Hide Yo Keys, Hide Yo Car - Remotely Exploiting Connected Vehicle APIs and Apps
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore the vulnerabilities in connected vehicle APIs and apps through this conference talk from 44CON 2017. Delve into the methodology used to discover and remotely exploit weaknesses in Subaru's STARLINK remote vehicle services. Learn about the implications of software bugs in connected vehicles and their potential to compromise entire ecosystems. Gain insights into how car manufacturers can improve security measures for connected vehicles. Understand the significance of DMCA exemptions for security research on consumer devices in the US. Discover why traditional car keys may become obsolete in the era of connected vehicles.
Syllabus
Hide Yo Keys, Hide Yo Car - Aaron Guzman at 44CON 2017
Taught by
44CON Information Security Conference
Related Courses
A developer's guide to the Internet of Things (IoT)IBM via Coursera Enterprise and Infrastructure Security
New York University (NYU) via Coursera Getting Started with the Internet of Things (IoT)
Microsoft via edX AWS IoT: Developing and Deploying an Internet of Things
Amazon Web Services via edX Components And Applications Of Internet Of Things
Indian Institute of Technology Patna via Swayam