VEHICLE FORENSICS. Infotainment & Telematics Systems. Berla Corporation Copyright 2015 by Berla. All Rights Reserved.
|
|
- Jonathan Logan
- 6 years ago
- Views:
Transcription
1 VEHICLE FORENSICS Infotainment & Telematics Systems Berla Corporation 2015
2 WELCOME Company Overview Infotainment & Telematics Systems Overview of Potentially Acquirable Data ive Software/Hardware
3 ABOUT ME Lifelong car enthusiast Degree in Journalism Degree in Digital Forensics In field for about 4 years
4 ABOUT BERLA Located in the Washington DC area Serving the global digital forensics/accident recon/insurance fraud communities Develop commercial products and provide training Conduct automotive cyber security research Provide research and development services for US Government
5 BERLA S HISTORY
6 FACILITY 14,000 sq ft building General/Admin offices Training room Development space Manufacturing area Hardware research lab
7 WHY? Almost every crime involves a vehicle Department of Justice statistics from 2013 reveal:
8 WHY? Almost every crime involves a digital element Integration of user s devices into connected vehicle systems Analyzing user data is essential
9 REACTIVE & PROACTIVE APPROACHES Forensics Reactive Forensically extract and examine relevant data stored within vehicle infotainment and telematics systems Focus on user data and vehicle events User data from connected devices User data from navigation input Vehicle events logged from telematics system Auto Cyber Security Proactive Conduct vulnerability assessments on vehicles from a wired and wireless perspective Focus on Attack Vectors related to the infotainment and telematics systems Firmware Updates WiFi GSM Bluetooth
10 WHY AUTO CYBER SECURITY? OEM s (Original Equipment manufacturers) didn t focus on creating a secure product because they didn t see the need Infotainment systems are the #1 complaint of consumers a working product took priority over a secure one Charlie Miller & Chris Valasek slapped the world with a wake-up call Both OEM s and consumers need to be aware of possible threats and react accordingly
11 TRAINING Vehicle Forensics & ive Certification (4 days) Automotive Cyber Security (5 days)
12 PRODUCTS - BLACKTHORN GPS Forensics Acquisition Analysis Reporting Supports GPS Devices Aviation Automotive Maritime Handheld Devices
13 PRODUCTS - IVE Vehicle Forensics Infotainment & Telematics Systems Logical and Physical Acquisitions Non-Destructive Methods 4,300+ Vehicle Models BMW, Buick, Cadillac, Chevrolet, Chrysler, Dodge, Fiat, Ford, GMC Hummer, Jeep, Lincoln, Maserati, Mercury, Pontiac, Ram, SRT, Saturn, Seat, Skoda, Toyota and VW.
14 INFOTAINMENT & TELEMATICS
15 INFOTAINMENT Information + entertainment Connects the occupants to their digital world. Provides information on vehicle performance, scheduled maintenance, and current status. Generally interacts directly with occupants and is main focal point.
16 TELEMATICS Connected Cars are Wireless Network Enabled Vehicles The integration of telecommunications and information Usually Vehicle to Infrastructure (V2I) or Vehicle to Vehicle (V2V) Facilitates requests to/from infotainment system
17 VIDEO INFOTAINMENT & TELEMATICS Video by CNET Does a good job of illustrating what concepts we just discussed Note this video is a bit older. Notice what features were planned at the time of this video and which of those features have been successfully implemented
18 INFOTAINMENT & TELEMATICS TODAY
19 OFFENSIVE PERSPECTIVE
20 CONNECTED CAR MARKET
21 1600 MARKET BY MANUFACTURER: Infotainment Navigation Telematics
22 CONNECTED CAR MARKET
23 MANUFACTURER ROLL UP The major manufacturers or OEMs make technology decisions for their subsidiaries. e.g. GM dictates what infotainment and telematics systems are used in Chevrolet, Cadillac, Buick, GMC, Hummer, and Holden. These systems will have similar underlying technology but are have slight enough differences to make them unique. have slightly varying names. For example, Chevrolet, GMC, and Holden use MyLink while Buick uses IntelliLink and Cadillac uses CUE.
