\"The Secret of Smart Car Security Attack and Defense\" first introduces some basic security knowledge to car developers, such as encryption and decryption, security authentication, digital signatures, common attack types and methods, etc., and then introduces some working principles of smart cars to security researchers, such as the car\'s intranet protocol, network architecture, X-By-Wire control system principles, common potential attack surfaces, etc. Finally, some actual car attack or security test cases are analyzed in detail, and the vulnerabilities involved in the case are analyzed during the analysis. The characteristic of this book is to go from the basics to the complex, providing readers with detailed actual case analysis and defense suggestions. The target readers of \"The Secret of Smart Car Security Attack and Defense\" are smart car or connected car developers, security researchers who want to conduct smart car security research or penetration testing, etc. Automotive Safety Fundamentals Chapter 1 Introduction to Basic Concepts of Smart Cars 2 1.1 Connected Cars 2 1.2 V2X 2 1.3 Advanced Driver Assistance Systems 3 1.4 Autonomous Driving Cars 3 Chapter 2 Introduction to Automotive Network Security 6 2.1 The Development of Automotive Electronics and Network Systems 6 2.2 The Causes of Automotive Safety 8 2.3 Automotive Attack Surfaces 10 2.4 The Development of Automotive Safety 18 2.5 Automotive Safety Guidance Standards 20 Chapter 3 Basic Concepts of Information Security 23 3.1 Security Concepts 23 3.2 Introduction to Encryption Algorithms 24 3.3 Introduction to Common Attack Methods 26 3.4 Introduction to Important Defense Concepts Based on Cryptography 27 Chapter 4 Automotive Electronics in the Internet of Things Era 38 4.1 Automotive in the Internet of Things Era 39 4.2 Automotive Networks 42 Chapter 5 Online Diagnostic System 55 5.1 Introduction to Online Diagnostic System 55 5.2 Introduction to OBD-II 55 5.3 OBD-II Interface 56 5.4 OBD Communication Protocol 57 5.5 Data that can be obtained by OBD 57 Chapter 6 Introduction to Automotive Bus Protocol 58 6.1 Introduction to CAN Bus 58 6.2 LIN Bus 85 6.3 MOST Bus 88 6.4 FlexRay 91 Case Study Chapter 7 Jeep Uconnect Vulnerability Analysis 96 7.1 Background 96 7.2 Network Architecture 97 7.3 Network Physical Functions 99 7.4 Remote Attack Entry 101 7.5 Radio Data System 104 7.6 Uconnect System 106 7.7 Exploiting D-Bus Service 119 7.8 Uconnect Attack Payloads 120 7.9 Remote Exploitation via Cellular Network 123 7.10 Exploiting Vulnerabilities via Cellular Network 126 7.11 Scanning for Vulnerable Vehicles 126 7.12 V850 and IOC 128 7.13 SPI 7.1 The Entire Exploitation Chain 149 7.15 Principles of Cyber-Physical Control 150 7.16 CAN Messages for Controlling Physical Systems 159 7.17 Vulnerability Fixes and Mitigations 163 7.18 References for This Chapter 164 Chapter 8 BMW ConnectedDrive Vulnerability Analysis 165 8.1 Vulnerability Background 165 8.2 Hardware Configuration 166 8.3 Hardware Disassembly Analysis 167 8.4 Activating the Remote Control Function 172 8.5 Actual Vulnerability Exploitation Scenarios 173 8.6 Improvement Measures 174 8.7 Vulnerability Summary 175 8.8 Possible Defense Measures 175 8.9 References for This Chapter 176 Chapter 9 Tesla Security Analysis 177 9.1 Background 177 9.2 System Architecture 177 9.3 Information Collection 180 9.4 Frustrations in Testing 185 9.5 Breakthroughs in Testing 186 9.6 Controlling the Car 187 9.7 Chapter Summary 189 9.8 References to This Chapter 190 Chapter 10 Remote Wireless Upgrade and Security 191 10.1 General Process of OTA Upgrade 191 10.2 Security Issues in OTA Upgrade 192 10.3 Secure OTA Upgrade System 193 10.4 References to This Chapter 194 Chapter 11 Automotive Sensor Security 195 11.1 Background 195 11.2 GPS Security 197 11.3 Ultrasonic Sensor Security 199 11.4 Camera Security 200 11.5 Lidar Security 201 11.6 References to This Chapter 203
You Might Like
Recommended ContentMore
Open source project More
Popular Components
Searched by Users
Just Take a LookMore
Trending Downloads
Trending ArticlesMore