VEHICLE FORENSICS. Infotainment & Telematics Systems. Berla Corporation Copyright 2015 by Berla. All Rights Reserved.

Size: px
Start display at page:

Download "VEHICLE FORENSICS. Infotainment & Telematics Systems. Berla Corporation Copyright 2015 by Berla. All Rights Reserved."

Transcription

1 VEHICLE FORENSICS Infotainment & Telematics Systems Berla Corporation 2015

2 WELCOME Company Overview Infotainment & Telematics Systems Overview of Potentially Acquirable Data ive Software/Hardware

3 ABOUT ME Lifelong car enthusiast Degree in Journalism Degree in Digital Forensics In field for about 4 years

4 ABOUT BERLA Located in the Washington DC area Serving the global digital forensics/accident recon/insurance fraud communities Develop commercial products and provide training Conduct automotive cyber security research Provide research and development services for US Government

5 BERLA S HISTORY

6 FACILITY 14,000 sq ft building General/Admin offices Training room Development space Manufacturing area Hardware research lab

7 WHY? Almost every crime involves a vehicle Department of Justice statistics from 2013 reveal:

8 WHY? Almost every crime involves a digital element Integration of user s devices into connected vehicle systems Analyzing user data is essential

9 REACTIVE & PROACTIVE APPROACHES Forensics Reactive Forensically extract and examine relevant data stored within vehicle infotainment and telematics systems Focus on user data and vehicle events User data from connected devices User data from navigation input Vehicle events logged from telematics system Auto Cyber Security Proactive Conduct vulnerability assessments on vehicles from a wired and wireless perspective Focus on Attack Vectors related to the infotainment and telematics systems Firmware Updates WiFi GSM Bluetooth

10 WHY AUTO CYBER SECURITY? OEM s (Original Equipment manufacturers) didn t focus on creating a secure product because they didn t see the need Infotainment systems are the #1 complaint of consumers a working product took priority over a secure one Charlie Miller & Chris Valasek slapped the world with a wake-up call Both OEM s and consumers need to be aware of possible threats and react accordingly

11 TRAINING Vehicle Forensics & ive Certification (4 days) Automotive Cyber Security (5 days)

12 PRODUCTS - BLACKTHORN GPS Forensics Acquisition Analysis Reporting Supports GPS Devices Aviation Automotive Maritime Handheld Devices

13 PRODUCTS - IVE Vehicle Forensics Infotainment & Telematics Systems Logical and Physical Acquisitions Non-Destructive Methods 4,300+ Vehicle Models BMW, Buick, Cadillac, Chevrolet, Chrysler, Dodge, Fiat, Ford, GMC Hummer, Jeep, Lincoln, Maserati, Mercury, Pontiac, Ram, SRT, Saturn, Seat, Skoda, Toyota and VW.

14 INFOTAINMENT & TELEMATICS

15 INFOTAINMENT Information + entertainment Connects the occupants to their digital world. Provides information on vehicle performance, scheduled maintenance, and current status. Generally interacts directly with occupants and is main focal point.

16 TELEMATICS Connected Cars are Wireless Network Enabled Vehicles The integration of telecommunications and information Usually Vehicle to Infrastructure (V2I) or Vehicle to Vehicle (V2V) Facilitates requests to/from infotainment system

17 VIDEO INFOTAINMENT & TELEMATICS Video by CNET Does a good job of illustrating what concepts we just discussed Note this video is a bit older. Notice what features were planned at the time of this video and which of those features have been successfully implemented

18 INFOTAINMENT & TELEMATICS TODAY

19 OFFENSIVE PERSPECTIVE

20 CONNECTED CAR MARKET

21 1600 MARKET BY MANUFACTURER: Infotainment Navigation Telematics

22 CONNECTED CAR MARKET

23 MANUFACTURER ROLL UP The major manufacturers or OEMs make technology decisions for their subsidiaries. e.g. GM dictates what infotainment and telematics systems are used in Chevrolet, Cadillac, Buick, GMC, Hummer, and Holden. These systems will have similar underlying technology but are have slight enough differences to make them unique. have slightly varying names. For example, Chevrolet, GMC, and Holden use MyLink while Buick uses IntelliLink and Cadillac uses CUE.