24 BEYOND 2015 Connected Cars bring together technology from smart phones, social media, web browsers, Cloud storage, , chat, and p2p sharing (just to name a few). Essentially a computer on wheels All into a single integrated-connected-highly-mobile environment
25 USER DATA
26 COMMUNICATIONS Average vehicle has close to 70 Electronic Control Units (ECUs). They communication over several closed networks mainly called the CANBus. Three primary CANBus networks High Speed Mid Speed Infotainment
27 GENERAL INFO & APP DATA Vehicle Serial Number Part Number Original VIN Number Build Number Installed Applications Weather Traffic Facebook Twitter Media Files Audio Video Images
28 DEVICE DATA Connections Bluetooth Wireless Devices Phones Calls Contacts SMS Audio Video Images Media Players USB Drives SD Cards
29 BLUETOOTH CONNECTIONS Connections Bluetooth Wireless Devices Phones Calls Contacts SMS Audio Video Images Media Players USB Drives SD Cards
30 WIRELESS CONNECTIONS Connections Bluetooth Wireless Devices Phones Calls Contacts SMS Audio Video Images Media Players USB Drives SD Cards
31 DEVICE CALL LOGS Connections Bluetooth Wireless Devices Phones Calls Contacts SMS Audio Video Images Media Players USB Drives SD Cards
32 DEVICE CONTACTS Connections Bluetooth Wireless Devices Phones Calls Contacts SMS Audio Video Images Media Players USB Drives SD Cards
33 DEVICE SMS Connections Bluetooth Wireless Devices Phones Calls Contacts SMS Audio Video Images Media Players USB Drives SD Cards
34 EVENTS Navigation Data Trackpoints Locations Saved Previous Routes Active Inactive Events Doors Opening/Closing Lights On/Off Bluetooth Devices USB devices attached GPS Time updated
35 EVENTS - DOORS Navigation Data Trackpoints Locations Saved Previous Routes Active Inactive Events Doors Opening/Closing Lights On/Off Bluetooth Devices USB devices attached GPS Time updated
36 EVENTS GEAR SHIFTS Navigation Data Trackpoints Locations Saved Previous Routes Active Inactive Events Doors Opening/Closing Lights On/Off Bluetooth Devices USB devices attached GPS Time updated
37 EVENTS - BLUETOOTH Navigation Data Trackpoints Locations Saved Previous Routes Active Inactive Events Doors Opening/Closing Lights On/Off Bluetooth Devices USB devices attached GPS Time updated
38 EVENTS - USB DEVICES Navigation Data Trackpoints Locations Saved Previous Routes Active Inactive Events Doors Opening/Closing Lights On/Off Bluetooth Devices USB devices attached GPS Time updated
39 EVENTS - WIFI CONNECTIONS Navigation Data Trackpoints Locations Saved Previous Routes Active Inactive Events Doors Opening/Closing Lights On/Off Bluetooth Devices USB devices attached GPS Time updated
40 ACCIDENT RECONSTRUCTION ive compliments CDR tool Before, during, after Did the driver send a text just before the crash? Seconds vs. days/months Different set of data Provides a more complete picture of the incident
41 ive OVERVIEW
42 IVE Toolkit for digital forensics/media exploitation consisting of hardware and software Extracts data from vehicle Infotainment & Telematics systems Logical and Physical Acquisitions Non-Destructive Methods
43 WELCOME SCREEN
44 VEHICLE LOOKUP
45 ACQUISITION SELECT VEHICLE
46 ACQUISITION SELECT TYPE
47 ACQUISITION TEST CONNECTIONS
48 ACQUISITION CASE INFO
49 ACQUISITION PROGRESS MONITOR
50 ACQUISITION - RESULTS
51 MAIN WINDOW
52 MAIN WINDOW - WORKFLOW Tree Grid Viewer
53 VIEWING DATA - SYSTEMS
54 VIEWING DATA - CONTENT
55 Introduction VEHICLE LOOKUP - WEBSITE
56 SEARCH BY SPECS Year Make Model Trim North American Vehicles
57 SEARCH BY SPECS Will display specifications of the vehicle Green check = Supported Other details of vehicle can be useful during investigation
58 SEARCH BY VIN VIN will bring up features of that exact vehicle
59 SEARCH BY VIN Notice no green check in the upper right corner Information is in database even though Audi is not yet supported Created as general reference
