Audio Session - Building Comprehensive Security into Cars
Did you miss Brian Witten's session at the last summit? He is the Senior Director, Internet of Things at Symantec Corporation, and his session was rated at 4.5/5 by attendees. Listen to the full 43-minute summit session here for free!
Audio Workshop- Communications: Data Privacy & the Standardization of Security Protocols and Requirements
Josh Corman, Founder of I am the Cavalry, presented this workshop at the past summit. Listen to the full presentation and learn how to apply standardized security protocols to your cyber security ecosystem.
Audio Session - What Does it Mean to Create a Secure Platform?
Hadi Nahari, Chief Security Architect at NVIDIA, presented this session at the last summit. Within he identifies the process by which development of a secure platform is achieved. Have a listen!
Modern Data Platform for Connected Vehicles
Check out the informative presentation Grant Bodley put together for the last Automotive Cyber Security Summit.
Barbara Ciaramitaro presents "Technology Overdrive," Understanding the Security Impact that the Advanced Machinery has throughout Infrastructure of the Car.
Principles of Automotive Cyber-Security
Doug Moeller reviews the "Principles of Automotive Cyber Security" in this informational presentation.
Challenges to Make Cars Secure
Kyusuk Han, University of Michigan, and past speaker at our summit, presents case studies of cyber attacks on automobiles, discusses types of attackers and their capabilities, and suggests countermeasures against attacks in this thorough past presentation.
Cyber Security - OEM Point of View
Henry Bzeih, CTO at KIA, and past speaker at our summit, explores privacy management & transparency, data minimization, and examples of sensitive information in this in-depth case study.
PANEL: Automotive Retail and the Connected Car
Bradley Miller, Legal & Regulatory Affairs at NADA, Saylor Frase, President and CEO at nuspire, Tim Vidas, Security Futurist & Senior Research Analyst at Dell, Jim Foote, VP & Business Security officer at CDK Global, and Dave Austin, CIO at Berkshire Hathaway Automotive, all past speakers at our summit, provide statistics on the areas to protect, retail complexity, and securing the retail environment in this informative past presentation.
Practical Real-Time Frame Authentication for In-Vehicle Networks
Summit speaker Kyusuk Han of the University of Michigan was kind enough to share this in-depth presentation about the need for in-vehicle security and a proposed protocol to help solve the major security problems.
Past Presentation by Grant Bodley
Download the past presentation from Grant Bodley from the 3rd Annual Automotive Cyber Security Summit, "Modern Data Platform for Connected Vehicles."
Cybersecurity of Autonomous Vehicle PlatooningDi Ma, Associate Professor, SAFE Lab, Department of Computer and Information Science at University of Michigan-Dearborn, discusses the effects of security attacks on the communication channel as well as sensor tampering of a connect vehicle platoon. And how different countermeasures could be potentially used to improve the security and safety of the automated vehicle platoon.
Leveraging Vehicle Data to Bolster Vehicle SecurityAndre Weimerskirch, VP, Global Cyber Security at Lear, presents on the latest vulnerabilities and entry points stemming from increasing use of sensors to communicate within the vehicle, and new modes of communication both within and outside the vehicle. And tools available to secure internal and external communications, and leverage the increase in data as a means of improving security.
Encouraging a United Approach to Cyber Security Through Technology Sharing InitiativesVictoria Coleman, Senior Fellow at Potomac Institute for Policy Studies, discusses Current technology sharing and standardization efforts from across the industry and benefits of collaboration to both manufacturers and consumers. Also next steps that the automotive industry needs to take together in order to response to current and emerging cybersecurity challenges.
WhiteboxCRYPTO Strength of Security
This white paper, courtesy of Microsemi, describes the company's white-box cryptography product, WhiteboxCRYPTO™. Further, it also describes the structure of the white-box algorithms, how this structure differentiates white-box cryptography from classical algorithms, and why these structures are far more secure than classical software crypto implementations.
