Basic CAN injection attacks based on replay have been broadly covered in automotive security, but that the only threat that exists?
In this talk, we want to cover a few practical attacks that affects even some of the most recent hardware installed in automotive products and that can be exploited in the diagnostics and data layers of CAN communications.
Javier is a hardware security expert that has been working in automotive security for several years. He is an experienced training instructor and has published numerous impactful tools and techniques in the automotive security sector.
Ethan Briggs is an automotive security engineer that enjoys analyzing systems to understand what runs “under the hood”, and finding ways to improve or compromise them. This includes the electronic side of vehicles as well as mechanical aspects as well.