Martin Schmiedecker
Cyber Security: Small, and Large!
#1about 3 minutes
The role of security in specialized vehicle projects
An introduction to Bosch Engineering's work on small-series projects like autonomous excavators and high-performance cars, where security is critical.
#2about 3 minutes
A brief history of early automotive hacking vectors
Early academic research demonstrated how to compromise cars through vectors like manipulated MP3 files and spoofed tire pressure sensors.
#3about 1 minute
The landmark 2015 remote Jeep hack
The infamous remote hack of a Jeep Cherokee over its cellular connection forced the industry to take remote threats seriously.
#4about 5 minutes
Vulnerabilities in keyless entry and vehicle data
Modern attacks target convenience features, from signal relaying for keyless entry to sophisticated hacks for stealing Teslas and manipulating digital odometers.
#5about 2 minutes
Understanding attacker motivations and barriers
Attackers are driven by curiosity and the need for self-repair, while the high cost of vehicles has historically been a major barrier to research.
#6about 4 minutes
Modern cybersecurity challenges for developers
Developers now face increasing system complexity, supply chain attacks, ransomware threats, and a growing attack surface from vehicle connectivity.
#7about 4 minutes
The expanding role and risks of software in cars
Software now controls every aspect of a modern vehicle, introducing risks like integer overflows that can have catastrophic consequences in autonomous systems.
#8about 2 minutes
Using smartphones as a more secure car key
Replacing traditional key fobs with smartphones offers enhanced security and enables new convenient services like seamless digital keys for rental cars.
#9about 2 minutes
Upcoming legislation and industry security standards
New regulations like ISO 21434 and UNECE mandates will require manufacturers to implement and audit verifiable security processes throughout the vehicle lifecycle.
#10about 2 minutes
Resources for staying current on automotive security
Developers can stay informed about the latest threats and research by following industry groups like the Automotive Security Research Group (ASRG).
#11about 9 minutes
Q&A on liability, standards, and future threats
A discussion covering complex topics like liability in autonomous accidents, security standardization, preventing hardware hacking, and the potential for centralized failures.
Related jobs
Jobs that call for the skills explored in this talk.
Technoly GmbH
Berlin, Germany
€50-60K
Intermediate
Network Security
Security Architecture
+2
aedifion GmbH
Köln, Germany
€30-45K
Intermediate
Network Security
Security Architecture
+1
MARKT-PILOT GmbH
Stuttgart, Germany
Remote
€75-90K
Senior
Java
TypeScript
+1
Matching moments
01:32 MIN
Organizing a developer conference for 15,000 attendees
Cat Herding with Lions and Tigers - Christian Heilmann
04:57 MIN
Increasing the value of talk recordings post-event
Cat Herding with Lions and Tigers - Christian Heilmann
03:17 MIN
Selecting strategic partners and essential event tools
Cat Herding with Lions and Tigers - Christian Heilmann
02:54 MIN
Automating video post-production with local scripts
Cat Herding with Lions and Tigers - Christian Heilmann
03:38 MIN
Balancing the trade-off between efficiency and resilience
What 2025 Taught Us: A Year-End Special with Hung Lee
03:48 MIN
Automating formal processes risks losing informal human value
What 2025 Taught Us: A Year-End Special with Hung Lee
04:22 MIN
Why HR struggles with technology implementation and adoption
What 2025 Taught Us: A Year-End Special with Hung Lee
02:44 MIN
Rapid-fire thoughts on the future of work
What 2025 Taught Us: A Year-End Special with Hung Lee
Featured Partners
Related Videos
Cybersecurity for Software Defined Vehicles
Henning Harbs
Automotive Security Challenges: A Supplier's View
Davor Frkat
On developing smartphones on wheels
Hans-Jürgen Eidler
A Hitchhikers Guide to Container Security - Automotive Edition 2024
Reinhard Kugler
What The Hack is Web App Sec?
Jackie
What makes Cybersecurity different for critical infrastructure?
Kurt Eder
The best of two worlds - Bringing enterprise-grade Linux to the vehicle
Joachim Werner
Unleashing the Power of Developers: Why Cybersecurity is the Missing Piece?!?
Tino Sokic
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.


Technica Engineering Spain Slu
Municipality of Vigo, Spain
Remote
C++
JIRA
DevOps
Python
+6


Prognum Automotive GmbH
Ulm, Germany
Remote
C++

Bertrandt AG
Mannheim, Germany

Prognum Automotive GmbH
Ulm, Germany
Remote
Burp Suite

Prognum Automotive GmbH
Ulm, Germany
Remote
Burp Suite

