Completed
Wifi-based breach: Short-range
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Securing the Connected Car
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 About me
- 3 Session overview
- 4 Software defined car: New revenue streams
- 5 Cost savings by using open source platforms
- 6 The software defined car requires OTA updates
- 7 Jeep Cherokee hacked in July 2015
- 8 Jeep Cherokee architecture
- 9 Jeep Cherokee Head Unit with WiFi
- 10 Wifi-based breach: Short-range
- 11 Cellular-based breach: Country-wide
- 12 The Controller Area Network (CAN) bus
- 13 CAN bus
- 14 Putting it together
- 15 More complexity leads to larger attack surface
- 16 Security patching is done too late
- 17 Why security patching happens too late
- 18 Patching connected devices is harder
- 19 Generic embedded updater workflow
- 20 Why automated rollback is important
- 21 Prepare for securing the software defined car
- 22 The best way to respond to hacking?