Friday, February 14, 2014

SyScan'14 Speaker - Charlie Miller & Chris Valasek

 Topic: 

Car Hacking for "Poories"

 

Charles Miller
Charlie Miller is a computer security researcher with Twitter. He was the first with a public remote exploit for both the iPhone and a phone running Android. He won the CanSecWest Pwn2Own competition for the last four years. He's hacked Second Life and Batteries. He has authored two information security books and holds a PhD from the University of Notre Dame. 



Chris Valasek
Chris Valasek is the Directory of Security Intelligence at IOActive focusing on attack trends while continuing various research projects. Prior to IOActive, Valasek was a Senior Research Scientist at Accuvant LABS, IBM Internet Security Systems, and Coverity. Valasek's research focus spans areas such as vulnerability discovery, exploitation techniques, and reverse engineering, contributing public disclosures and authoring research on these topics to the broader security community. While Valasek is best known for his publications regarding the Microsoft Windows Heap, his research has broken new ground in areas such as vulnerability discovery, exploitation techniques, reverse engineering, source code and binary auditing, and protocol analysis. Valasek has presented his research at major international security conferences including Black Hat USA and Europe, ekoparty, INFILTRATE, and RSA, and is the chairman of SummerCon, the nation's oldest hacker convention.

1 comment:

  1. This device is useless, I am in the business of reverse engineering automotive electronics, and we build devices to remotely control functions of your vehicle. These guys are taking this too far and like everyone else trying to fear people into buying there useless product (IT IS GARBAGE). Get someone like me who does this for a living and I will render this device useless with the snip of the high speed can line at the obd2 connector, and then I would leave their device attached to make the car owner feel safe because this thing is still hooked to their car. But now it will only be reading low speed low level messages being that the high speed can line is disabled (high speed line transfers all messages being sent from engine,trans.,ABS,steering module restraint module all safety oriented modules). Before I started cansniffer.com I was an automotive electronic diagnostic tech for 14 years. I completely understand how these modules communicate. These guys need to stick with their jobs at twitter!!.They are not doing anything special. I can take anyone with no experience with a laptop and a 50.00 interface and have them doing the same thing these guys are doing within an hour. The only way to prevent a true malicious hack is to encrypt can messages . If you are someone that is actually worried about this (because cars are being hacked everyday lol!)pay your local mechanic to splice in a plug so you can remove the obd 2 connector from your vehicle and put it in your house till you need to head to the shop for repairs. Being that it would be a different plug the attacker wont be able to find pin 14 and pin 6 of the can lines. HACK PREVENTED FOR 5 DOLLARS!! "im truly laughing right now that i even had to take the time to type this". HACKING THE NETWORK OF YOUR VEHICLE IS A HOBBY !!!!. Also almost all vehicles from 2009 and up use a power module or what they call an intergrated power module this device is the gateway for vehicle communications. Meaning that a hacker would need hours worth of access under dash and under the hood to hack into up to 3 networks that are running on all of our vehicles now. So if you plug their device into the diagnostic port it is "ABSOLUELY WORTHLESS" look for my videos soon about this topic on youtube and our website cansniffer.com.

    Read more: http://www.businessinsider.com/r-hacking-experts-build-device-to-protect-cars-from-cyber-attacks-2014-22#ixzz38jnQrpCg

    ReplyDelete