PRESENTATION:
|
Hacking Cars Via the CAN Bus
|
PRESENTER(S):
|
Chris Valasek and Charlie Miller
|
CONFERENCE:
|
ITWeb Security Summit 2014
|
LOCATION:
|
Johannesburg, Gauteng, South Africa
|
DATE & TIME:
|
May 28, 2014 at 11:55 AM
|
As automobiles become more connected, security experts naturally begin to think about their vulnerability to attack. During their talk, Chris Valasek and Charlie Miller will discuss how automotive networks operate and their inherent insecurities. Together, they will outline the various attacks that researchers have performed against automobiles and present ways to secure modern vehicles.
Additionally, IOActive South Africa is offering a high-level educational forum – Adventures in Auto Security – for car manufacturers on May 29, from 7am – 10am. The event being held at the Menlyn Boutique Hotel in Pretoria will be an entertaining and enlightening car security breakfast session hosted by Chris Valasek.
Car manufacturers interested in attending the car forum breakfast on May 29, please contact Yvette Du Toit for more information: yvette.dutoit@nullioactive.com.
About Chris Valasek
Chris Valasek is the Director of Security Intelligence at IOActive. He specialises in attack methodologies, reverse engineering, and exploitation techniques. Valasek is widely regarded for his research on Windows heap exploitation. He regularly speaks on the security industry conference circuit. His previous tenures include Coverity, Accuvant LABS, and IBM Internet Security Systems. Valasek is also the Chairman of SummerCon, the nation’s oldest hacker conference. Chris holds a B.S. in Computer Science from the University of Pittsburgh.
About Charlie Miller
Charles Miller is a computer security researcher with Twitter. Prior to his current employment, he spent five years working for the National Security Agency. Miller has demonstrated his hacks publicly on products manufactured by Apple. In 2008, he won a $10,000 cash prize at the hacker conference Pwn2Own in Vancouver, British Columbia, Canada for being the first to find a critical bug in the ultrathin MacBook Air. The next year, he won $5,000 for cracking Safari. In 2009, he demonstrated an SMS processing vulnerability that allowed for complete compromise of the Apple iPhone and denial-of-service attacks on other phones. In 2011, he found a security hole in the iPhone’s/iPad’s security, whereby an application could contact a remote computer to download new, unapproved software. The software could execute any command and steal data (personal or other) using iOS applications’ functions for malicious purposes. As a proof of concept, Miller created an application called Instastock that was approved by Apple’s App Store. He then informed Apple about the security hole and was promptly expelled from the App Store by Apple.
About ITWeb Security Summit
Now in its ninth year, ITWeb Security Summit 2014 will bring together international and local IT and security professionals, practitioners, industry experts and analysts to share their experiences, acquire knowledge and gain an understanding of the key tools, techniques and strategies needed to safeguard their organizations’ most valuable asset – information.