal Cooling Performance
 
原版定做(mmu学位证书)英国曼彻斯特城市大学毕业证本科文凭原版一模一样
原版定做(mmu学位证书)英国曼彻斯特城市大学毕业证本科文凭原版一模一样原版定做(mmu学位证书)英国曼彻斯特城市大学毕业证本科文凭原版一模一样
原版定做(mmu学位证书)英国曼彻斯特城市大学毕业证本科文凭原版一模一样
 
Annual report on mahindra and mahindra on supply chain analysisdf
Annual report on mahindra and mahindra on supply chain analysisdfAnnual report on mahindra and mahindra on supply chain analysisdf
Annual report on mahindra and mahindra on supply chain analysisdf
 
physics-project-final.pdf khdkkdhhdgdjgdhdh
physics-project-final.pdf khdkkdhhdgdjgdhdhphysics-project-final.pdf khdkkdhhdgdjgdhdh
physics-project-final.pdf khdkkdhhdgdjgdhdh
 
Toyota Land Cruiser Owners Manual 1968-1971 FJ40 FJ43 FJ45.pdf
Toyota Land Cruiser Owners Manual 1968-1971 FJ40 FJ43 FJ45.pdfToyota Land Cruiser Owners Manual 1968-1971 FJ40 FJ43 FJ45.pdf
Toyota Land Cruiser Owners Manual 1968-1971 FJ40 FJ43 FJ45.pdf
 

Automotive Exploitation Techniques by Craig Smith

  • 2. Identifying ExploitsIdentifying Exploits Attack SurfaceAttack Surface PayloadPayload
  • 5. Payloads ● Run on IVI – Listen over MIC – Pull contacts – Communicate with CELL ● Manipulate vehicle Components – Affect Steering and Controls – Unlock Vehicle – Start Car ● Reflash firmware – Permanent Changes – Bypass protections
  • 7. CAN Bus Complications ● Can't shutoff the device you want to spoof ● Need to talk more often than original source ● Each Make/Model is different ● IDS Systems?
  • 8. Passive Vehicle Detection ● CAN of Fingers (c0f)
  • 10. Utilizing c0f results in Exploits $ c0f --fpdb test/sample.db --logfile test/honda-civic- 2007.dump Loaded 1 fingerprints from DB {"Make":"Honda","Model":"Civic","Year":"2009","Trim":"Hyb rid","Dynamic":"true","Common":[{"ID":"164"},{"ID":"136"}, {"ID":"13A"},{"ID":"13F"},{"ID":"17C"},{"ID":"158"}, {"ID":"188"}],"MainID":"17C","MainInterval":"0.0099985711 7722198","Confidence":64}
  • 11. Bonus Identification $ c0f --find-pattern bBbBbbbB --logfile test/sample-can.log --quiet --no-print-fp { "Matches": [ { "ID": "095", "Position": "6", "Values": [ "0", "1" ] }] } $ grep 095# test/sample-can.log | head (1398128223.810456) can0 095#800007F400000108 (1398128223.820460) can0 095#800007F400000017 (1398128223.830460) can0 095#800007F400000126 (1398128223.840462) can0 095#800007F400000035 (1398128223.850465) can0 095#800007F400000108 (1398128223.860468) can0 095#800007F400000117 (1398128223.870470) can0 095#800007F400000126 (1398128223.880471) can0 095#800007F400000035 (1398128223.890477) can0 095#800007F400000108 (1398128223.900480) can0 095#800007F400000017
  • 12. Where to get c0f? ● https://github.com/zombieCraig/c0f ● Gem install c0f
  • 14. F1337 Mgmt Structure Checks Server For Commands In Queue Enter Commands For Vehicles over Web Interface
  • 16. Client API ● Request – ?poll=<VIN|UID>&methods=<SUPPORTED> ● Response (multi-line) – Wipers <on|off> – Lights <on|off|flash> – Flood <rpm|temp|fuel> – Cansend <dev> <packet> – Cansend stop
  • 17. Command Interface ● Web based AJAX. PHP back-end ● Terminal Emulation ● Login Credentials ● Fleet Management ● Basic scripting capabilities
  • 18. Future Direction ● Grouping of vehicles ● DB Backend with saved state ● Additional reporting (DTC, GEO Location)
  • 19. Where to get F1337?
  • 20. What Can Be Done?
  • 21. Further Research ● Open Garages – http://opengarages.org – @OpenGarages ● IamTheCavalry – http://iamthecavalry.org – @IAmTheCavalry
  • 22. Car Hacker's Handbook Next Version Teaser ToC (3x size): 00_ReadMe 01_Intro 02_Policies 03_ThreadModeling 04_SocketCAN 05_Vehicle_Comm 06_DiagnosticComm 07_Canbus_RE 08_ECU_Hacking 09_ECU_Test_Benches 10_BreakingIt 11_Infotainment 12_V2V 13_Weaponizing 14_TPMS 15_Keysystems 16_HotWiring 17_EmbeddedSystemAttacks 18_PerformanceTuning 19_OpenGarages 20_Legal