24 BEYOND 2015 Connected Cars bring together technology from smart phones, social media, web browsers, Cloud storage, , chat, and p2p sharing (just to name a few). Essentially a computer on wheels All into a single integrated-connected-highly-mobile environment

25 USER DATA

26 COMMUNICATIONS Average vehicle has close to 70 Electronic Control Units (ECUs). They communication over several closed networks mainly called the CANBus. Three primary CANBus networks High Speed Mid Speed Infotainment

27 GENERAL INFO & APP DATA Vehicle Serial Number Part Number Original VIN Number Build Number Installed Applications Weather Traffic Facebook Twitter Media Files Audio Video Images

28 DEVICE DATA Connections Bluetooth Wireless Devices Phones Calls Contacts SMS Audio Video Images Media Players USB Drives SD Cards

29 BLUETOOTH CONNECTIONS Connections Bluetooth Wireless Devices Phones Calls Contacts SMS Audio Video Images Media Players USB Drives SD Cards

30 WIRELESS CONNECTIONS Connections Bluetooth Wireless Devices Phones Calls Contacts SMS Audio Video Images Media Players USB Drives SD Cards

31 DEVICE CALL LOGS Connections Bluetooth Wireless Devices Phones Calls Contacts SMS Audio Video Images Media Players USB Drives SD Cards

32 DEVICE CONTACTS Connections Bluetooth Wireless Devices Phones Calls Contacts SMS Audio Video Images Media Players USB Drives SD Cards

33 DEVICE SMS Connections Bluetooth Wireless Devices Phones Calls Contacts SMS Audio Video Images Media Players USB Drives SD Cards

34 EVENTS Navigation Data Trackpoints Locations Saved Previous Routes Active Inactive Events Doors Opening/Closing Lights On/Off Bluetooth Devices USB devices attached GPS Time updated

35 EVENTS - DOORS Navigation Data Trackpoints Locations Saved Previous Routes Active Inactive Events Doors Opening/Closing Lights On/Off Bluetooth Devices USB devices attached GPS Time updated

36 EVENTS GEAR SHIFTS Navigation Data Trackpoints Locations Saved Previous Routes Active Inactive Events Doors Opening/Closing Lights On/Off Bluetooth Devices USB devices attached GPS Time updated

37 EVENTS - BLUETOOTH Navigation Data Trackpoints Locations Saved Previous Routes Active Inactive Events Doors Opening/Closing Lights On/Off Bluetooth Devices USB devices attached GPS Time updated

38 EVENTS - USB DEVICES Navigation Data Trackpoints Locations Saved Previous Routes Active Inactive Events Doors Opening/Closing Lights On/Off Bluetooth Devices USB devices attached GPS Time updated

39 EVENTS - WIFI CONNECTIONS Navigation Data Trackpoints Locations Saved Previous Routes Active Inactive Events Doors Opening/Closing Lights On/Off Bluetooth Devices USB devices attached GPS Time updated

40 ACCIDENT RECONSTRUCTION ive compliments CDR tool Before, during, after Did the driver send a text just before the crash? Seconds vs. days/months Different set of data Provides a more complete picture of the incident

41 ive OVERVIEW

42 IVE Toolkit for digital forensics/media exploitation consisting of hardware and software Extracts data from vehicle Infotainment & Telematics systems Logical and Physical Acquisitions Non-Destructive Methods

43 WELCOME SCREEN

44 VEHICLE LOOKUP

45 ACQUISITION SELECT VEHICLE

46 ACQUISITION SELECT TYPE

47 ACQUISITION TEST CONNECTIONS

48 ACQUISITION CASE INFO

49 ACQUISITION PROGRESS MONITOR

50 ACQUISITION - RESULTS

51 MAIN WINDOW

52 MAIN WINDOW - WORKFLOW Tree Grid Viewer

53 VIEWING DATA - SYSTEMS

54 VIEWING DATA - CONTENT

55 Introduction VEHICLE LOOKUP - WEBSITE

56 SEARCH BY SPECS Year Make Model Trim North American Vehicles

57 SEARCH BY SPECS Will display specifications of the vehicle Green check = Supported Other details of vehicle can be useful during investigation

58 SEARCH BY VIN VIN will bring up features of that exact vehicle

59 SEARCH BY VIN Notice no green check in the upper right corner Information is in database even though Audi is not yet supported Created as general reference

60 SO WHAT?

61 BENEFITS TO YOU How would having vehicle forensics capabilities benefit your organization now and in the future? Get ahead of the curve and establish your examiners as experts Discover digital evidence not available anywhere else that could make or break your cases (vehicle events, for example) Have an alternative method to get phone information should a suspect phone be locked or destroyed Be able to add user data to crash data in order to create a more accurate, robust timeline

62 BENEFITS ACROSS FIELDS Digital Forensics Accident Reconstruction Insurance Fraud Investigation

63 UPCOMING EVENTS F3 Conference, UK: Nov 3-5 ive Essentials, Austin: Nov CNOA Conference, San Fran: Nov 21-24

64 QUESTIONS Carly McGee (443)

Examining future priorities for cyber security management

Examining future priorities for cyber security management Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with

More information

Mobile Device Integration Opportunities and Risks

Mobile Device Integration Opportunities and Risks International Telecommunication Union Mobile Device Integration Opportunities and Risks Thomas Moder Harman/Becker Automotive Systems Contents ITU-T o o o o Levels of mobile device integration Challenges

