YoVDO

Automotive Security - Trends, Problems, Solutions, and Future Work

Offered By: CAE in Cybersecurity Community via YouTube

Tags

Automotive Security Courses Cybersecurity Courses Spoofing Courses Car Hacking Courses

Course Description

Overview

Explore the critical field of automotive security in this comprehensive 59-minute lecture by Gedare Bloom from the University of Colorado Colorado Springs. Delve into current trends, challenges, and potential solutions in vehicle cybersecurity. Examine high-profile car hacking incidents, such as the Jeep Cherokee hack, and analyze various attack surfaces including network connectivity, software complexity, and remote access. Understand the intricacies of automotive network architectures, including Controller Area Networks and point-to-point networking. Learn about common exploits like spoofing and discover effective countermeasures. Compare signature-based and anomaly-based approaches to threat detection, and explore real-time model classification techniques. Evaluate the effectiveness of different security strategies and gain insights into future developments in automotive cybersecurity.

Syllabus

Introduction
Car Hacking
Jeep Cherokee Hack
Attack Surfaces
Network Connectivity
Software Complexity
Remote Connectivity
PointtoPoint Networking
Controller Area Network
Network Architectures
Exploits
Spoofing
What can we do
Signature vs Anomaly
Based Approaches
RealTime Model
Classification Approach
Evaluation
Future Work


Taught by

CAE in Cybersecurity Community

Related Courses

Car Hacking
YouTube
CAN Bus Basics With Hands On Fuzzing
44CON Information Security Conference via YouTube
Web Browsing from the Car - What's the Worst That Can Happen?
Security BSides London via YouTube
Car Hacking Virtual Lab
Hack In The Box Security Conference via YouTube
Car Hacking Made Easel
Hack In The Box Security Conference via YouTube