Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Abusing CAN Bus Specifications for DoS Attacks in Embedded Systems

DEFCONConference via YouTube

Overview

Save Big on Coursera Plus. 7,000+ courses at $160 off. Limited Time Only!
Explore a technical conference talk from DEF CON 31's Car Hacking Village that delves into the vulnerabilities of CAN bus specifications in embedded systems. Learn about the CAN bus communication standard widely used in automotive systems for its reliability, flexibility, and simplified wiring implementation. Discover how attackers can exploit protocol specifications by manipulating metadata fields within defined message formats, potentially exposing vulnerabilities in manufacturer-provided libraries and developer implementations. Examine the implications of non-adherence to protocol specifications and understand the security risks when developers make assumptions about message formatting in automotive systems. Through this 37-minute presentation, gain insights into the intersection of automotive security, embedded systems, and protocol exploitation.

Syllabus

DEF CON 31 Car Hacking Village - Abusing CAN Bus Spec for DoS in Embedded Systems - Martin Petran

Taught by

DEFCONConference

Reviews

Start your review of Abusing CAN Bus Specifications for DoS Attacks in Embedded Systems

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.