Martin Schmiedecker
Cyber Security: Small, and Large!
#1about 3 minutes
The role of security in specialized vehicle projects
An introduction to Bosch Engineering's work on small-series projects like autonomous excavators and high-performance cars, where security is critical.
#2about 3 minutes
A brief history of early automotive hacking vectors
Early academic research demonstrated how to compromise cars through vectors like manipulated MP3 files and spoofed tire pressure sensors.
#3about 1 minute
The landmark 2015 remote Jeep hack
The infamous remote hack of a Jeep Cherokee over its cellular connection forced the industry to take remote threats seriously.
#4about 5 minutes
Vulnerabilities in keyless entry and vehicle data
Modern attacks target convenience features, from signal relaying for keyless entry to sophisticated hacks for stealing Teslas and manipulating digital odometers.
#5about 2 minutes
Understanding attacker motivations and barriers
Attackers are driven by curiosity and the need for self-repair, while the high cost of vehicles has historically been a major barrier to research.
#6about 4 minutes
Modern cybersecurity challenges for developers
Developers now face increasing system complexity, supply chain attacks, ransomware threats, and a growing attack surface from vehicle connectivity.
#7about 4 minutes
The expanding role and risks of software in cars
Software now controls every aspect of a modern vehicle, introducing risks like integer overflows that can have catastrophic consequences in autonomous systems.
#8about 2 minutes
Using smartphones as a more secure car key
Replacing traditional key fobs with smartphones offers enhanced security and enables new convenient services like seamless digital keys for rental cars.
#9about 2 minutes
Upcoming legislation and industry security standards
New regulations like ISO 21434 and UNECE mandates will require manufacturers to implement and audit verifiable security processes throughout the vehicle lifecycle.
#10about 2 minutes
Resources for staying current on automotive security
Developers can stay informed about the latest threats and research by following industry groups like the Automotive Security Research Group (ASRG).
#11about 9 minutes
Q&A on liability, standards, and future threats
A discussion covering complex topics like liability in autonomous accidents, security standardization, preventing hardware hacking, and the potential for centralized failures.
Related jobs
Jobs that call for the skills explored in this talk.
VECTOR Informatik
Stuttgart, Germany
Senior
Java
IT Security
IGEL Technology GmbH
Bremen, Germany
Senior
Java
IT Security
ROSEN Technology and Research Center GmbH
Lingen (Ems), Germany
Intermediate
Azure
Matching moments
07:51 MIN
An overview of the automotive security landscape
Automotive Security Challenges: A Supplier's View
04:00 MIN
Exploring the security vulnerabilities of connected cars
Using all the HTML, Running State of the Browser and "Modern" is Rubbish
03:40 MIN
Real-world examples of modern car hacking techniques
Cybersecurity for Software Defined Vehicles
07:58 MIN
Q&A on security, internships, and competitive analysis
Agile work at CARIAD – Creating a customer web application for controlling the vehicle
02:26 MIN
Why developers make basic cybersecurity mistakes
Don't Be A Naive Developer: How To Avoid Basic Cybersecurity Mistakes
03:11 MIN
Managing security over the entire vehicle lifecycle
Cybersecurity for Software Defined Vehicles
05:09 MIN
Learning from historical and recent vehicle attacks
Automotive Security Challenges: A Supplier's View
06:39 MIN
New threats from modern vehicle E/E architectures
Automotive Security Challenges: A Supplier's View
Featured Partners
Related Videos
Cybersecurity for Software Defined Vehicles
Henning Harbs
Automotive Security Challenges: A Supplier's View
Davor Frkat
Getting under the skin: The Social Engineering techniques
Mauro Verderosa
Climate vs. Weather: How Do We Sustainably Make Software More Secure?
Panel Discussion
You can’t hack what you can’t see
Reto Kaeser
Securing Your Web Application Pipeline From Intruders
Milecia McGregor
What makes Cybersecurity different for critical infrastructure?
Kurt Eder
The best of two worlds - Bringing enterprise-grade Linux to the vehicle
Joachim Werner
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.

Y-Security GmbH
Azure
Burp Suite
Network Security
Microsoft Active Directory

advanced engineering GmbH
Remote
Network Security

Prognum Automotive GmbH
Stuttgart, Germany
Remote
C++

Prognum Automotive GmbH
Ulm, Germany
Remote
C++

EVA Fahrzeugtechnik GmbH
Krakow am See, Germany
C++
Azure
Python
Amazon Web Services (AWS)

Bright Consulting GmbH
Stuttgart, Germany


VISION Consulting GmbH
Raaba, Austria
€55K
Intermediate

TECCON Consulting & Engineering GmbH
Graz, Austria
€55K
Intermediate