60 SO WHAT?
61 BENEFITS TO YOU How would having vehicle forensics capabilities benefit your organization now and in the future? Get ahead of the curve and establish your examiners as experts Discover digital evidence not available anywhere else that could make or break your cases (vehicle events, for example) Have an alternative method to get phone information should a suspect phone be locked or destroyed Be able to add user data to crash data in order to create a more accurate, robust timeline
62 BENEFITS ACROSS FIELDS Digital Forensics Accident Reconstruction Insurance Fraud Investigation
63 UPCOMING EVENTS F3 Conference, UK: Nov 3-5 ive Essentials, Austin: Nov CNOA Conference, San Fran: Nov 21-24
64 QUESTIONS Carly McGee (443)
Examining future priorities for cyber security management
Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with
More informationMobile Device Integration Opportunities and Risks
International Telecommunication Union Mobile Device Integration Opportunities and Risks Thomas Moder Harman/Becker Automotive Systems Contents ITU-T o o o o Levels of mobile device integration Challenges
More informationFuture Implications for the Vehicle When Considering the Internet of Things (IoT)
Future Implications for the Vehicle When Considering the Internet of Things (IoT) FTF-AUT-F0082 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Agenda Overview of Existing Automotive
More informationChevrolet/GMC 8 MyLink Navigation Interface i05
2013-2015 Chevrolet/GMC 8 MyLink Navigation Interface i05 S1C016A-Y03E And 2016-2018 Chevrolet/GMC 8 MyLink Navigation Interface i06 S1C016A-Y10E / S1C016A-Y13E Installation and User Manual Disclaimer
More informationConnect Vehicles: A Security Throwback
Connect Vehicles: A Security Throwback Chris Valasek (@nudehaberdasher) Director of Vehicle Security Research Introduction Hello Chris Valasek Director of Vehicle Security Research IPS Dev -> Windows RE
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationAutomotive Cyber Security
Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18
More informationCompatible with Cadillac CUE, GM MyLink (io3, io5 & io6) Infotainment Systems with 4.3 and 8 screens. ACPGM-80V MODULE CAN BOX CUE Harness
The ACPGM-80V has a built in Dual-Link module that allows connection of Android and other devices with two-way mirroring control. Adds a reverse camera input with active parking guidelines. Adds 2 Audio/Video
More informationThe case for a Vehicle Gateway.
The case for a Vehicle Gateway. Equipment and Tool Institute ETI-ToolTech_2015_Gateway.pptx 1 Vehicle Data Access Last year we proposed a Vehicle Station Gateway and its associated Unified Gateway Protocol
More informationSecure Car. The Technology and Trends Influencing Future Vehicle Access Systems REPORT SAMPLE SEC
Secure Car The Technology and Trends Influencing Future Vehicle Access Systems REPORT SAMPLE SEC703-154 About SBD SBD is a world-leading knowledge partner to the global automotive industry, providing actionable
More informationReprogram Vehicles Using The EASE Universal Reprogrammer II+ & Your PC
Reprogram Vehicles Using The EASE Universal Reprogrammer II+ & Your PC Do you know that many times reprogramming is the only way to repair a vehicle and eliminate false DTCs? Have you ever stopped working
More informationAgenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2
Security Insert the Vulnerabilities title of your of the presentation Connected here Car Presented Presented by by Peter Name Vermaat Here Principal Job Title ITS - Date Consultant 24/06/2015 Agenda 1
More information1. INTRODUCTION DTD-CODE USER GUIDE
1. INTRODUCTION - DTD-Code software is a product of DTDAUTO Technology Team, Vietnam. It is the professional software lookups fault codes of vehicle. - Product supported large expand database for all of
More informationFuture Networked Car Geneva Auto Show 2018
March 8, 2018 Geneva, Switzerland Future Networked Car Symposium @ Geneva Auto Show 2018 Accelerating 5G for autonomous driving Jason Ellis Qualcomm - Automotive Director, Business Development for Connected
More informationSecurity Challenges with ITS : A law enforcement view
Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr
More informationAutomotive Anomaly Monitors and Threat Analysis in the Cloud
Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications
More informationOffense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent
Offense & Defense in IoT World Samuel Lv Keen Security Lab, Tencent Keen Security Lab of Tencent Wide coverage of software and hardware security research Mainstream PC & Mobile Operating Systems Mainstream
More informationAutomotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division
Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How
More informationEvidence Solutions, Inc. And the. Arizona Public Defenders Association. Present: Cell Phone Evidence: Tweets, Snapchats, and Messaging.
