Chapters
Transcript
Episode notes
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29
Introduction
00:00 • 2min
Security Hacks
02:18 • 2min
Hacking a Carburator Over Blue Tooth
04:00 • 2min
How Do You Make Money by Hacking Cars?
05:34 • 2min
Aren't We Close to That Already?
07:39 • 2min
Monoculture
09:31 • 2min
The Automotive Echo System Is a Bit More Complex Than Consumer Electronics
11:08 • 2min
What's the Difference Between Sellmotum and Over the Air?
13:32 • 2min
What Can I Do if I Hack My Car?
15:09 • 2min
Keyless Entry Systems
16:42 • 2min
Is There a Threat to the Security of Your Car?
18:49 • 3min
Security of Vehicles
21:40 • 2min
Is the Overall Project Am in the Right Direction?
23:23 • 2min
The System's Perspective as a Security As
25:22 • 2min
The Engineering of the Vehicle Doesn't End When It Hits the Street
26:59 • 2min
What's Going to Happen in the Architecture of a Car?
28:47 • 3min
Virus in My Car
32:06 • 2min
Is Misra a Security Standard?
34:08 • 3min
How to Learn More About Automotive Security?
36:51 • 2min
Will It Be Hacked?
38:47 • 2min
Brickin Tractors
40:28 • 2min
Is There a Balance Between the Right to Repair and Ownership?
41:58 • 2min
What Are Some Other Good Security Models Tips?
43:53 • 2min
Security of a Vehicle - How Do You Prepare for Them?
45:26 • 2min
How to Fix a Replay Vulnerable Key Fob?
47:37 • 2min
Is There a Hardware Solution?
49:15 • 2min
Security Overflows - Are There Any Good Attack Surfaces?
51:11 • 3min
How to Protect Your Car From Intruders?
53:55 • 2min
A Canvas and Automotive Security
55:52 • 3min