Additional Content Download
This white paper, courtesy of Microsemi, describes the company's white-box cryptography product, WhiteboxCRYPTO™. Further, it also describes the structure of the white-box algorithms, how this structure differentiates white-box cryptography from classical algorithms, and why these structures are far more secure than classical software crypto implementations.
Check out the informative presentation Grant Bodley put together for the last Automotive Cyber Security Summit.
Barbara Ciaramitaro presents "Technology Overdrive," Understanding the Security Impact that the Advanced Machinery has throughout Infrastructure of the Car.
Doug Moeller reviews the "Principles of Automotive Cyber Security" in this informational presentation.
This thorough, 200-page report, courtesy of the RAND Transportation, Space, and Technology Program, explores legislative activity, cyber hacks, the role of telematics and communications, and liability implications, among many other topics surrounding autonomous cars.
Automotive IQ had the opportunity to interview Dr. Siraj Ahmed Shaikh, Expert in Cyber Security from Coventry University and Chairman at last year's conference, on the current challenges within the industry. See what they are!
This 2015 report still holds true in the automotive cyber security industry currently. Check out what the automakers really think is going on in the world of all things automotive technology!
Hadi Nahari, Chief Security Architect at NVIDIA, presented this session at the last summit. Within he identifies the process by which development of a secure platform is achieved. Have a listen!
Did you miss Brian Witten's session at the last summit? He is the Senior Director, Internet of Things at Symantec Corporation, and his session was rated at 4.5/5 by attendees. Listen to the full 43-minute summit session here for free!
Audio Workshop- Communications: Data Privacy & the Standardization of Security Protocols and Requirements
Josh Corman, Founder of I am the Cavalry, presented this workshop at the past summit. Listen to the full presentation and learn how to apply standardized security protocols to your cyber security ecosystem.
You've heard all the civilian buzz about summit speaker Chris Valasek's and Charlie Miller's 2014 Jeep Cherokee Hack. But have you read their 91-page whitepaper outlining their research and explaining their process in granular detail? Polish up on the details of Chris's hack in advance of his session at the event.
Chris Valasek, Director of Director of Vehicle Security Research at IOActive, and past speaker at our Summit, discusses how he breached a vehicle on the highway to expose its cyber security vulnerabilities in this exclusive video interview.
The US telecommunications company, according to a Reuters news article, wishes to strengthen its position on the market for internet-connected devices. This way, it could provide a competitive platform against other internet and communications companies, such as Verizon and Google Inc. AT&T’s products, ‘Digital Life’ for the home security and automation service and ‘Drive’ for the connected car service, will operate as one, users being able to control various home functions from the car’s dashboard.
Kyusuk Han, University of Michigan, and past speaker at our summit, presents case studies of cyber attacks on automobiles, discusses types of attackers and their capabilities, and suggests countermeasures against attacks in this thorough past presentation.
For your convenience, we've provided a transcript of our exclusive interview with Chris Valasek, Director of Director of Vehicle Security Research at IOActive, and past speaker at our Summit. Within he discusses how he breached a vehicle on the highway last month to expose its cyber security vulnerabilities.
The Ponemon Institute recently conducted a cybersecurity survey sponsored by Rogue Wave Software and Security Innovation of over 500 automotive developers, engineers, and executives, primarily from automotive OEMs and Tier One suppliers. Find out the key findings of the developer survey within!
Henry Bzeih, CTO at KIA, and past speaker at our summit, explores privacy management & transparency, data minimization, and examples of sensitive information in this in-depth case study.
Automotive IQ recently spoke with Florian Netter of Audi Electronics Venture about the current state of Automotive BUS Systems and Ethernet. Cyber security is a real challenge within BUS systems. Cyber security is and will ever be a challenge for the E/E architecture. And the more holistic the driver-supporting software interacts, the more important cyber security is.
Wireless applications have had a fast evolution in the past few years. From the age of laptops to being used on smartphones and tablets, this new and fast-evolving technology is moving towards the automotive industry. Connected cars are already on the road, with even more to come in the next years. As these innovations become less expensive and easier to implement, more and more automotive applications could be seen. So, what are some of the uses for wireless… cars?
New standards are needed to plug security and privacy gaps in our cars and trucks, according to a report released today by Senator Edward J. Markey (D-Mass.). The report, called Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk and first reported on by CBS News’ 60 Minutes, reveals how sixteen major automobile manufacturers responded to questions from Senator Markey in 2014 about how vehicles may be vulnerable to hackers, and how driver information is collected and protected.
Chris Valasek, Director of Vehicle Security Research at IOActive, and past speaker at our summit, broaches safety technologies and intrusion detection systems in this exclusive on-site video interview.
Henry Bzeih, CTO & Head of Connected Car at KIA Motors America, and past speaker at our summit, discusses the main challenges that OEMS and Tier 1 companies are experiencing in in the automotive security space, in this exclusive on-site video interview.
Automotive cybersecurity issues have emerged as information technologies are increasingly deployed in modern vehicles, and security researchers have already demonstrated the associated threats and risks. Although many security protocols have been proposed, they have not considered the threats posed by denial-of-service (DoS) attacks and external connectivity vulnerabilities.
Summit speakers Kyusuk Han and Andre Weimerskirch of the University of Michigan Transportation Research Institute co-wrote this article for IQT Quarterly in the Summer of 2014 that discusses a new in-vehicle protocol called IA-CAN.
Bradley Miller, Legal & Regulatory Affairs at NADA, Saylor Frase, President and CEO at nuspire, Tim Vidas, Security Futurist & Senior Research Analyst at Dell, Jim Foote, VP & Business Security officer at CDK Global, and Dave Austin, CIO at Berkshire Hathaway Automotive, all past speakers at our summit, provide statistics on the areas to protect, retail complexity, and securing the retail environment in this informative past presentation.
Executives and industry experts from Kia, Hyundai, the University of Michigan and IOActive chime in on the industry's most pressing cybersecurity issues and how to resolve them in this exclusive report.
Summit speaker Kyusuk Han of the University of Michigan was kind enough to share this in-depth presentation about the need for in-vehicle security and a proposed protocol to help solve the major security problems.
Josh Corman, Founder of I am the Cavalry, and returning speaker at the approaching summit, goes into industry challenges, and makes predictions for where automotive security is going in the next few years, in this exclusive on-site video interview.
Matthew Carpenter, Principal Security Researcher at Grimm, and past speaker at our summit, talks industry challenges, and what it would take to overhaul cyber security incident mapping, in this exclusive on-site video interview.