Evidence Solutions, Inc. And the Arizona Public Defenders Association Present: Cell Phone Evidence: Tweets, Snapchats, and Messaging June 22, 2017 Tempe Mission Palms Hotel and Conference Center 60 E 5th
More informationFord Vehicles equipped with MyFord Touch SYNC3 System Navigation Upgrade.
2016-2018 Ford Vehicles equipped with MyFord Touch SYNC3 System Navigation Upgrade. S1C067A-Y01E Installation and User Manual Disclaimer Please read this manual thoroughly prior to installation. This manual
More informationSecuring the Connected Car. Eystein Stenberg Product Manager Mender.io
Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled
More informationSKP-900 User s Manual
SKP-900 User s Manual 1. Introduction SuperOBD SKP-900 Key Programmer is a hand-held device for reading and programming auto transponder keys, auto remote keys, and auto smart keys. It is strong in functions,
More informationSecuring the Connected Car. Eystein Stenberg CTO Mender.io
Securing the Connected Car Eystein Stenberg CTO Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled Software defined
More informationPrecision Tec Diagnostics PO Box 2431 Cartersville, GA
Precision Tec Diagnostics PO Box 2431 Cartersville, GA 30120 e-mail: toolsupport@precisiontec.us info@precisiontec.us iscan3 PLATINUM provides a powerful tool for vehicle diagnostics. The intuitive user
More informationCompatible with GM CUE, MyLink and IntelliLink Infotainment Systems with 8 and 10.2 screens. NAVGM-80R MODULE CAN BOX AND HARNESS GPS ANTENNA
Plug and Play connectors make installation simple and easy. Utilizes the latest Navigation mapping version of igo Primo. Adds 2 AV inputs. Utilizes Cortex A6 high speed processor. Maintains the OEM touch
More informationRetrieval of Infotainment System Artifacts from Vehicles Using ive
Volume 1 Issue 1 Article 2 2018 Retrieval of Infotainment System Artifacts from Vehicles Using ive Celia J. Whelan Marshall University, whelan4@live.marshall.edu John Sammons Marshall University, sammons17@marshall.edu
More informationPENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017
PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT
More informationFord Vehicles equipped with MyFord Touch SYNC3 System Multi-Camera Interface
2016-2018 Ford Vehicles equipped with MyFord Touch SYNC3 System Multi-Camera Interface S1C067A-Y03E Installation and User Manual Disclaimer Please read this manual thoroughly prior to installation. This
More informationSecure Software Update for ITS Communication Devices in ITU-T Standardization
Secure Software Update for ITS Communication Devices in ITU-T Standardization Masashi, Eto Senior Researcher, Cybersecurity Laboratory, Network Security Research Institute, NICT, Japan 1 Background Outline
More informationNT510 Schwaben Update Guide
NT510 Schwaben Update Guide Delicately developed by the most distinguished experts in this industry, Foxwell NT510 is a low-cost handheld scan tool that delivers OE-level diagnosis on all the electronic
More informationNEXT GENERATION SECURITY OPERATIONS CENTER
DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting
More informationAutorama, Connecting Your Car to
Autorama, Connecting Your Car to the Internet of Tomorrow Nicholas Sargologos, Senior Marketing Manager, Digital Networking Freescale Semiconductor Overview Automotive OEMs need a secure, managed process
More informationCHEVROLET ACCESSORIES ALL-NEW REAR SEAT INFOTAINMENT SYSTEM DEALER FEATURE GUIDE
CHEVROLET ACCESSORIES ALL-NEW REAR SEAT INFOTAINMENT SYSTEM DEALER FEATURE GUIDE For GM Dealer use only. Not intended for advertising purposes. GM reserves the right to make changes at any time, without
More informationNext Generation Infotainment Systems
Next Generation Infotainment Systems John Absmeier Director, Silicon Valley Innovation Center Digital gadgets more important for car buyers January 11, 2013 Smartphones in the Driver s Seat Never before
More informationBe Secure! Computer Security Incident Response Team (CSIRT) Guide. Plan Establish Connect. Maliha Alam Mehreen Shahid
Computer Security Incident Response Team (CSIRT) Guide Maliha Alam Mehreen Shahid Plan Establish Connect Be Secure! CSIRT Coordination Center Pakistan 2014 i Contents 1. What is CSIRT?... 1 2. Policy,
More informationCybersecurity Auditing in an Unsecure World
