MoreBeer
Viper Owner
https://mocana.com/blog/2013/06/26/charlie-miller-to-hack-cars-at-defcon-21/
As our cars have gotten smarter, there has been a lot of attention to the onboard electronics lately. Famous Apple "hacker" Charlie Miller is going to demonstrate exploits against 2 vehicles at DEFCON 21 (A computer security conference) in Las Vegas this summer. The abstract specifically mentions reading and altering CAN bus as well as OBD2 functionality. After seeing the decked out electronics and UCONNECT in the Gen V, this is something I have been wondering about for a while now... Especially if there is an attack vector via the UCONNECT WIFI hotspot!
I am curious what it may also mean to the previous gen's. I go to DEFCON almost every year, so I will make sure to attend these sessions. Anyone else?
https://www.defcon.org/html/defcon-21/dc-21-speakers.html#Miller
https://www.defcon.org/html/defcon-21/dc-21-speakers.html#Staggs
Personally I am happy to see these kinds of research being done and presented. The vast majority of security researchers practice Responsible Disclosure, ie informing the companies what they have found and are planning to present months in advance. In most cases, the companies are receptive to the free consulting and try to patch or fix their product before the talk. In other cases (Boston transit), they subpoena, arrest, and prosecute the researcher to keep their dirty secrets hidden.
As our cars have gotten smarter, there has been a lot of attention to the onboard electronics lately. Famous Apple "hacker" Charlie Miller is going to demonstrate exploits against 2 vehicles at DEFCON 21 (A computer security conference) in Las Vegas this summer. The abstract specifically mentions reading and altering CAN bus as well as OBD2 functionality. After seeing the decked out electronics and UCONNECT in the Gen V, this is something I have been wondering about for a while now... Especially if there is an attack vector via the UCONNECT WIFI hotspot!
I am curious what it may also mean to the previous gen's. I go to DEFCON almost every year, so I will make sure to attend these sessions. Anyone else?
https://www.defcon.org/html/defcon-21/dc-21-speakers.html#Miller
https://www.defcon.org/html/defcon-21/dc-21-speakers.html#Staggs
Personally I am happy to see these kinds of research being done and presented. The vast majority of security researchers practice Responsible Disclosure, ie informing the companies what they have found and are planning to present months in advance. In most cases, the companies are receptive to the free consulting and try to patch or fix their product before the talk. In other cases (Boston transit), they subpoena, arrest, and prosecute the researcher to keep their dirty secrets hidden.