Already a member? Log in

Sign up with your...

or

Sign Up with your email address

Add Tags

Duplicate Tags

Rename Tags

Share This URL With Others!

Save Link

Sign in

Sign Up with your email address

Sign up

By clicking the button, you agree to the Terms & Conditions.

Forgot Password?

Please enter your username below and press the send button.
A password reset link will be sent to you.

If you are unable to access the email address originally associated with your Delicious account, we recommend creating a new account.

Links 1 through 10 of 16 by Luca Bigliardi tagged hardware

In this paper we experimentally evaluate these issues on a modern automobile and demonstrate the fragility of the underlying system structure. We demonstrate that an attacker who is able to infiltrate any Electronic Control Unit (ECU) can leverage this ability to completely circumvent a broad array of safety-critical systems. Over a range of experiments, we demonstrate the ability to adversarially control a wide range of automotive functions and completely ignore driver input, including disabling the brakes, selectively braking individual wheels on demand, stopping the engine, and so on. We find that it is possible to bypass rudimentary network security protections within the car, such as maliciously bridging between our car’s two internal subnets. We also present composite attacks that leverage individual weaknesses, including an attack that embeds malicious code in a car’s telematics unit and that will completely erase any evidence of its presence after a crash.

Share It With Others!

Pop Quiz: What was the first personal computer?

Share It With Others!

Share It With Others!

Share It With Others!

Share It With Others!

Share It With Others!

Share It With Others!

Saving Power on Intel systems with Linux

Share It With Others!

a fast FPGA-based SHA-1 and MD5 bruteforce cracker

Share It With Others!

Share It With Others!