Over-the-Air - How We Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars

Over-the-Air - How We Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars

Black Hat via YouTube Direct link

Fix solution in V2

8 of 37

8 of 37

Fix solution in V2

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Over-the-Air - How We Remotely Compromised the Gateway, BCM, and Autopilot ECUs of Tesla Cars

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Source view
  3. 3 Memory view
  4. 4 Fill with ArrayStorage
  5. 5 Refill with Uint32Array
  6. 6 Explore Kernel
  7. 7 QtCarBrowser AppArmor rules
  8. 8 Fix solution in V2
  9. 9 Gateway file operation protocol
  10. 10 Gateway diagnostic protocol
  11. 11 Gateway update
  12. 12 Filesystem of the gateway
  13. 13 OTA Overview
  14. 14 Cloud - Car: Firmware Deploy
  15. 15 Ethernet Connected ECUs - Step 1
  16. 16 Traditional ECUs: In Bundle
  17. 17 Traditional ECUs: Firmware Info
  18. 18 Traditional ECUS: Create and Send Files
  19. 19 How Easter egg works?
  20. 20 Triggers on CID
  21. 21 Start on BCCEN
  22. 22 Easter egg start
  23. 23 How we patch
  24. 24 Patch in CID
  25. 25 Reverse of ECUS
  26. 26 Patch of BCCEN
  27. 27 Patch of BCFRONT
  28. 28 Autopilot ECU
  29. 29 Ape-updater
  30. 30 Commands for update
  31. 31 m3_factory_deploy
  32. 32 Exploit
  33. 33 Get Root
  34. 34 Fixed by Tesla
  35. 35 Fully Compromised
  36. 36 Tesla's Response
  37. 37 Security Enhancement

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.