YoVDO

Hide Yo Keys, Hide Yo Car - Remotely Exploiting Connected Vehicle APIs and Apps

Offered By: 44CON Information Security Conference via YouTube

Tags

44CON Courses Cybersecurity Courses IoT security Courses

Course Description

Overview

Explore the vulnerabilities in connected vehicle APIs and apps through this conference talk from 44CON 2017. Delve into the methodology used to discover and remotely exploit weaknesses in Subaru's STARLINK remote vehicle services. Learn about the implications of software bugs in connected vehicles and their potential to compromise entire ecosystems. Gain insights into how car manufacturers can improve security measures for connected vehicles. Understand the significance of DMCA exemptions for security research on consumer devices in the US. Discover why traditional car keys may become obsolete in the era of connected vehicles.

Syllabus

Hide Yo Keys, Hide Yo Car - Aaron Guzman at 44CON 2017


Taught by

44CON Information Security Conference

Related Courses

A developer's guide to the Internet of Things (IoT)
IBM via Coursera
Enterprise and Infrastructure Security
New York University (NYU) via Coursera
Getting Started with the Internet of Things (IoT)
Microsoft via edX
AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX
Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam