What makes a modern car so vulnerable to hackers? It's a network of computers on wheels, and physical access means game over for security.
#1about 3 minutes
The role of security in specialized vehicle projects
An introduction to Bosch Engineering's work on small-series projects like autonomous excavators and high-performance cars, where security is critical.
#2about 3 minutes
A brief history of early automotive hacking vectors
Early academic research demonstrated how to compromise cars through vectors like manipulated MP3 files and spoofed tire pressure sensors.
#3about 1 minute
The landmark 2015 remote Jeep hack
The infamous remote hack of a Jeep Cherokee over its cellular connection forced the industry to take remote threats seriously.
#4about 5 minutes
Vulnerabilities in keyless entry and vehicle data
Modern attacks target convenience features, from signal relaying for keyless entry to sophisticated hacks for stealing Teslas and manipulating digital odometers.
#5about 2 minutes
Understanding attacker motivations and barriers
Attackers are driven by curiosity and the need for self-repair, while the high cost of vehicles has historically been a major barrier to research.
#6about 4 minutes
Modern cybersecurity challenges for developers
Developers now face increasing system complexity, supply chain attacks, ransomware threats, and a growing attack surface from vehicle connectivity.
#7about 4 minutes
The expanding role and risks of software in cars
Software now controls every aspect of a modern vehicle, introducing risks like integer overflows that can have catastrophic consequences in autonomous systems.
#8about 2 minutes
Using smartphones as a more secure car key
Replacing traditional key fobs with smartphones offers enhanced security and enables new convenient services like seamless digital keys for rental cars.
#9about 2 minutes
Upcoming legislation and industry security standards
New regulations like ISO 21434 and UNECE mandates will require manufacturers to implement and audit verifiable security processes throughout the vehicle lifecycle.
#10about 2 minutes
Resources for staying current on automotive security
Developers can stay informed about the latest threats and research by following industry groups like the Automotive Security Research Group (ASRG).
#11about 9 minutes
Q&A on liability, standards, and future threats
A discussion covering complex topics like liability in autonomous accidents, security standardization, preventing hardware hacking, and the potential for centralized failures.
Related jobs
Jobs that call for the skills explored in this talk.
Dev Digest 138 - Are you secure about this?Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Daniel Cranney
How software is steering vehicle technologyThe automotive industry is entering a transformative era, and developers have a unique opportunity to be part of it. Cars are no longer just mechanical machines; they’re sophisticated tech platforms with software at their core. This shift, defined by...
Daniel Cranney
Dev Digest 191: Malware interviews, EU ❤️ Open Source and Skilled AgentsInside last week’s Dev Digest 191 .
💻 Want to write for the WeAreDevelopers Magazine?
⚒️ Claude skills - a less token hungry MCP?
🫰 How much does Cursor spend on AWS?
🧠 LLMs and Brain Rot
🟥 Change your NPM tokens now!
🧑 Fake AI recruiters delivering...
Daniel Cranney
Dev Digest 214: Claude Is Leaking, GitHub Is Listening & Axios Hacked!Inside last week’s Dev Digest 214 .
🕵️ Claude source code leaked, analysed and re-written in 2 days
🐙 GitHub auto-opts users into feeding their code to train their AI
🌐 Pretext shows how to show complex text rendering in the browser
🤖 How to securin...
From learning to earning
Jobs that call for the skills explored in this talk.