Completed
Jeep Cherokee hacked in July 2015
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Securing the Connected Car
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 About me
- 3 Session overview
- 4 Software defined car: New revenue streams
- 5 Cost savings by using open source platforms
- 6 The software defined car requires OTA updates
- 7 Jeep Cherokee hacked in July 2015
- 8 Jeep Cherokee architecture
- 9 Jeep Cherokee Head Unit with WiFi
- 10 Wifi-based breach: Short-range
- 11 Cellular-based breach: Country-wide
- 12 The Controller Area Network (CAN) bus
- 13 CAN bus
- 14 Putting it together
- 15 More complexity leads to larger attack surface
- 16 Security patching is done too late
- 17 Why security patching happens too late
- 18 Patching connected devices is harder
- 19 Generic embedded updater workflow
- 20 Why automated rollback is important
- 21 Prepare for securing the software defined car
- 22 The best way to respond to hacking?