About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity
More informationSOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT
RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion
More information716 West Ave Austin, TX USA
Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud
More informationAutomotive Attack Surfaces. UCSD and University of Washington
Automotive Attack Surfaces UCSD and University of Washington Current Automotive Environment Modern cars are run by tens of ECUs comprising millions of lines of code ECUs are well connected over internal
More informationHow to Introduce Virtualization in AGL? Objectives, Plans and Targets for AGL EG-VIRT
How to Introduce Virtualization in AGL? Objectives, Plans and Targets for AGL EG-VIRT Michele Paolino m.paolino@virtualopensystems.com Automotive Grade Linux Summit 2017 2017-06-01, Tokyo, Japan http://www.tapps-project.eu/
More informationSecurity Analysis of modern Automobile
Security Analysis of modern Automobile Dixit Verma Department of Electrical & Computer Engineering Missouri University of Science and Technology dv6cb@mst.edu 20 Apr 2017 Outline Introduction Attack Surfaces
More informationElectrification of Mobility
Electrification of Mobility Moderator: Andreas Schafer, Cambridge University and Stanford University Panelists: Mary Nickerson, Toyota Ed Kjaer, Southern California Edition Flavio Bonomi, Cisco Systems
More informationNavi 900 IntelliLink, Touch R700 IntelliLink Frequently Asked Questions
Index 1. Audio... 1 2. Navigation (only Navi 900 IntelliLink)... 2 3. Phone... 3 4. Apple CarPlay... 4 5. Android Auto... 6 6. Speech recognition... 8 7. Color instrument panel... 9 8. Favourites... 9
More informationIntroduction to Cyber Security Issues for Transportation
Introduction to Cyber Security Issues for Transportation T3 Webinar December 7, 2011 Michael G. Dinning Cyber Security is One of the Most Serious Potential Risks in Transportation Increasing dependence
More informationAbout 3. Connection Diagram 4. Quick Start Guide 6. System 8. Sound Settings 10. Navigation 11 DAB 12 HDMI 14 TV 15. AV In 17 USB/SD 18
CONTENTS Contents About 3 Connection Diagram 4 Quick Start Guide 6 System 8 Sound Settings 10 Navigation 11 DAB 12 HDMI 14 TV 15 AV In 17 USB/SD 18 File Transfer 24 Info/Update 26 Technical Specifications
More informationVehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI
Vehicle & Transportation Infrastructure Cyber Security Discussions IQMRI Guy.Rini@iqmri.org Michael.Dudzik@iqmri.org IQM Research Institute IQMRI created in response to the structural changes in delivery
More informationPreventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI
Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI Bob Gruszczynski VWoA OBD Communication Expert Current Cybersecurity Status Challenges
More informationAutomotive Security Standardization activities and attacking trend
Automotive Standardization activities and attacking trend Ingo Dassow, Deloitte November 2017 Automotive Risk Overview Trends and risks for connected vehicles 2 Value and Components of a Car Autonomous
More informationACHIEVING FIFTH GENERATION CYBER SECURITY
ACHIEVING FIFTH GENERATION CYBER SECURITY A Survey Research Report of IT and Security Professionals MARCH 2018 INTRODUCTION The pursuit of the highest level of cyber security is a top priority for IT and
More informationFord SYNC 3. Multi Camera Interface Installation and User Manual
250-8455 Ford SYNC 3 Multi Camera Interface Installation and User Manual Table Of Contents Installation 1 Switching to the Interface 3 Interface Homepage 4 Interface Settings 5 Camera Control 7 HDMI Input
More informationCybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No
More informationFast and Vulnerable A Story of Telematic Failures
Fast and Vulnerable A Story of Telematic Failures Center for Automotive Embedded Systems Security Ian Foster, Andrew Prudhomme, Karl Koscher, and Stefan Savage Telematic Control Units Connects to car s
More informationSGS CYBER SECURITY GROWTH OPPORTUNITIES
SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER
More informationTrends in Mobile Forensics from Cellebrite
Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with
More informationWhen Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.
