Automotive Security - Trends, Problems, Solutions, and Future Work
CAE in Cybersecurity Community via YouTube
Overview
Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore the critical field of automotive security in this comprehensive 59-minute lecture by Gedare Bloom from the University of Colorado Colorado Springs. Delve into current trends, challenges, and potential solutions in vehicle cybersecurity. Examine high-profile car hacking incidents, such as the Jeep Cherokee hack, and analyze various attack surfaces including network connectivity, software complexity, and remote access. Understand the intricacies of automotive network architectures, including Controller Area Networks and point-to-point networking. Learn about common exploits like spoofing and discover effective countermeasures. Compare signature-based and anomaly-based approaches to threat detection, and explore real-time model classification techniques. Evaluate the effectiveness of different security strategies and gain insights into future developments in automotive cybersecurity.
Syllabus
Introduction
Car Hacking
Jeep Cherokee Hack
Attack Surfaces
Network Connectivity
Software Complexity
Remote Connectivity
PointtoPoint Networking
Controller Area Network
Network Architectures
Exploits
Spoofing
What can we do
Signature vs Anomaly
Based Approaches
RealTime Model
Classification Approach
Evaluation
Future Work
Taught by
CAE in Cybersecurity Community