More information

Future Implications for the Vehicle When Considering the Internet of Things (IoT)

Future Implications for the Vehicle When Considering the Internet of Things (IoT) Future Implications for the Vehicle When Considering the Internet of Things (IoT) FTF-AUT-F0082 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Agenda Overview of Existing Automotive

More information

Chevrolet/GMC 8 MyLink Navigation Interface i05

Chevrolet/GMC 8 MyLink Navigation Interface i05 2013-2015 Chevrolet/GMC 8 MyLink Navigation Interface i05 S1C016A-Y03E And 2016-2018 Chevrolet/GMC 8 MyLink Navigation Interface i06 S1C016A-Y10E / S1C016A-Y13E Installation and User Manual Disclaimer

More information

Connect Vehicles: A Security Throwback

Connect Vehicles: A Security Throwback Connect Vehicles: A Security Throwback Chris Valasek (@nudehaberdasher) Director of Vehicle Security Research Introduction Hello Chris Valasek Director of Vehicle Security Research IPS Dev -> Windows RE

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

Automotive Cyber Security

Automotive Cyber Security Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18

More information

Compatible with Cadillac CUE, GM MyLink (io3, io5 & io6) Infotainment Systems with 4.3 and 8 screens. ACPGM-80V MODULE CAN BOX CUE Harness

Compatible with Cadillac CUE, GM MyLink (io3, io5 & io6) Infotainment Systems with 4.3 and 8 screens. ACPGM-80V MODULE CAN BOX CUE Harness The ACPGM-80V has a built in Dual-Link module that allows connection of Android and other devices with two-way mirroring control. Adds a reverse camera input with active parking guidelines. Adds 2 Audio/Video

More information

The case for a Vehicle Gateway.

The case for a Vehicle Gateway. The case for a Vehicle Gateway. Equipment and Tool Institute ETI-ToolTech_2015_Gateway.pptx 1 Vehicle Data Access Last year we proposed a Vehicle Station Gateway and its associated Unified Gateway Protocol

More information

Secure Car. The Technology and Trends Influencing Future Vehicle Access Systems REPORT SAMPLE SEC

Secure Car. The Technology and Trends Influencing Future Vehicle Access Systems REPORT SAMPLE SEC Secure Car The Technology and Trends Influencing Future Vehicle Access Systems REPORT SAMPLE SEC703-154 About SBD SBD is a world-leading knowledge partner to the global automotive industry, providing actionable

More information

Reprogram Vehicles Using The EASE Universal Reprogrammer II+ & Your PC

Reprogram Vehicles Using The EASE Universal Reprogrammer II+ & Your PC Reprogram Vehicles Using The EASE Universal Reprogrammer II+ & Your PC Do you know that many times reprogramming is the only way to repair a vehicle and eliminate false DTCs? Have you ever stopped working

More information

Agenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2

Agenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2 Security Insert the Vulnerabilities title of your of the presentation Connected here Car Presented Presented by by Peter Name Vermaat Here Principal Job Title ITS - Date Consultant 24/06/2015 Agenda 1

More information

1. INTRODUCTION DTD-CODE USER GUIDE

1. INTRODUCTION DTD-CODE USER GUIDE 1. INTRODUCTION - DTD-Code software is a product of DTDAUTO Technology Team, Vietnam. It is the professional software lookups fault codes of vehicle. - Product supported large expand database for all of

More information

Future Networked Car Geneva Auto Show 2018

Future Networked Car Geneva Auto Show 2018 March 8, 2018 Geneva, Switzerland Future Networked Car Symposium @ Geneva Auto Show 2018 Accelerating 5G for autonomous driving Jason Ellis Qualcomm - Automotive Director, Business Development for Connected

More information

Security Challenges with ITS : A law enforcement view

Security Challenges with ITS : A law enforcement view Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr

More information

Automotive Anomaly Monitors and Threat Analysis in the Cloud

Automotive Anomaly Monitors and Threat Analysis in the Cloud Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications

More information

Offense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent

Offense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent Offense & Defense in IoT World Samuel Lv Keen Security Lab, Tencent Keen Security Lab of Tencent Wide coverage of software and hardware security research Mainstream PC & Mobile Operating Systems Mainstream

More information

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How

More information

Evidence Solutions, Inc. And the. Arizona Public Defenders Association. Present: Cell Phone Evidence: Tweets, Snapchats, and Messaging.

Evidence Solutions, Inc. And the. Arizona Public Defenders Association. Present: Cell Phone Evidence: Tweets, Snapchats, and Messaging. Evidence Solutions, Inc. And the Arizona Public Defenders Association Present: Cell Phone Evidence: Tweets, Snapchats, and Messaging June 22, 2017 Tempe Mission Palms Hotel and Conference Center 60 E 5th

More information

Ford Vehicles equipped with MyFord Touch SYNC3 System Navigation Upgrade.

