Securing the Connected Car

Securing the Connected Car

NDC Conferences via YouTube Direct link

Jeep Cherokee hacked in July 2015

7 of 22

7 of 22

Jeep Cherokee hacked in July 2015

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Securing the Connected Car

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 About me
  3. 3 Session overview
  4. 4 Software defined car: New revenue streams
  5. 5 Cost savings by using open source platforms
  6. 6 The software defined car requires OTA updates
  7. 7 Jeep Cherokee hacked in July 2015
  8. 8 Jeep Cherokee architecture
  9. 9 Jeep Cherokee Head Unit with WiFi
  10. 10 Wifi-based breach: Short-range
  11. 11 Cellular-based breach: Country-wide
  12. 12 The Controller Area Network (CAN) bus
  13. 13 CAN bus
  14. 14 Putting it together
  15. 15 More complexity leads to larger attack surface
  16. 16 Security patching is done too late
  17. 17 Why security patching happens too late
  18. 18 Patching connected devices is harder
  19. 19 Generic embedded updater workflow
  20. 20 Why automated rollback is important
  21. 21 Prepare for securing the software defined car
  22. 22 The best way to respond to hacking?

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.