Remote Exploitation Of An Unaltered Passenger Vehicle
Remote Exploitation of an Unaltered Passenger Vehicle
You've heard all the civilian buzz about summit speaker Chris Valasek's and Charlie Miller's 2014 Jeep Cherokee Hack. But have you read their 91-page whitepaper outlining their research and explaining their process in granular detail? Polish up on the details of Chris's hack in advance of his session at the event.
Please note: That all fields marked with an asterisk (*) are required.
*Processing your payment may take a moment. Please click submit payment only once, and do not refresh this page. Doing so may result in your credit card being charged more than once.
Your experience on this site will be improved by allowing cookies.