Владимир Махитко - automotive security. new challenges
TRANSCRIPT
![Page 1: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/1.jpg)
Automotive securityNew challenges
![Page 2: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/2.jpg)
I am Volodymyr MakhitkoSoftware Engineer GlobalLogic
![Page 3: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/3.jpg)
Automotive security is a ecosystem
![Page 4: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/4.jpg)
Automotive ecosystem
![Page 5: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/5.jpg)
Vehicle attack surface
![Page 6: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/6.jpg)
Common ways of hacking
◉ hardware hacking◉ wireless hacking◉ network hacking◉ browser hacking
◉ linux/qnx hacking◉ binary reverse engineering◉ protocol reverse engineering◉ custom tool development
![Page 7: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/7.jpg)
Video examples
![Page 8: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/8.jpg)
Vehicle attack surface
![Page 9: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/9.jpg)
CAN bus frame
![Page 10: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/10.jpg)
OBD pinout example
![Page 11: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/11.jpg)
CAN tools
● apt-get install can-utils● configure can interface● # candump -cae can0,0:0,#FFFFFFFF
![Page 12: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/12.jpg)
Keep car in diagnostic state
![Page 13: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/13.jpg)
Mazda CAN ID
![Page 14: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/14.jpg)
TPMS Attack
● track vehicle● trigger events● spoofing
![Page 15: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/15.jpg)
Vehicle attack surface
![Page 16: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/16.jpg)
Intrusion detection & Snort
![Page 17: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/17.jpg)
Attacks classification
● backdoor● bad-traffic● botnet-cnc● content-replace● ddos● exploit
● file-identify● ftp● icmp● multimedia● mysql● scan
● telnet● virus● voip● tftp● web-attacks
![Page 18: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/18.jpg)
IDS & enterprise network topology
![Page 19: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/19.jpg)
IDS & enterprise network topology
![Page 20: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/20.jpg)
Bad & Good Automotive Architecture
![Page 21: Владимир Махитко - Automotive security. New challenges](https://reader031.vdocuments.us/reader031/viewer/2022020301/5876f9441a28abf3398b5e83/html5/thumbnails/21.jpg)
THANKS!