Autonomous Vehicle Technology
This thorough, 200-page report, courtesy of the RAND Transportation, Space, and Technology Program, explores legislative activity, cyber hacks, the role of telematics and communications, and liability implications, among many other topics surrounding autonomous cars.
What do the automakers really think?
This 2015 report still holds true in the automotive cyber security industry currently. Check out what the automakers really think is going on in the world of all things automotive technology!
Remote Exploitation of an Unaltered Passenger Vehicle
You've heard all the civilian buzz about summit speaker Chris Valasek's and Charlie Miller's 2014 Jeep Cherokee Hack. But have you read their 91-page whitepaper outlining their research and explaining their process in granular detail? Polish up on the details of Chris's hack in advance of his session at the event.
Car Cybersecurity: What do the automakers really think?
The Ponemon Institute recently conducted a cybersecurity survey sponsored by Rogue Wave Software and Security Innovation of over 500 automotive developers, engineers, and executives, primarily from automotive OEMs and Tier One suppliers. Find out the key findings of the developer survey within!
Automotive Cyber Security: Industry Perspectives
Executives and industry experts from Kia, Hyundai, the University of Michigan and IOActive chime in on the industry's most pressing cybersecurity issues and how to resolve them in this exclusive report.
Enhance Security Assurance in Embedded Systems with MISRA CThis whitepaper presented by AutomotiveIQ includes the importance of process standards and guidelines, the demands for developing secure systems, MISRA C security amendments address the need, insecure coding examples and related rules, automatic detection of rule violation at an early stage, is that enough for higher level of assurance for security? And more.
Secure And Efficient OTA (Over-The-Air) Updating For A Changing Automotive WorldThis document discusses the drivers that are likely to broaden the use of OTA update technology throughout the car, and outlines the specific cybersecurity threats this expanded use of the technology can be expected to bring about. It then details recommended security objectives and architectural modifications that can help car manufactures mitigate these mounting risks. Courtesy of HARMAN.
Chris Valasek Hacks an SUV: Transcript
For your convenience, we've provided a transcript of our exclusive interview with Chris Valasek, Director of Director of Vehicle Security Research at IOActive, and past speaker at our Summit. Within he discusses how he breached a vehicle on the highway last month to expose its cyber security vulnerabilities.
"The Industry should learn from the Software Sector" - Challenges for Automotive Cyber Security
Automotive IQ had the opportunity to interview Dr. Siraj Ahmed Shaikh, Expert in Cyber Security from Coventry University and Chairman at last year's conference, on the current challenges within the industry. See what they are!
Mercedes-Benz Senior Specialist on the Current Landscape of Cyber SecurityWe sat down with Chandrasekhar Potluri, Senior Functional Safety Controls Engineer at Mercedes-Benz Research and Development, who spoke to us about the next ten years and where the automotive industry heading as a whole, how the attention towards auto cyber security has changed the industry within the last year, how the auto industry is currently tackling cyber security, and who or what they should be looking at to solve those challenges. As well as hackers using apps or mobile phones to break into a vehicle’s systems.
Fast Track Your Attendance
Past Attendee List
Check out those expected to attend the upcoming Automotive Cyber Security West Summit in March!
Justify Your Trip
Hard for you to leave the office? Download our "Convince Your Boss" letter now for a sure fire way to leave the office and attend this summit!
Current Attendee List
Take a look at the Current Attendee Snapshot to see who you'll get to meet and network with this March!
Automotive Cyber Security Market Report 2016-2021The latest report assesses that the revenues from the automotive cyber security market will exceed $55 million in 2016. Automotive cyber security is undeniably one of the fastest growing submarkets in the car safety and security sector. Courtesy of ASD Reports.
5th Automotive Cyber Security - Sponsorship Propsectus
Secure exclusive sponsorship and exhibition opportunities through Thought Leadership Sessions, Workshops Presentations, Innovative Demo Drives and more. Download the Sponsorship Prospectus to see how you can get involved today!
