Today, cybersecurity affects each one of us on a multitude of levels. Our professional work, our personal lives—even our vehicles—depend on connectivity and technology that runs on complex software.
Today in the Automotive autonomous driving, connected cars, electric vehicles, and shared mobility—have dominated the agenda of automotive industry leaders in recent years. These innovations, built on the digitization of in-car systems, the extension of car IT systems into the back end, and the propagation of software, turn modern cars into information clearinghouses while also making them tempting targets for cyberattacks,
Lets have a short look about interesting information of last 4 years
- The frequency of cyberattacks on cars increased 225 percent from 2018 to 2021
- Nearly 85% of attacks in 2021 were carried out remotely, outnumbering physical attacks four to one.
- 40% of attacks targeted back-end servers.
- 2021 saw 54.1% of attacks carried out by Malicious actors, up from 49.3% in 2020
- The top attack categories were data/privacy breach (38%), car theft/break-ins (27%), and control systems (20%).
- Keyless entry and key fob attacks account for 50% of all vehicle thefts. Thieves only need to be close to the key fob for a Black Hat hacker to pick up and reproduce its signal.
In very few years Cybersecurity will raise as a mandatory element in Automotive and this course will be helpful understanding the overall view about Cyber security concepts.
Who this course is for:
- Automotive enthusiast, Automotive embedded professionals
- Who wants to switch or start their career in Automotive cybersecurity domain to become a automotive cyber security engineer or manager
What you’ll learn
- Domain specific automotive cyber attacks
- Need of automotive security
- Brief summary about Automotive cybersecurity standards- ISO21434 (TARA), UN R155, UN R156
- Basic properties of security (CIA)
- Basic terminology of Cryptography
- Symmetric algorithm (AES-128 – CBC, ECB mode)
- Asymmetric algorithm(RSA)
- Advantages and disadvantages of Symmetric and asymmetric algorithm
- Achieving Security through SW and HW solution in automotive
- Overview of security related components in ECU
- Automotive trust Anchors (SHE, HSM)
- Detailed Difference between SHE and HSM ( Only by Experience)
- Key management (Key storage in Secure slot)
- Diffie Hellman (DH) key exchange algorithm
- AUTOSAR Crypto stack (CSM, Secure on board communication (Secoc), Cry, CryIf, Crypto)
- Interaction between AUTOSAR Crypto models ( User friendly animations)
- What is the need of freshness value?
- Demonstration of Freshness value
- What happens if MAC verification fails
- Secure Boot – Why ? what ? How ?
- Types of Cyber Attacks – Sniffing , Injection, Denial of service , Fuzzing, Replay attacks
- Tesla hacked – Proof
Free Download Links-
Note: Comment below if you find the download links dead and comment with fake or temporary Email-id is going to be ignored.