Ford Vehicles equipped with MyFord Touch SYNC3 System Navigation Upgrade. 2016-2018 Ford Vehicles equipped with MyFord Touch SYNC3 System Navigation Upgrade. S1C067A-Y01E Installation and User Manual Disclaimer Please read this manual thoroughly prior to installation. This manual

More information

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled

More information

SKP-900 User s Manual

SKP-900 User s Manual SKP-900 User s Manual 1. Introduction SuperOBD SKP-900 Key Programmer is a hand-held device for reading and programming auto transponder keys, auto remote keys, and auto smart keys. It is strong in functions,

More information

Securing the Connected Car. Eystein Stenberg CTO Mender.io

Securing the Connected Car. Eystein Stenberg CTO Mender.io Securing the Connected Car Eystein Stenberg CTO Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled Software defined

More information

Precision Tec Diagnostics PO Box 2431 Cartersville, GA

Precision Tec Diagnostics PO Box 2431 Cartersville, GA Precision Tec Diagnostics PO Box 2431 Cartersville, GA 30120 e-mail: toolsupport@precisiontec.us info@precisiontec.us iscan3 PLATINUM provides a powerful tool for vehicle diagnostics. The intuitive user

More information

Compatible with GM CUE, MyLink and IntelliLink Infotainment Systems with 8 and 10.2 screens. NAVGM-80R MODULE CAN BOX AND HARNESS GPS ANTENNA

Compatible with GM CUE, MyLink and IntelliLink Infotainment Systems with 8 and 10.2 screens. NAVGM-80R MODULE CAN BOX AND HARNESS GPS ANTENNA Plug and Play connectors make installation simple and easy. Utilizes the latest Navigation mapping version of igo Primo. Adds 2 AV inputs. Utilizes Cortex A6 high speed processor. Maintains the OEM touch

More information

Retrieval of Infotainment System Artifacts from Vehicles Using ive

Retrieval of Infotainment System Artifacts from Vehicles Using ive Volume 1 Issue 1 Article 2 2018 Retrieval of Infotainment System Artifacts from Vehicles Using ive Celia J. Whelan Marshall University, whelan4@live.marshall.edu John Sammons Marshall University, sammons17@marshall.edu

More information

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT

More information

Ford Vehicles equipped with MyFord Touch SYNC3 System Multi-Camera Interface

Ford Vehicles equipped with MyFord Touch SYNC3 System Multi-Camera Interface 2016-2018 Ford Vehicles equipped with MyFord Touch SYNC3 System Multi-Camera Interface S1C067A-Y03E Installation and User Manual Disclaimer Please read this manual thoroughly prior to installation. This

More information

Secure Software Update for ITS Communication Devices in ITU-T Standardization

Secure Software Update for ITS Communication Devices in ITU-T Standardization Secure Software Update for ITS Communication Devices in ITU-T Standardization Masashi, Eto Senior Researcher, Cybersecurity Laboratory, Network Security Research Institute, NICT, Japan 1 Background Outline

More information

NT510 Schwaben Update Guide

NT510 Schwaben Update Guide NT510 Schwaben Update Guide Delicately developed by the most distinguished experts in this industry, Foxwell NT510 is a low-cost handheld scan tool that delivers OE-level diagnosis on all the electronic

More information

NEXT GENERATION SECURITY OPERATIONS CENTER

NEXT GENERATION SECURITY OPERATIONS CENTER DTS SOLUTION NEXT GENERATION SECURITY OPERATIONS CENTER SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 - SUCCESS FACTORS SOC 2.0 - FUNCTIONAL COMPONENTS DTS SOLUTION SOC 2.0 - ENHANCED SECURITY O&M SOC 2.0 Protecting

More information

Autorama, Connecting Your Car to

Autorama, Connecting Your Car to Autorama, Connecting Your Car to the Internet of Tomorrow Nicholas Sargologos, Senior Marketing Manager, Digital Networking Freescale Semiconductor Overview Automotive OEMs need a secure, managed process

More information

CHEVROLET ACCESSORIES ALL-NEW REAR SEAT INFOTAINMENT SYSTEM DEALER FEATURE GUIDE

CHEVROLET ACCESSORIES ALL-NEW REAR SEAT INFOTAINMENT SYSTEM DEALER FEATURE GUIDE CHEVROLET ACCESSORIES ALL-NEW REAR SEAT INFOTAINMENT SYSTEM DEALER FEATURE GUIDE For GM Dealer use only. Not intended for advertising purposes. GM reserves the right to make changes at any time, without