Chris Valasek Hacks an SUV
Chris Valasek, Director of Director of Vehicle Security Research at IOActive, and past speaker at our Summit, discusses how he breached a vehicle on the highway to expose its cyber security vulnerabilities in this exclusive video interview.
Past Speaker Interview: Chris Valasek
Chris Valasek, Director of Vehicle Security Research at IOActive, and past speaker at our summit, broaches safety technologies and intrusion detection systems in this exclusive on-site video interview.
Past Speaker Interview: Henry Bzeih
Henry Bzeih, CTO & Head of Connected Car at KIA Motors America, and past speaker at our summit, discusses the main challenges that OEMS and Tier 1 companies are experiencing in in the automotive security space, in this exclusive on-site video interview.
Past Speaker Interview: Josh Corman
Josh Corman, Founder of I am the Cavalry, and returning speaker at the approaching summit, goes into industry challenges, and makes predictions for where automotive security is going in the next few years, in this exclusive on-site video interview.
Past Speaker Interview: Matthew Carpenter
Matthew Carpenter, Principal Security Researcher at Grimm, and past speaker at our summit, talks industry challenges, and what it would take to overhaul cyber security incident mapping, in this exclusive on-site video interview.
U.S. Senator Gary Peters of MichiganSenator Peters addresses the exciting developments currently underway within the automotive sphere. But with advancements like self-driving functionality and connectivity features come challenges that need to be addressed by both regulators and the industry. Cyber security has evolved into a massive frontier that key auto players will now need to trek as rapid innovation continues within the vehicle space. Senator Peters welcomes you to his home state of Michigan; the location of Auto IQ’s 5th Automotive Cyber Security Summit where you will be able to join fellow thought-leaders in confronting the future of automotive technology and security.
Mercedes-Benz: Creating An Integrated Approach To Cyber Security & Functional SafetyChandrasekhar Potluri, Senior Functional Safety Controls Engineer at Mercedes-Benz Research and Development, discusses steps automotive manufacturers can take in order to implement an integrated approach for functional safety, and cyber security that will improve vehicle security & consumer safety, and benefits of moving toward this approach, which will allow security to be part of the entire life cycle of the vehicle.
Interview with a Hacker
What is your position on vigilante hackers? You will have a chance to meet one in March. Chris Valasek, Security Lead at Uber's Advanced Technologies Center, and famed Jeep hacker, will be speaking at the 3rd Automotive Cyber Security Summit. We tracked him down in advance of his session to ask him about his motivations, which arm of the auto industry was responsible for the openings he expolited, and his experience as a white hat.
Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk
New standards are needed to plug security and privacy gaps in our cars and trucks, according to a report released today by Senator Edward J. Markey (D-Mass.). The report, called Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk and first reported on by CBS News’ 60 Minutes, reveals how sixteen major automobile manufacturers responded to questions from Senator Markey in 2014 about how vehicles may be vulnerable to hackers, and how driver information is collected and protected.
In the Driver's Seat to Cyber Security
This interactive experience puts you in the driver's seat towards cyber security. Skirt the vulnerabilities, view the facts, and hear from our expert summit speakers. Who will win the race to a secure infrastructure? It could be you!
The Future of Automotive Network Solution - BUS Systems and Ethernet
Automotive IQ recently spoke with Florian Netter of Audi Electronics Venture about the current state of Automotive BUS Systems and Ethernet. Cyber security is a real challenge within BUS systems. Cyber security is and will ever be a challenge for the E/E architecture. And the more holistic the driver-supporting software interacts, the more important cyber security is.
