Securing the Connected Car: Opportunities, Risks, and Best Practices

Securing the Connected Car: Opportunities, Risks, and Best Practices

Linux Foundation via YouTube Direct link

Intro

1 of 21

1 of 21

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Securing the Connected Car: Opportunities, Risks, and Best Practices

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 About me
  3. 3 Session overview
  4. 4 Software defined car: New revenues
  5. 5 Cost savings by using open sour
  6. 6 The software defined car requires OTA updates
  7. 7 Jeep Cherokee hacked in July 2015
  8. 8 Jeep Cherokee Head Unit with Wifi
  9. 9 Wifi-based breach: Short-range
  10. 10 Cellular-based breach: Country-wide
  11. 11 CAN bus
  12. 12 Putting it together
  13. 13 The Controller Area Network (CAN) bus
  14. 14 More complexity leads to larger attack surface
  15. 15 Security patching is done too late
  16. 16 Why security patching happens too late
  17. 17 Patching connected devices is harder
  18. 18 Embedded client patching process Overview
  19. 19 Choice of update type has tradeoffs
  20. 20 Strategies to reduce the risk of bricking
  21. 21 Prepare for securing the software defined ca

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.