More information

Next Generation Infotainment Systems

Next Generation Infotainment Systems Next Generation Infotainment Systems John Absmeier Director, Silicon Valley Innovation Center Digital gadgets more important for car buyers January 11, 2013 Smartphones in the Driver s Seat Never before

More information

Be Secure! Computer Security Incident Response Team (CSIRT) Guide. Plan Establish Connect. Maliha Alam Mehreen Shahid

Be Secure! Computer Security Incident Response Team (CSIRT) Guide. Plan Establish Connect. Maliha Alam Mehreen Shahid Computer Security Incident Response Team (CSIRT) Guide Maliha Alam Mehreen Shahid Plan Establish Connect Be Secure! CSIRT Coordination Center Pakistan 2014 i Contents 1. What is CSIRT?... 1 2. Policy,

More information

Cybersecurity Auditing in an Unsecure World

Cybersecurity Auditing in an Unsecure World About This Course Cybersecurity Auditing in an Unsecure World Course Description $5.4 million that s the average cost of a data breach to a U.S.-based company. It s no surprise, then, that cybersecurity

More information

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT

SOLUTION BRIEF RSA ARCHER IT & SECURITY RISK MANAGEMENT RSA ARCHER IT & SECURITY RISK MANAGEMENT INTRODUCTION Organizations battle growing security challenges by building layer upon layer of defenses: firewalls, antivirus, intrusion prevention systems, intrusion

More information

716 West Ave Austin, TX USA

716 West Ave Austin, TX USA Fundamentals of Computer and Internet Fraud GLOBAL Headquarters the gregor building 716 West Ave Austin, TX 78701-2727 USA TABLE OF CONTENTS I. INTRODUCTION What Is Computer Crime?... 2 Computer Fraud

More information

Automotive Attack Surfaces. UCSD and University of Washington

Automotive Attack Surfaces. UCSD and University of Washington Automotive Attack Surfaces UCSD and University of Washington Current Automotive Environment Modern cars are run by tens of ECUs comprising millions of lines of code ECUs are well connected over internal

More information

How to Introduce Virtualization in AGL? Objectives, Plans and Targets for AGL EG-VIRT

How to Introduce Virtualization in AGL? Objectives, Plans and Targets for AGL EG-VIRT How to Introduce Virtualization in AGL? Objectives, Plans and Targets for AGL EG-VIRT Michele Paolino m.paolino@virtualopensystems.com Automotive Grade Linux Summit 2017 2017-06-01, Tokyo, Japan http://www.tapps-project.eu/

More information

Security Analysis of modern Automobile

Security Analysis of modern Automobile Security Analysis of modern Automobile Dixit Verma Department of Electrical & Computer Engineering Missouri University of Science and Technology dv6cb@mst.edu 20 Apr 2017 Outline Introduction Attack Surfaces

More information

Electrification of Mobility

Electrification of Mobility Electrification of Mobility Moderator: Andreas Schafer, Cambridge University and Stanford University Panelists: Mary Nickerson, Toyota Ed Kjaer, Southern California Edition Flavio Bonomi, Cisco Systems

More information

Navi 900 IntelliLink, Touch R700 IntelliLink Frequently Asked Questions

Navi 900 IntelliLink, Touch R700 IntelliLink Frequently Asked Questions Index 1. Audio... 1 2. Navigation (only Navi 900 IntelliLink)... 2 3. Phone... 3 4. Apple CarPlay... 4 5. Android Auto... 6 6. Speech recognition... 8 7. Color instrument panel... 9 8. Favourites... 9

More information

Introduction to Cyber Security Issues for Transportation

Introduction to Cyber Security Issues for Transportation Introduction to Cyber Security Issues for Transportation T3 Webinar December 7, 2011 Michael G. Dinning Cyber Security is One of the Most Serious Potential Risks in Transportation Increasing dependence

More information

About 3. Connection Diagram 4. Quick Start Guide 6. System 8. Sound Settings 10. Navigation 11 DAB 12 HDMI 14 TV 15. AV In 17 USB/SD 18

About 3. Connection Diagram 4. Quick Start Guide 6. System 8. Sound Settings 10. Navigation 11 DAB 12 HDMI 14 TV 15. AV In 17 USB/SD 18 CONTENTS Contents About 3 Connection Diagram 4 Quick Start Guide 6 System 8 Sound Settings 10 Navigation 11 DAB 12 HDMI 14 TV 15 AV In 17 USB/SD 18 File Transfer 24 Info/Update 26 Technical Specifications

More information

Vehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI

Vehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI Vehicle & Transportation Infrastructure Cyber Security Discussions IQMRI Guy.Rini@iqmri.org Michael.Dudzik@iqmri.org IQM Research Institute IQMRI created in response to the structural changes in delivery

