Explore a groundbreaking voltage-glitching attack on Tesla's Autopilot system in this 41-minute conference talk from the 37th Chaos Communication Congress (37C3). Discover how researchers gained root privileges on the system, enabling the extraction of critical user data, cryptographic keys, and arbitrary code. Learn about Tesla's integrated computer platform, including the Autopilot system's security architecture and vulnerabilities. Gain insights into the implications of this attack for crash investigations, public scrutiny of Tesla's "full self-driving" (FSD) technology, and the broader discourse surrounding automated driving assistants. Delve into the researchers' previous success with a Tesla Jailbreak on the AMD-based infotainment platform and understand the potential impact on car feature activation and custom modifications.
Overview
Syllabus
37C3 - Back in the Driver's Seat: Recovering Critical Data from Tesla Autopilot Using Voltage Glitch
Taught by
media.ccc.de