
Reinhard Kugler
Aug 20, 2024
A Hitchhikers Guide to Container Security - Automotive Edition 2024

#1about 2 minutes
Recalling a famous remote car hack from 2015
A historical remote car hack demonstrates how attackers gained control over vehicle functions by pivoting from the infotainment system.
#2about 4 minutes
Shifting from distributed ECUs to centralized computers
The automotive industry is moving from a complex network of individual electronic control units (ECUs) to centralized high-performance computers (HPCs) to simplify updates and maintenance.
#3about 6 minutes
Running containers with access to vehicle electronics
A live demonstration shows how a containerized application can directly access and manipulate a car's internal network to control components like the instrument cluster.
#4about 5 minutes
Using eBPF to observe and secure container networking
eBPF programs can be attached to the Linux kernel to observe and filter a container's network traffic at a low level without requiring a sidecar.
#5about 2 minutes
Securing hardware update channels with eBPF policies
eBPF can trace and block unauthorized write operations to hardware interfaces like the SPI bus, preventing malicious firmware flashing from a compromised container.
#6about 2 minutes
Understanding the offensive potential of eBPF rootkits
eBPF is a dual-use technology that can also be used to create stealthy, in-memory rootkits capable of modifying network packets on the fly.
Related jobs
Jobs that call for the skills explored in this talk.
today
Junior Python Backend / GenAI Support Intern

Eltemate
Amsterdam, Netherlands
Junior
today
Senior Researcher for Generative AI

Dynatrace
Linz, Austria
Senior
today
Team Lead and Senior Software Engineer with focus on AI

Dynatrace
Linz, Austria
Senior