More information

Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI

Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI Bob Gruszczynski VWoA OBD Communication Expert Current Cybersecurity Status Challenges

More information

Automotive Security Standardization activities and attacking trend

Automotive Security Standardization activities and attacking trend Automotive Standardization activities and attacking trend Ingo Dassow, Deloitte November 2017 Automotive Risk Overview Trends and risks for connected vehicles 2 Value and Components of a Car Autonomous

More information

ACHIEVING FIFTH GENERATION CYBER SECURITY

ACHIEVING FIFTH GENERATION CYBER SECURITY ACHIEVING FIFTH GENERATION CYBER SECURITY A Survey Research Report of IT and Security Professionals MARCH 2018 INTRODUCTION The pursuit of the highest level of cyber security is a top priority for IT and

More information

Ford SYNC 3. Multi Camera Interface Installation and User Manual

Ford SYNC 3. Multi Camera Interface Installation and User Manual 250-8455 Ford SYNC 3 Multi Camera Interface Installation and User Manual Table Of Contents Installation 1 Switching to the Interface 3 Interface Homepage 4 Interface Settings 5 Camera Control 7 HDMI Input

More information

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No

More information

Fast and Vulnerable A Story of Telematic Failures

Fast and Vulnerable A Story of Telematic Failures Fast and Vulnerable A Story of Telematic Failures Center for Automotive Embedded Systems Security Ian Foster, Andrew Prudhomme, Karl Koscher, and Stefan Savage Telematic Control Units Connects to car s

More information

SGS CYBER SECURITY GROWTH OPPORTUNITIES

SGS CYBER SECURITY GROWTH OPPORTUNITIES SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER

More information

Trends in Mobile Forensics from Cellebrite

Trends in Mobile Forensics from Cellebrite Trends in Mobile Forensics from Cellebrite EBOOK 1 Cellebrite Survey Cellebrite is a well-known name in the field of computer forensics, and they recently conducted a survey as well as interviews with

More information

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER.

When Recognition Matters WHITEPAPER CLFE CERTIFIED LEAD FORENSIC EXAMINER. When Recognition Matters WHITEPAPER CLFE www.pecb.com CONTENT 3 4 5 6 6 7 7 8 8 Introduction So, what is Computer Forensics? Key domains of a CLFE How does a CLFE approach the investigation? What are the

More information

Car hacks 2018 (BMW, Audi) for the "not so hands-on"

Car hacks 2018 (BMW, Audi) for the not so hands-on Car hacks 2018 (BMW, Audi) for the "not so hands-on" Computest (VW/Audi) published their research on the VW/Audi vulnerabilities and Keen Security Lab (BMW) published theirs on BMW. Even though the OEMs

More information

User Guide. MyLincoln Touch

User Guide. MyLincoln Touch User Guide MyLincoln Touch Keep your eyes on the road and hands on the wheel using MyLincoln Touch driver-connect technology. It puts you in control of what you want when you want it through voice, touch

More information

Connected Car Solutions Based on IoT

Connected Car Solutions Based on IoT FEATURED ARTICLES Autonomous Driving Technology for Connected Cars Connected Car Solutions Based on IoT With the aim of achieving a prosperous society in which people and vehicles exist in harmony, the

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers

Computer Information Systems (CIS) CIS 105 Current Operating Systems/Security CIS 101 Introduction to Computers Computer Information Systems (CIS) CIS 101 Introduction to Computers This course provides an overview of the computing field and its typical applications. Key terminology and components of computer hardware,

More information

MOBILE DEVICE FORENSICS

MOBILE DEVICE FORENSICS MOBILE DEVICE FORENSICS Smart phones and other handheld electronics have become an important part of our everyday lives and the ever changing technology is making these devices a major source of digital

More information

Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is

Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is Press release High-performance IT security solutions protect V2X communication against cyberattacks ESCRYPT GmbH Am Hain 5, 44789 Bochum, Germany Phone: +49 234 43870-200 Press and Public Relations: Martin

More information

Zed-FULL- Immobiliser Solutions by IEA

Zed-FULL- Immobiliser Solutions by IEA Zed-FULL- Immobiliser Solutions by IEA Zed Full is the most professional and the unique all in one immobiliser device in the world with these features; Fix and crypto transponder cloning, Remote cloning

More information

Ford Mustang Dash Replacement

Ford Mustang Dash Replacement 2015-2017 Ford Mustang Dash Replacement S1C056A-H05E User Manual Disclaimer Please read this manual thoroughly prior to installation. This manual shows a typical installation of a S1C056A-H05E Be sure

More information

Securing the future of mobility

Securing the future of mobility Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need

