Sujet 2 - Car Hacking
Car security research is interesting for a general audience because most people have cars and understand the inherent dangers of an attacker gaining control of their vehicle. Automotive security research, for the most part, began in 2010 when researchers from the University of Washington and the University of California San Diego [1] showed that if they could inject messages into the CAN bus of a vehicle (believed to be a 2009 Chevy Malibu) they could make physical changes to the car, such as controlling the display on the speedometer, killing the engine, as well as affecting braking. This research was very interesting but received widespread criticism because people claimed there was not a way for an attacker to inject these types of messages without close physical access to the vehicle, and with that type of access, they could just cut a cable or perform some other physical attack.
Documents
-
IO Active Remote Car Hacking (PDF - 4.4 Mio)
-
Remote Car Hacking (PDF - 4.3 Mio)
-
Vulnerability Note (PDF - 75.6 kio)
-
Developments in Car Hacking (PDF - 3 Mio)
Accueil > Enseignement > Sécurité des Systèmes d’Information > Sujet 2 - Car Hacking