Hide Yo Keys, Hide Yo Car - Remotely Exploiting Connected Vehicle APIs and Apps
Offered By: 44CON Information Security Conference via YouTube
Course Description
Overview
Explore the vulnerabilities in connected vehicle APIs and apps through this conference talk from 44CON 2017. Delve into the methodology used to discover and remotely exploit weaknesses in Subaru's STARLINK remote vehicle services. Learn about the implications of software bugs in connected vehicles and their potential to compromise entire ecosystems. Gain insights into how car manufacturers can improve security measures for connected vehicles. Understand the significance of DMCA exemptions for security research on consumer devices in the US. Discover why traditional car keys may become obsolete in the era of connected vehicles.
Syllabus
Hide Yo Keys, Hide Yo Car - Aaron Guzman at 44CON 2017
Taught by
44CON Information Security Conference
Related Courses
Computer SecurityStanford University via Coursera Cryptography II
Stanford University via Coursera Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera Building an Information Risk Management Toolkit
University of Washington via Coursera Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network