More information

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

ADS-SW(SI)-ALL01-AS-IG-EN

ADS-SW(SI)-ALL01-AS-IG-EN install guide ADS-SW(SI)-ALL0-AS-IG-EN firmware ADS-SW(SI)-ALL0-AS-EN hardware ADS-MSW Document number 99 Revision Date 009 NOTICE The manufacturer will accept no responsability for any electrical damage

More information

Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego

Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Steve Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage (UCSD) Karl Koscher,

More information

Security Concerns in Automotive Systems. James Martin

Security Concerns in Automotive Systems. James Martin Security Concerns in Automotive Systems James Martin Main Questions 1. What sort of security vulnerabilities do modern cars face today? 2. To what extent are external attacks possible and practical? Background

More information

Big Data for Smart Cities Connected Vehicles in the Wireless World

Big Data for Smart Cities Connected Vehicles in the Wireless World Big Data for Smart Cities Connected Vehicles in the Wireless World Dr Nigel Jefferies WWRF Chairman Huawei Technologies 3rd March 2016 Will IoT trigger next industrial revolution? Size of the IoT opportunity

More information

LA Auto Show Unveils Advanced Technology Showcase

LA Auto Show Unveils Advanced Technology Showcase FOR IMMEDIATE RELEASE Media Contact: Jessica Schmidt Rogers Finn Partners 310-552-4177 LAAutoShow@FinnPartners.com LA Auto Show Unveils Advanced Technology Showcase Latest connected car technologies highlighted

More information

Ford Vehicles equipped with 8 MyFord Touch SYNC2 System Navigation Upgrade

Ford Vehicles equipped with 8 MyFord Touch SYNC2 System Navigation Upgrade 2013-2016 Ford Vehicles equipped with 8 MyFord Touch SYNC2 System Navigation Upgrade S1C042A-Y01E Installation and User Manual Disclaimer Please read this manual thoroughly prior to installation. This

More information

Korea ICT Market Overview. Yoonmi Kim Finpro Korea

Korea ICT Market Overview. Yoonmi Kim Finpro Korea Korea ICT Market Overview Yoonmi Kim Finpro Korea 5G Advanced Network Key Players Network Service Provider Electronics Company Car and Car Component Company - 5G Antenna Technoloies for Mobile device and

More information

Connected Cars as the next great consumer electronics device

Connected Cars as the next great consumer electronics device Connected Cars as the next great consumer electronics device Sanjay Khatri Head of Platform Product Marketing Cisco Jasper 1992 2016 Cisco Systems, Inc. All rights reserved. Connected Cars: The next great

More information

NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER

NC1701  ENHANCED VEHICLE COMMUNICATIONS CONTROLLER NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER Nebula Systems has created the first dedicated controller for use in Telematics embedded systems, enabling companies in the Connected Car space to access

More information

Maritime cyber security: Threats & Opportunities. Andy Davis, Research Director Yevgen Dyryavyy, Security Consultant

Maritime cyber security: Threats & Opportunities. Andy Davis, Research Director Yevgen Dyryavyy, Security Consultant Maritime cyber security: Threats & Opportunities Andy Davis, Research Director Yevgen Dyryavyy, Security Consultant Agenda Cyber threats to the marine industry Attack surface overview (harbour / ships

More information

Embedded Software: Its Growing Influence on the Hardware world

Embedded Software: Its Growing Influence on the Hardware world Embedded Software: Its Growing Influence on the Hardware world ISA Vision Summit 2009, Bangalore 16 th FEB 09 V. R. Venkatesh Head, Product Engineering Services, Wipro Technologies. Wipro in Product Engineering

More information

Certified Digital Forensics Examiner

Certified Digital Forensics Examiner Certified Digital Forensics Examiner ACCREDITATIONS EXAM INFORMATION The Certified Digital Forensics Examiner exam is taken online through Mile2 s Assessment and Certification System ( MACS ), which is

More information

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE

SOLUTION BRIEF RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE RSA NETWITNESS NETWORK VISIBILITY-DRIVEN THREAT DEFENSE KEY CUSTOMER BENEFITS: Gain complete visibility across enterprise networks Continuously monitor all traffic Faster analysis reduces risk exposure

More information

Personal Cybersecurity

Personal Cybersecurity Personal Cybersecurity The Basic Principles Jeremiah School, CEO How big is the issue? 9 8 7 6 5 4 3 2 1 Estimated global damages in 2018 0 2016 2018 2020 2022 2024 2026 2028 2030 Internet Users Billions

More information

SiriusXM Satellite Radio interface

SiriusXM Satellite Radio interface www.vaistech.com Owner s Manual SiriusXM Satellite Radio interface (SXV300 SiriusXM Tuner required) UNIVERSAL Copyright 2003-2018 VAIS Technology Published Jan 10, 2018 VAIS Technology, 8811 American Way,

More information

D-Series Specifications.

