YoVDO

Applied Self-Driving Car Security

Offered By: Black Hat via YouTube

Tags

Black Hat Courses Encryption Courses Localization Courses Self-Driving Cars Courses Threat Detection Courses Threat Mitigation Courses

Course Description

Overview

Explore the world of self-driving car security in this Black Hat conference talk. Delve into the inner workings of autonomous vehicles, potential attack vectors, and essential security measures. Learn from two experienced researchers who have led security teams for multiple self-driving car companies. Gain insights into the hardware components, including sensor suites, LIDAR, compute systems, and connectivity. Examine software aspects such as localization and connectivity. Analyze specific vehicle models and their security implications. Discover the good news about reduced attack surfaces and explore various attack scenarios, including long-distance, short-distance, and physical threats. Understand crucial security measures like trusted execution, key storage, data encryption, and threat detection. Equip yourself with knowledge to navigate the evolving landscape of autonomous vehicle security.

Syllabus

Intro
The Menu
Level-2
Current State
Waymo
Cruise
Hardware: Sensor suite
LIDAR
Hardware: Compute
Hardware: Connection
Hardware: UX
Hardware: Ethernet
Overall hardware setup
Software
Localization
Connectivity
2011 Chevy Malibu
2015 Jeep Cherokee
2018 BMW i3
Analysis
Good news everyone!
Reduced Attack Surface
Long Distance (Remote Attacks)
Short Distance (Remote Attacks)
Physical
Sensors
Trusted Execution
Key Storage
Encryption of data in transit
Data Signing
Encryption of data at rest
Segregation
Tablet Security
Remote Assistance terminals
Fleet Management
Threat Detection
Conclusion


Taught by

Black Hat

Related Courses

Attack on Titan M, Reloaded - Vulnerability Research on a Modern Security Chip
Black Hat via YouTube
Attacks From a New Front Door in 4G & 5G Mobile Networks
Black Hat via YouTube
AAD Joined Machines - The New Lateral Movement
Black Hat via YouTube
Better Privacy Through Offense - How to Build a Privacy Red Team
Black Hat via YouTube
Whip the Whisperer - Simulating Side Channel Leakage
Black Hat via YouTube