Reinhard Kugler

A Hitchhikers Guide to Container Security - Automotive Edition 2024

Could a single container hack change your car's instrument cluster in real-time? Learn how eBPF provides kernel-level defense for the next generation of software-defined vehicles.

A Hitchhikers Guide to Container Security - Automotive Edition 2024
#1about 2 minutes

Recalling a famous remote car hack from 2015

A historical remote car hack demonstrates how attackers gained control over vehicle functions by pivoting from the infotainment system.

#2about 4 minutes

Shifting from distributed ECUs to centralized computers

The automotive industry is moving from a complex network of individual electronic control units (ECUs) to centralized high-performance computers (HPCs) to simplify updates and maintenance.

#3about 6 minutes

Running containers with access to vehicle electronics

A live demonstration shows how a containerized application can directly access and manipulate a car's internal network to control components like the instrument cluster.

#4about 5 minutes

Using eBPF to observe and secure container networking

eBPF programs can be attached to the Linux kernel to observe and filter a container's network traffic at a low level without requiring a sidecar.

#5about 2 minutes

Securing hardware update channels with eBPF policies

eBPF can trace and block unauthorized write operations to hardware interfaces like the SPI bus, preventing malicious firmware flashing from a compromised container.

#6about 2 minutes

Understanding the offensive potential of eBPF rootkits

eBPF is a dual-use technology that can also be used to create stealthy, in-memory rootkits capable of modifying network packets on the fly.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
DC
Daniel Cranney
How software is steering vehicle technology
The automotive industry is entering a transformative era, and developers have a unique opportunity to be part of it. Cars are no longer just mechanical machines; they’re sophisticated tech platforms with software at their core. This shift, defined by...
How software is steering vehicle technology
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?
DC
Daniel Cranney
Dev Digest 188: CfP time, the risks of NPM and IKEA algorithms
Inside last week’s Dev Digest 188 . 🤖 GitHub Copilot CLI is now in public review 💻 Microsoft is bringing ‘vibe working’ to office apps 🎣 Attackers abuse AI tools to generate captchas in fishing attacks ⚠️ When LLMs autonomously attack 🧠 Common cause...
Dev Digest 188: CfP time, the risks of NPM and IKEA algorithms

From learning to earning

Jobs that call for the skills explored in this talk.

Rust and GoLang

Rust and GoLang

NHe4a GmbH
Karlsruhe, Germany

Remote
55-65K
Intermediate
Senior
Go
Rust
Application Security Engineer

Application Security Engineer

Porsche Informatik Gesellschaft m.b.H.
Siezenheim, Austria

Remote
55K
DevOps
Microsoft Office
Agile Methodologies
+1