D-Series Specifications. D-Series Specifications. RECORDS: Video: MP4 H.264 Encoding Audio: AAC (Audio optional) RECORDING RESOLUTION: 1080p, 720p, 480p 30 frames per second VIDEO ENCODING: H.264 (multiple rates) MEMORY: D5: 64GB,

More information

Securing the Autonomous Automobile

Securing the Autonomous Automobile Securing the Autonomous Automobile Sridhar Iyengar Vice President, Intel Labs Intel Corporation CROSSING Conference May 15-17 2017 Legal Notices and disclaimers This presentation contains the general insights

More information

TomTom Innovation. Hans Aerts VP Software Development Business Unit Automotive November 2015

TomTom Innovation. Hans Aerts VP Software Development Business Unit Automotive November 2015 TomTom Innovation Hans Aerts VP Software Development Business Unit Automotive November 2015 Empower Movement Simplify complex technology From A to BE Innovative solutions Maps Consumer Connect people and

More information

How to make Connected Car Reality? Dr. Walter J. Buga CEO

How to make Connected Car Reality? Dr. Walter J. Buga CEO How to make Connected Car Reality? Dr. Walter J. Buga CEO 1 Connected Transportation Source: US DOT, January 2012 Core System Communications 1.3 Connected Vehicle Playing Field From a system perspective

More information

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation Accelerating solutions for highway safety, renewal, reliability, and capacity Regional Operations Forums Connected Vehicles and the Future of Transportation ti Session Overview What are connected and automated

More information

AccessData offers a broad array of training options.

AccessData offers a broad array of training options. Forensics Training AccessData offers a broad array of training options. Our trainers have more than two centuries of cumulative experience in their respective fields. Take Advantage of the All Access Pass

More information

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,

More information

Connected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use

Connected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use Connected Car Dr. Sania Irwin Head of Systems & Applications May 27, 2015 1 Nokia Solutions and Networks 2014 For internal use Agenda Introduction Industry Landscape Industry Architecture & Implications

More information

Security Pitfalls. A review of recurring failures. Dr. Dominik Herrmann. Download slides at https://dhgo.to/pitfalls

Security Pitfalls. A review of recurring failures. Dr. Dominik Herrmann. Download slides at https://dhgo.to/pitfalls Security Pitfalls A review of recurring failures Dr. Dominik Herrmann Download slides at https://dhgo.to/pitfalls Research on security, privacy, online tracking, forensics. Postdoc researcher University

More information

Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security

Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security Establishing a Framework for Effective Testing and Validation of Critical Infrastructure Cyber-Security Michael John SmartSec 2016, Amsterdam www.encs.eu European Network for Cyber Security The European

More information

Cyber Security Incident Response Fighting Fire with Fire

Cyber Security Incident Response Fighting Fire with Fire Cyber Security Incident Response Fighting Fire with Fire Arun Perinkolam, Senior Manager Deloitte & Touche LLP Professional Techniques T21 CRISC CGEIT CISM CISA AGENDA Companies like yours What is the

More information

Auto Embedded Software: Infotainment

Auto Embedded Software: Infotainment Auto Embedded Software: Infotainment Applied Market Intelligence Hardware: Infotainment system design is following PC model Software/OS: Standardized software/os s will dominate in the future Apps: Future

More information

Format of Session 1. Forensic Accounting then and now 2. Overview of Data Analytics 3. Fraud Analytics Basics 4. Advanced Fraud Analytics 5. Data Visualization 6. Wrap-up Question are welcome and encouraged!

More information

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security In less than a year, 100s of millions connected cars Aftermarket connectivity most prevalent

More information

GPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security

GPS Vulnerability and DHS Mitigation Efforts. David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security GPS Vulnerability and DHS Mitigation Efforts David Wulf Acting Deputy Assistant Secretary Infrastructure Protection Department of Homeland Security The Office of Infrastructure Protection National Protection

More information

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry

This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry This Online Gaming Company Didn t Want to Roll the Dice on Security That s Why it Worked with BlackBerry At a Glance With offices across the country, this gaming company has been in operation for decades.

More information

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL)

An Operational Cyber Security Perspective on Emerging Challenges. Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) An Operational Cyber Security Perspective on Emerging Challenges Michael Misumi CIO Johns Hopkins University Applied Physics Lab (JHU/APL) Johns Hopkins University Applied Physics Lab (JHU/APL) University

More information

Diagnostic Trends 2017 An Overview

Diagnostic Trends 2017 An Overview Diagnostic Trends 2017 An Overview Vector India Conference, 2017-07-18+19 V1.0 2017-07-14 Agenda 1. DoIP 2. Remote Diagnostics 3. Cyber Security 4. Summary 2/29 DoIP Why DoIP? Why another diagnostic network?

More information