PRESENTERS: | Chris Valasek, Director of Security Intelligence for IOActive, and Charlie Miller, Security Researcher for Twitter |
PRESENTATION: | Keynote: Automotive Attacks: Present and Future |
CONFERENCE: | escar Embedded Security in Cars 2014 |
LOCATION: | Ann Arbor Marriott Ypsilanti, Michigan, USA |
DATE & TIME: | Wednesday June 18, 2014 at 9:15am |
INFO: | https://www.escar.info/index.php?id=526 |
In recent years, interest in automotive security has grown from automobile manufacturers to consumers and security researchers alike. In their keynote presentation, Chris and Charlie will discuss attacker motives, current attacks, and future attacks against the modern automotive machine. In-car apps, V2V, and V2I communications are creating a complex vehicle environment which needs to be secured from start to finish. Chris and Charlie will consider what security researchers and automotive companies can accomplish by working together.
About Chris Valasek
Chris Valasek is the Director of Security Intelligence at IOActive, an industry leader in comprehensive computer security services. Valasek specializes in offensive research methodologies with a focus in reverse engineering and exploitation. He is known for his extensive research in the automotive field and his exploitation and reverse engineering of Windows. He is also the Chairman of SummerCon, the nation’s oldest hacker conference. He holds a B.S. in Computer Science from the University of Pittsburgh.
About Charlie Miller
Charles Miller is a computer security researcher with Twitter. Prior to his current employment, he spent five years working for the National Security Agency. Miller has demonstrated his hacks publicly on products manufactured by Apple. In 2008, he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver, British Columbia, Canada for being the first to find a critical bug in the ultrathin MacBook Air. The next year, he won $5,000 for cracking Safari. In 2009, he demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011, he found a security hole in the iPhone’s/iPad’s security, whereby an application could contact a remote computer to download new, unapproved software. The software could execute any command and steal data (personal or other) using iOS applications’ functions for malicious purposes. As a proof of concept, Miller created an application called Instastock that was approved by Apple’s App Store. He then informed Apple about the security hole and was promptly expelled from the App Store by Apple.
About escar
escar is the leading automotive cyber-security workshop. escar USA workshop will provide a forum for dissemination of state-of-the-practice approaches to cyber security in the automotive industry, and provide an exchange of ideas for building of a cyber security knowledge base in the automotive industry.
About IOActive
IOActive is a comprehensive, high-end information security services firm with a long and established track record in delivering elite security services to its customers. Our world-renowned consulting and research teams deliver a portfolio of specialist security services ranging from penetration testing and application code assessment to chip reverse engineering. Global 500 companies across every industry continue to trust IOActive with their most critical and sensitive security issues. Founded in 1998, IOActive is headquartered in Seattle, USA, with global operations through the Americas, EMEA, and Asia Pac regions. Visit www.ioactive.com for more information. Follow IOActive on Twitter: http://twitter.com/ioactive.
-###-