Embedded

415: Rolling Computers

Jun 2, 2022
Ask episode
Chapters
Transcript
Episode notes
1
Introduction
00:00 • 2min
2
Security Hacks
02:18 • 2min
3
Hacking a Carburator Over Blue Tooth
04:00 • 2min
4
How Do You Make Money by Hacking Cars?
05:34 • 2min
5
Aren't We Close to That Already?
07:39 • 2min
6
Monoculture
09:31 • 2min
7
The Automotive Echo System Is a Bit More Complex Than Consumer Electronics
11:08 • 2min
8
What's the Difference Between Sellmotum and Over the Air?
13:32 • 2min
9
What Can I Do if I Hack My Car?
15:09 • 2min
10
Keyless Entry Systems
16:42 • 2min
11
Is There a Threat to the Security of Your Car?
18:49 • 3min
12
Security of Vehicles
21:40 • 2min
13
Is the Overall Project Am in the Right Direction?
23:23 • 2min
14
The System's Perspective as a Security As
25:22 • 2min
15
The Engineering of the Vehicle Doesn't End When It Hits the Street
26:59 • 2min
16
What's Going to Happen in the Architecture of a Car?
28:47 • 3min
17
Virus in My Car
32:06 • 2min
18
Is Misra a Security Standard?
34:08 • 3min
19
How to Learn More About Automotive Security?
36:51 • 2min
20
Will It Be Hacked?
38:47 • 2min
21
Brickin Tractors
40:28 • 2min
22
Is There a Balance Between the Right to Repair and Ownership?
41:58 • 2min
23
What Are Some Other Good Security Models Tips?
43:53 • 2min
24
Security of a Vehicle - How Do You Prepare for Them?
45:26 • 2min
25
How to Fix a Replay Vulnerable Key Fob?
47:37 • 2min
26
Is There a Hardware Solution?
49:15 • 2min
27
Security Overflows - Are There Any Good Attack Surfaces?
51:11 • 3min
28
How to Protect Your Car From Intruders?
53:55 • 2min
29
A Canvas and Automotive Security
55:52 • 3min