Post Show Report
Take a look at our Post Show Review for:
- An overview of the high-level speakers that joined us in past iterations
- A glimpse of past participants & sponsors from our Automotive Cyber Security series
- Testimonials from Robert Bosch, Denso, Harley-Davidson Motor Co., GHSP, and more
- A sneak peek at this year's highlighted topics
Security Implications of Connected & Autonomous Vehicle TechnologyWe caught up with Karl Brauer, Former Senior Director of Automotive Industry Insights at Kelley Blue Book, who discusses with us technologies that pose a threat to vehicle security, major implications of autonomous driving on cyber security, and how social acceptance or regulatory issues will hinder the progression of autonomous vehicles.
AT&T to Link Connected Cars and Home Technologies Services
The US telecommunications company, according to a Reuters news article, wishes to strengthen its position on the market for internet-connected devices. This way, it could provide a competitive platform against other internet and communications companies, such as Verizon and Google Inc. AT&T’s products, ‘Digital Life’ for the home security and automation service and ‘Drive’ for the connected car service, will operate as one, users being able to control various home functions from the car’s dashboard.
Check out this super informative article about the cars of the future and their susceptibility to hackers taken director from Automotive IQ!
Using wireless technology to make cars better?
Wireless applications have had a fast evolution in the past few years. From the age of laptops to being used on smartphones and tablets, this new and fast-evolving technology is moving towards the automotive industry. Connected cars are already on the road, with even more to come in the next years. As these innovations become less expensive and easier to implement, more and more automotive applications could be seen. So, what are some of the uses for wireless… cars?
The Automotive Industry and their Partners are Stepping up to Protect their Customers
The Automotive Industry is stepping up their protection in order to keep hackers at bay in their connected vehicles. Both state and federal government are in agreement to make a change! Download this article to check out what individual states and groups have in the works.
Automotive Cybersecurity for In-Vehicle Communication
Automotive cybersecurity issues have emerged as information technologies are increasingly deployed in modern vehicles, and security researchers have already demonstrated the associated threats and risks. Although many security protocols have been proposed, they have not considered the threats posed by denial-of-service (DoS) attacks and external connectivity vulnerabilities.
Summit speakers Kyusuk Han and Andre Weimerskirch of the University of Michigan Transportation Research Institute co-wrote this article for IQT Quarterly in the Summer of 2014 that discusses a new in-vehicle protocol called IA-CAN.
V2X Security from an Expert
Andre is no stranger to analyzing automotive cyber security. In fact, in his role at the Lear Corporation he heads up their V2X department working with the analytics that encompass why consumer vehicles are susceptible to hacking and how to improve their security. Download his interview to read more!
Adventures in Automotive Networks and Control Units
Previous research has shown that it is possible for an attacker to get remote code execution on the electronic control units (ECU) in automotive vehicles via various interfaces such as the Bluetooth interface and the telematics unit. This paper aims to expand on the ideas of what such an attacker could do to influence the behavior of the vehicle after that type of attack. In particular, we demonstrate how on two different vehicles that in some circumstances we are able to control the steering, braking, acceleration and display. We also propose a mechanism to detect these kinds of attacks. In this paper we release all technical information needed to reproduce and understand the issues involved including source code and a description of necessary hardware. Courtesy of: Charlie Miller
A Survey of Remote Automotive Attack Surfaces
This paper attempts to analyze numerous automobiles varying in production year to show how remote attack surfaces have evolved with time and to try to quantify the difficulty of a remote attack for a variety of different automobiles. This analysis will include how large the remote attack surface is, how segmented the ECUs which have physical control of the automobile are from those accepting external input, and the features present in the automobile which allow computers to physically control it. Additionally, this paper recommends defensive strategies including an IDS-type system to detect and prevent these types of attacks. Courtesy of: Charlie Miller
CAN Message Injection
This paper investigates why physical control inconsistencies exist and present techniques that can be leveraged to more fully obtain control of the physical systems of the car while only injecting CAN bus messages. It also discusses ways to makes these systems more robust to CAN message injection. Courtesy of: Charlie Miller