Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

ScapyCon 24 - Insights Into Vehicle Attack Vectors - Jan-Peter von Hunnius

Автор: dissecto

Загружено: 2024-11-22

Просмотров: 296

Описание:

This talk gives an insight into the current state of vehicle security, highlights infamous hacks and shows where vulnerabilities still exist.

About dissecto: Founded in 2022, by the maintainers and primary contributors to “Automotive Scapy“, a widely embraced packet manipulation tool in the automotive industry, dissecto specializes in simplifying cybersecurity testing for embedded systems. Our flagship product, dissecto HydraVision, is an automated security test environment for electrical control units (ECUs), that detects and reports vulnerabilities. Alongside, we provide security training, pentesting and advanced hardware solutions like the dissecto HydraLink interface. Find out more: www.dissecto.com

About ScapyCon: ScapyCon Automotive 2024 was a two-day event focused on network packet manipulation, attracting 75 participants. Held on September 18-19 at Techbase Regensburg, it featured 10 expert speakers and 3 hands-on workshops, covering applications from automotive to IoT and aviation. Attendees explored advanced capabilities of Scapy, the premier Python tool for packet manipulation.

About HydraVision: HydraVision is a platform as a service that enables automated security testing over the entire lifecycle of an ECU and ensures compliance with the latest industry-specific guidelines and standards such as UNECE R155 and ISO 21434. With our intelligent security test environment, manufacturers and suppliers can not only easily comply with the new directives and standards, but also carry out practical cybersecurity tests on their products – automatically and remotely. We proactively develop test cases for new threats (CVEs) reported by developers, dissecto Research or third parties such as Auto-ISAC or ASRG. This allows attack vectors against your system to be verified and validated in a timely manner. In addition, you gain full control and transparency over all components of the platform in order to review and audit them and to design your work process as individually as possible. Learn more: https://dissec.to/dissecto-hydravision/

ScapyCon 24 - Insights Into Vehicle Attack Vectors - Jan-Peter von Hunnius

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

ScapyCon 24 - My Car My Keys. Obtaining CAN bus SecOC signing keys - Willem Melching

ScapyCon 24 - My Car My Keys. Obtaining CAN bus SecOC signing keys - Willem Melching

ScapyCon 24 - JTAG Enumeration Using RP2040 - Falk Mayer

ScapyCon 24 - JTAG Enumeration Using RP2040 - Falk Mayer

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Эксперт по кибербезопасности о ваших паролях, вирусах и кибератаках

Concepts for Scalable Training on Analog Event based Neuromorphic Hardware (E Arnold et al)

Concepts for Scalable Training on Analog Event based Neuromorphic Hardware (E Arnold et al)

ScapyCon 25  - From RFCs to CVEs (Scapy Keynote) - Guillaume Valadon

ScapyCon 25 - From RFCs to CVEs (Scapy Keynote) - Guillaume Valadon

The Secret to Vulnerability Management

The Secret to Vulnerability Management

Jouw fabriek klaar voor de toekomst

Jouw fabriek klaar voor de toekomst

ScapyCon 24 - Past, Present and Future of Automotive Scapy - Dr. Nils Weiss

ScapyCon 24 - Past, Present and Future of Automotive Scapy - Dr. Nils Weiss

Музыка для работы - Deep Focus Mix для программирования, кодирования

Музыка для работы - Deep Focus Mix для программирования, кодирования

Изучите основы Linux — Часть 2

Изучите основы Linux — Часть 2

Denial of Service Attacks Explained

Denial of Service Attacks Explained

#HITB2024BKK D2 - Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles

#HITB2024BKK D2 - Exploiting the In-Vehicle Browser: A Novel Attack Vector in Autonomous Vehicles

ScapyCon 24 - Implementing and Testing Layer 2 Firewall Rules with Scapy - Francisco Cotrina

ScapyCon 24 - Implementing and Testing Layer 2 Firewall Rules with Scapy - Francisco Cotrina

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

Музыка для работы за компьютером | Фоновая музыка для концентрации и продуктивности

Kubernetes — Простым Языком на Понятном Примере

Kubernetes — Простым Языком на Понятном Примере

Security Testing

Security Testing

ScapyCon 24 - Keynote - Philippe Biondi

ScapyCon 24 - Keynote - Philippe Biondi

Web Application Penetration Testing Tutorial   Penetration Testing Tools #cybersecuritytraining

Web Application Penetration Testing Tutorial Penetration Testing Tools #cybersecuritytraining

Подробно о HTTP: как работает Интернет

Подробно о HTTP: как работает Интернет

Meshtastic — связь без интернета

Meshtastic — связь без интернета

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]