When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the
More informationCar hacks 2018 (BMW, Audi) for the "not so hands-on"
Car hacks 2018 (BMW, Audi) for the "not so hands-on" Computest (VW/Audi) published their research on the VW/Audi vulnerabilities and Keen Security Lab (BMW) published theirs on BMW. Even though the OEMs
More informationUser Guide. MyLincoln Touch
User Guide MyLincoln Touch Keep your eyes on the road and hands on the wheel using MyLincoln Touch driver-connect technology. It puts you in control of what you want when you want it through voice, touch
More informationConnected Car Solutions Based on IoT
FEATURED ARTICLES Autonomous Driving Technology for Connected Cars Connected Car Solutions Based on IoT With the aim of achieving a prosperous society in which people and vehicles exist in harmony, the
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationComputer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers
Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,
More informationMOBILE DEVICE FORENSICS
MOBILE DEVICE FORENSICS Smart phones and other handheld electronics have become an important part of our everyday lives and the ever changing technology is making these devices a major source of digital
More informationConnected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is
Press release High-performance IT security solutions protect V2X communication against cyberattacks ESCRYPT GmbH Am Hain 5, 44789 Bochum, Germany Phone: +49 234 43870-200 Press and Public Relations: Martin
More informationZed-FULL- Immobiliser Solutions by IEA
Zed-FULL- Immobiliser Solutions by IEA Zed Full is the most professional and the unique all in one immobiliser device in the world with these features; Fix and crypto transponder cloning, Remote cloning
More informationFord Mustang Dash Replacement
2015-2017 Ford Mustang Dash Replacement S1C056A-H05E User Manual Disclaimer Please read this manual thoroughly prior to installation. This manual shows a typical installation of a S1C056A-H05E Be sure
More informationSecuring the future of mobility
Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need
More informationEnhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationADS-SW(SI)-ALL01-AS-IG-EN
install guide ADS-SW(SI)-ALL0-AS-IG-EN firmware ADS-SW(SI)-ALL0-AS-EN hardware ADS-MSW Document number 99 Revision Date 009 NOTICE The manufacturer will accept no responsability for any electrical damage
More informationModern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego
Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Steve Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage (UCSD) Karl Koscher,
More informationSecurity Concerns in Automotive Systems. James Martin
Security Concerns in Automotive Systems James Martin Main Questions 1. What sort of security vulnerabilities do modern cars face today? 2. To what extent are external attacks possible and practical? Background
More informationBig Data for Smart Cities Connected Vehicles in the Wireless World
Big Data for Smart Cities Connected Vehicles in the Wireless World Dr Nigel Jefferies WWRF Chairman Huawei Technologies 3rd March 2016 Will IoT trigger next industrial revolution? Size of the IoT opportunity
More informationLA Auto Show Unveils Advanced Technology Showcase
FOR IMMEDIATE RELEASE Media Contact: Jessica Schmidt Rogers Finn Partners 310-552-4177 LAAutoShow@FinnPartners.com LA Auto Show Unveils Advanced Technology Showcase Latest connected car technologies highlighted
More informationFord Vehicles equipped with 8 MyFord Touch SYNC2 System Navigation Upgrade
2013-2016 Ford Vehicles equipped with 8 MyFord Touch SYNC2 System Navigation Upgrade S1C042A-Y01E Installation and User Manual Disclaimer Please read this manual thoroughly prior to installation. This
More informationKorea ICT Market Overview. Yoonmi Kim Finpro Korea
Korea ICT Market Overview Yoonmi Kim Finpro Korea 5G Advanced Network Key Players Network Service Provider Electronics Company Car and Car Component Company - 5G Antenna Technoloies for Mobile device and
More informationConnected Cars as the next great consumer electronics device
Connected Cars as the next great consumer electronics device Sanjay Khatri Head of Platform Product Marketing Cisco Jasper 1992 2016 Cisco Systems, Inc. All rights reserved. Connected Cars: The next great
More informationNC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER
NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER Nebula Systems has created the first dedicated controller for use in Telematics embedded systems, enabling companies in the Connected Car space to access
More informationMaritime cyber security: Threats & Opportunities. Andy Davis, Research Director Yevgen Dyryavyy, Security Consultant
Maritime cyber security: Threats & Opportunities Andy Davis, Research Director Yevgen Dyryavyy, Security Consultant Agenda Cyber threats to the marine industry Attack surface overview (harbour / ships
More informationEmbedded Software: Its Growing Influence on the Hardware world
Embedded Software: Its Growing Influence on the Hardware world ISA Vision Summit 2009, Bangalore 16 th FEB 09 V. R. Venkatesh Head, Product Engineering Services, Wipro Technologies. Wipro in Product Engineering
More informationCertified Digital Forensics Examiner
Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is
More informationSOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE
RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE KEY CUSTOMER BENEFITS: Gain complete visibility across enterprise networks Continuously monitor all traffic Faster analysis reduces risk exposure
More informationPersonal Cybersecurity
Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions
More informationSiriusXM Satellite Radio interface
www.vaistech.com Owner s Manual SiriusXM Satellite Radio interface (SXV300 SiriusXM Tuner required) UNIVERSAL Copyright 2003-2018 VAIS Technology Published Jan 10, 2018 VAIS Technology, 8811 American Way,
More informationD-Series Specifications.
