A Hitchhikers Guide to Container Security - Automotive Edition 2024
Could a single container hack change your car's instrument cluster in real-time? Learn how eBPF provides kernel-level defense for the next generation of software-defined vehicles.
#1about 2 minutes
Recalling a famous remote car hack from 2015
A historical remote car hack demonstrates how attackers gained control over vehicle functions by pivoting from the infotainment system.
#2about 4 minutes
Shifting from distributed ECUs to centralized computers
The automotive industry is moving from a complex network of individual electronic control units (ECUs) to centralized high-performance computers (HPCs) to simplify updates and maintenance.
#3about 6 minutes
Running containers with access to vehicle electronics
A live demonstration shows how a containerized application can directly access and manipulate a car's internal network to control components like the instrument cluster.
#4about 5 minutes
Using eBPF to observe and secure container networking
eBPF programs can be attached to the Linux kernel to observe and filter a container's network traffic at a low level without requiring a sidecar.
#5about 2 minutes
Securing hardware update channels with eBPF policies
eBPF can trace and block unauthorized write operations to hardware interfaces like the SPI bus, preventing malicious firmware flashing from a compromised container.
#6about 2 minutes
Understanding the offensive potential of eBPF rootkits
eBPF is a dual-use technology that can also be used to create stealthy, in-memory rootkits capable of modifying network packets on the fly.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
06:39 MIN
New threats from modern vehicle E/E architectures
Automotive Security Challenges: A Supplier's View
03:18 MIN
Q&A on securing CAN bus and future architectures
Cybersecurity for Software Defined Vehicles
05:52 MIN
Applying containerization and immutable OS concepts to cars
The best of two worlds - Bringing enterprise-grade Linux to the vehicle
03:18 MIN
The role of security in specialized vehicle projects
Cyber Security: Small, and Large!
07:51 MIN
An overview of the automotive security landscape
Automotive Security Challenges: A Supplier's View
01:57 MIN
The automotive industry's shift to software-defined vehicles
Cybersecurity for Software Defined Vehicles
07:39 MIN
Integrating autonomous software into complex vehicle hardware
How to develop an autonomous car end-to-end: Robotic Drive and the mobility revolution
04:07 MIN
Navigating the challenges of automotive safety certification
The best of two worlds - Bringing enterprise-grade Linux to the vehicle
How software is steering vehicle technologyThe automotive industry is entering a transformative era, and developers have a unique opportunity to be part of it. Cars are no longer just mechanical machines; they’re sophisticated tech platforms with software at their core. This shift, defined by...
Chris Heilmann
Dev Digest 138 - Are you secure about this?Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Daniel Cranney
Panel Discussion: Responsible AI in Practice - Real-World Examples and ChallengesIntroductionIn the ever-evolving landscape of artificial intelligence, the concept of "responsible AI" has emerged as a cornerstone for ethical and practical AI implementation. During the WWC24 Panel discussion, three eminent experts—Mina, Bjorn Brin...