Analysis and Defense of Automotive Networks
Presented by: Samuel Hollifield
Note: This precompiler will require an additional ticket purchase in order to retain the Arduino hardware featured in the presentation.
Modern vehicles are critically vulnerable. They rely on many electronic computers and sensors which communicate by broadcasting critical information over many Controller Area Networks (CANs). CANs are required by legislation on modern vehicles for emission and diagnostic purposes. Previous research has shown that a vehicle’s network has dangerous implications—hackers can collect data from remote vehicles and even disrupt vehicle control. Although automotive manufacturers are evolving to protect against these intrusions, the practical application of cybersecurity in the field remains inconsistent. In this precompiler, attendees will build their own automotive interface centered around the Arduino ecosystem. We will use these do-it-yourself CAN tools to sniff traffic from a simulated automobile and identify functional signals from the network. Further, we will inject arbitrary data to affect vehicle function and understand basic diagnostic applications. By the end of the presentation, we will build an intrusion detection system which will help protect vehicles at home and in motion.
Waiver: Not responsible for DMCA violations, bricked cars, or accidents. Void where prohibited.