D-Series Specifications. RECORDS: Video: MP4 H.264 Encoding Audio: AAC (Audio optional) RECORDING RESOLUTION: 1080p, 720p, 480p 30 frames per second VIDEO ENCODING: H.264 (multiple rates) MEMORY: D5: 64GB,
More informationSecuring the Autonomous Automobile
Securing the Autonomous Automobile Sridhar Iyengar Vice President, Intel Labs Intel Corporation CROSSING Conference May 15-17 2017 Legal Notices and disclaimers This presentation contains the general insights
More informationTomTom Innovation. Hans Aerts VP Software Development Business Unit Automotive November 2015
TomTom Innovation Hans Aerts VP Software Development Business Unit Automotive November 2015 Empower Movement Simplify complex technology From A to BE Innovative solutions Maps Consumer Connect people and
More informationHow to make Connected Car Reality? Dr. Walter J. Buga CEO
How to make Connected Car Reality? Dr. Walter J. Buga CEO 1 Connected Transportation Source: US DOT, January 2012 Core System Communications 1.3 Connected Vehicle Playing Field From a system perspective
More informationAccelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation
Accelerating solutions for highway safety, renewal, reliability, and capacity Regional Operations Forums Connected Vehicles and the Future of Transportation ti Session Overview What are connected and automated
More informationAccessData offers a broad array of training options.
Forensics Training AccessData offers a broad array of training options. Our trainers have more than two centuries of cumulative experience in their respective fields. Take Advantage of the All Access Pass
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More informationConnected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use
Connected Car Dr. Sania Irwin Head of Systems & Applications May 27, 2015 1 Nokia Solutions and Networks 2014 For internal use Agenda Introduction Industry Landscape Industry Architecture & Implications
More informationSecurity Pitfalls. A review of recurring failures. Dr. Dominik Herrmann. Download slides at https://dhgo.to/pitfalls
Security Pitfalls A review of recurring failures Dr. Dominik Herrmann Download slides at https://dhgo.to/pitfalls Research on security, privacy, online tracking, forensics. Postdoc researcher University
More informationEstablishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security
Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security Michael John SmartSec 2016, Amsterdam www.encs.eu European Network for Cyber Security The European
More informationCyber Security Incident Response Fighting Fire with Fire
Cyber Security Incident Response Fighting Fire with Fire Arun Perinkolam, Senior Manager Deloitte & Touche LLP Professional Techniques T21 CRISC CGEIT CISM CISA AGENDA Companies like yours What is the
More informationAuto Embedded Software: Infotainment
Auto Embedded Software: Infotainment Applied Market Intelligence Hardware: Infotainment system design is following PC model Software/OS: Standardized software/os s will dominate in the future Apps: Future
More informationFormat of Session 1. Forensic Accounting then and now 2. Overview of Data Analytics 3. Fraud Analytics Basics 4. Advanced Fraud Analytics 5. Data Visualization 6. Wrap-up Question are welcome and encouraged!
More informationcybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services
Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2
More informationPreventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security
Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security In less than a year, 100s of millions connected cars Aftermarket connectivity most prevalent
More informationGPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security
GPS Vulnerability and DHS Mitigation Efforts David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security The Office of Infrastructure Protection National Protection
More informationThis Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry
This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry At a Glance With offices across the country, this gaming company has been in operation for decades.
More informationAn Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)
An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University
More informationDiagnostic Trends 2017 An Overview
Diagnostic Trends 2017 An Overview Vector India Conference, 2017-07-18+19 V1.0 2017-07-14 Agenda 1. DoIP 2. Remote Diagnostics 3. Cyber Security 4. Summary 2/29 DoIP Why DoIP? Why another diagnostic network?
More information