Martin Schmiedecker
Cyber Security: Small, and Large!
#1about 3 minutes
The role of security in specialized vehicle projects
An introduction to Bosch Engineering's work on small-series projects like autonomous excavators and high-performance cars, where security is critical.
#2about 3 minutes
A brief history of early automotive hacking vectors
Early academic research demonstrated how to compromise cars through vectors like manipulated MP3 files and spoofed tire pressure sensors.
#3about 1 minute
The landmark 2015 remote Jeep hack
The infamous remote hack of a Jeep Cherokee over its cellular connection forced the industry to take remote threats seriously.
#4about 5 minutes
Vulnerabilities in keyless entry and vehicle data
Modern attacks target convenience features, from signal relaying for keyless entry to sophisticated hacks for stealing Teslas and manipulating digital odometers.
#5about 2 minutes
Understanding attacker motivations and barriers
Attackers are driven by curiosity and the need for self-repair, while the high cost of vehicles has historically been a major barrier to research.
#6about 4 minutes
Modern cybersecurity challenges for developers
Developers now face increasing system complexity, supply chain attacks, ransomware threats, and a growing attack surface from vehicle connectivity.
#7about 4 minutes
The expanding role and risks of software in cars
Software now controls every aspect of a modern vehicle, introducing risks like integer overflows that can have catastrophic consequences in autonomous systems.
#8about 2 minutes
Using smartphones as a more secure car key
Replacing traditional key fobs with smartphones offers enhanced security and enables new convenient services like seamless digital keys for rental cars.
#9about 2 minutes
Upcoming legislation and industry security standards
New regulations like ISO 21434 and UNECE mandates will require manufacturers to implement and audit verifiable security processes throughout the vehicle lifecycle.
#10about 2 minutes
Resources for staying current on automotive security
Developers can stay informed about the latest threats and research by following industry groups like the Automotive Security Research Group (ASRG).
#11about 9 minutes
Q&A on liability, standards, and future threats
A discussion covering complex topics like liability in autonomous accidents, security standardization, preventing hardware hacking, and the potential for centralized failures.
Related jobs
Jobs that call for the skills explored in this talk.
Featured Partners
Related Videos
Cybersecurity for Software Defined Vehicles
Henning Harbs
Automotive Security Challenges: A Supplier's View
Davor Frkat
Getting under the skin: The Social Engineering techniques
Mauro Verderosa
Climate vs. Weather: How Do We Sustainably Make Software More Secure?
Panel Discussion
You can’t hack what you can’t see
Reto Kaeser
The attacker's footprint
Antonio de Mello & Amine Abed
Securing Your Web Application Pipeline From Intruders
Milecia McGregor
How to Cause (or Prevent) a Massive Data Breach- Secure Coding and IDOR
Anna Bacher
From learning to earning
Jobs that call for the skills explored in this talk.


Embedded Softwareentwickler (m/w/d)
Arnold NextG GmbH
München, Germany
Intermediate
Embedded C
Functional safety
Technical Security & Automation Engineer
appliedAI Initiative GmbH
München, Germany
Remote
Junior
Bash
Python
Powershell
Network Security
+2
Embedded Security Engineer (m/w/d) - Schwachstellenanalyse | Car IT | Secure Coding
Prognum Automotive GmbH
Ulm, Germany
Remote
C++
Automotive Cyber Security Manager (all gender)
ALTEN Consulting ServicesALTEN Consulting Services GmbH
München, Germany
C++
Python





