Over-the-Air Updates - what could go wrong?

  • Join the LiveStream
  • When: Oct. 29, 2020 | 6 p.m. Central European Time(UTC+01)

    Where: LiveStream

    Who: Andrew Tierney Security Consultant at Pen Test Partners

    Over-the-Air Updates - what could go wrong?

    Tesla Inc. was one of the first companies to perform routine, whole-vehicle firmware updates. We wanted to understand how the car worked and how the firmware updates were deployed, so we bought one, took it apart, and started investigating. We learnt a lot along the way; how the CAN buses are connected, how the hardware is constructed, how the software works, how the car connects back to the mothership, and how these over-the-air updates worked. During this talk, we'll look at some of the weaknesses we found and how they apply to the wider automotive industry.

    About the Presenter:

    Andrew leads the hardware team at Pen Test Partners. He covers all systems that aren't general purpose computers: IoT, phones, cars, ships, planes and industrial control. On the offensive side, he has spent many years reverse engineering, researching and finding vulnerabilities in these systems. He is an electronic engineer by training, and loves deep-dives into hardware and cryptography.

    Visit Speaker Profile