Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Inside Dash Cam Custom Protocols and Security Vulnerabilities

DEFCONConference via YouTube

Overview

Explore a detailed security analysis of dash cam vulnerabilities in this DEF CON 32 conference presentation that examines network-connected devices from multiple countries including South Korea, USA, Germany, and China. Learn about the discovery of zero-day vulnerabilities like OS Command Injection, Logical Bugs, and insufficient authentication found during boot processes, configuration changes, and custom protocol communications. Follow the comprehensive analysis process from firmware acquisition and file system extraction to boot logic analysis and remote debugging. Discover how 4 out of 10 analyzed dash cams shared the same OEM board and similar vulnerabilities, allowing successful exploitation across multiple devices. Gain insights into common security vulnerabilities, preventive measures, and the importance of implementing stronger security standards in the growing dash cam industry to protect vehicle and personal data.

Syllabus

DEF CON 32 - Inside Dash Cam Custom Protocols and Discovered 0days - Hyo Jin Lee & Hanryeol Park

Taught by

DEFCONConference

Reviews

Start your review of Inside Dash Cam Custom Protocols and Security Vulnerabilities

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.