Martin Schmiedecker

Cyber Security: Small, and Large!

What makes a modern car so vulnerable to hackers? It's a network of computers on wheels, and physical access means game over for security.

Cyber Security: Small, and Large!
#1about 3 minutes

The role of security in specialized vehicle projects

An introduction to Bosch Engineering's work on small-series projects like autonomous excavators and high-performance cars, where security is critical.

#2about 3 minutes

A brief history of early automotive hacking vectors

Early academic research demonstrated how to compromise cars through vectors like manipulated MP3 files and spoofed tire pressure sensors.

#3about 1 minute

The landmark 2015 remote Jeep hack

The infamous remote hack of a Jeep Cherokee over its cellular connection forced the industry to take remote threats seriously.

#4about 5 minutes

Vulnerabilities in keyless entry and vehicle data

Modern attacks target convenience features, from signal relaying for keyless entry to sophisticated hacks for stealing Teslas and manipulating digital odometers.

#5about 2 minutes

Understanding attacker motivations and barriers

Attackers are driven by curiosity and the need for self-repair, while the high cost of vehicles has historically been a major barrier to research.

#6about 4 minutes

Modern cybersecurity challenges for developers

Developers now face increasing system complexity, supply chain attacks, ransomware threats, and a growing attack surface from vehicle connectivity.

#7about 4 minutes

The expanding role and risks of software in cars

Software now controls every aspect of a modern vehicle, introducing risks like integer overflows that can have catastrophic consequences in autonomous systems.

#8about 2 minutes

Using smartphones as a more secure car key

Replacing traditional key fobs with smartphones offers enhanced security and enables new convenient services like seamless digital keys for rental cars.

#9about 2 minutes

Upcoming legislation and industry security standards

New regulations like ISO 21434 and UNECE mandates will require manufacturers to implement and audit verifiable security processes throughout the vehicle lifecycle.

#10about 2 minutes

Resources for staying current on automotive security

Developers can stay informed about the latest threats and research by following industry groups like the Automotive Security Research Group (ASRG).

#11about 9 minutes

Q&A on liability, standards, and future threats

A discussion covering complex topics like liability in autonomous accidents, security standardization, preventing hardware hacking, and the potential for centralized failures.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?
DC
Daniel Cranney
How software is steering vehicle technology
The automotive industry is entering a transformative era, and developers have a unique opportunity to be part of it. Cars are no longer just mechanical machines; they’re sophisticated tech platforms with software at their core. This shift, defined by...
How software is steering vehicle technology
CH
Chris Heilmann
WeAreDevelopers Dev Digest Issue 116 - The new search wars…
Welcome to edition 116 of the WeAreDevelopers Dev Digest. This time we talk about how the fight for AI and search dominance heats up with Google releasing a lot at their I/O event and OpenAI doing the same a day earlier…News and ArticlesA ton of thin...
WeAreDevelopers Dev Digest Issue 116 - The new search wars…

From learning to earning

Jobs that call for the skills explored in this talk.