This document discusses the security challenges of connected cars. It covers several topics: the use of mobile apps and keyless entry which can be hacked; issues with computer vision and radars including how slight image alterations can change machine learning interpretations and concerns over radar accuracy, interference, and privacy fingerprinting; current security protocols for VANET/V2X communications; using cooperative intelligent transportation systems to detect insider attacks; revocation protocols to remove misbehaving vehicles from V2X networks; and suggestions for improving security through formal methods and a secure-by-design approach.
1 of 37
Download to read offline
More Related Content
Connected cars - the security challenge: Vehicles, Networks & Protocols
1. 1
Connected cars - the security challenge:
Vehicles, Networks & Protocols
Ofer Rivlin
Product Security Lead @ Cyberark
18. 18
Computer Vision -
Slight alterations to an image, invisible to humans
can result in wildly different interpretations from a machine learning algorithm
28. 28
V2X Revocation Protocol
Revocation of misbehaving vehicles in a V2X network
Vehicles that perform harmful cyber security activities
messages with spoofed positions, incorrect speeds, etc.