update lists
This commit is contained in:
@@ -268,6 +268,26 @@ Your Car</a> - Kamel Ghali’s talk on ROOTCON 17 about how an attacker’s
|
||||
perspective on hacking a car and origins of such attacks, how they’ve
|
||||
been used in different countries over the years, and explore the
|
||||
technical details of what makes such an attack possible.</li>
|
||||
<li><a href="https://www.youtube.com/watch?v=JVWFfSmIlRY">TR23: V2GEvil:
|
||||
Ghost in the wires</a> - This research is dedicated to enhancing the
|
||||
cybersecurity of electric vehicles, with a specific focus on identifying
|
||||
vulnerabilities in the Electric Vehicle Communication Controller (EVCC),
|
||||
and an introduction to the tool V2GEvil. Accessible through the On-Board
|
||||
Charging (OBC) port, makes this attack vector really important for the
|
||||
security of future vehicles.</li>
|
||||
<li><a href="https://www.youtube.com/watch?v=Ui2etjRyrUE">DEF CON CHV -
|
||||
V2GEvil: Ghost in the wires</a> - Shortened and summarized version of
|
||||
the talk V2GEvil: Ghost in the wires, from the DEF CON 32 Car Hacking
|
||||
Village, by Pavel Khunt and Thomas Sermpinis.</li>
|
||||
<li><a href="https://www.youtube.com/watch?v=MDndWJxfP-U">The hack, the
|
||||
crash and two smoking barrels. (And all the times I (almost) killed an
|
||||
engineer.)</a> - Thomas Sermpinis goes through the process of
|
||||
responsibly disclosing findings affecting the Blind Spot Detection
|
||||
Sensor of a current MY vehicle from one of the biggest OEMs in the
|
||||
world, leading to accusations that he was collaborating with hostile
|
||||
nations by the OEM. A story about how automotive manufacturers are
|
||||
treating the security industry, where are we heading, and how to be
|
||||
better, on the stage of DEF CON 32.</li>
|
||||
</ul>
|
||||
<h2 id="books">Books</h2>
|
||||
<ul>
|
||||
@@ -372,6 +392,12 @@ Intrusion Detection Benchmark</a></li>
|
||||
of Comparability & Testing in CAN Intrusion Detection Research: A
|
||||
Comprehensive Guide to CAN IDS Data & Introduction of the ROAD
|
||||
Dataset</a></li>
|
||||
<li><a href="https://hexhive.epfl.ch/publications/files/22WOOT.pdf">On
|
||||
the Insecurity of Vehicles Against Protocol-Level Bluetooth
|
||||
Threats</a></li>
|
||||
<li><a
|
||||
href="https://dspace.cvut.cz/bitstream/handle/10467/113764/F8-DP-2024-Khunt-Pavel-thesis.pdf">Pavel,
|
||||
K. Vehicle On-Board Charging Security Scanner, 2024</a></li>
|
||||
</ul>
|
||||
<h2 id="courses">Courses</h2>
|
||||
<ul>
|
||||
@@ -798,6 +824,8 @@ interface in Python, but written in C++.</li>
|
||||
Development tool for CAN bus simulation. CANdevStudio enables to
|
||||
simulate CAN signals such as ignition status, doors status or reverse
|
||||
gear by every automotive developer.</li>
|
||||
<li><a href="https://github.com/jglim/UnlockECU">UnlockECU</a> - Free,
|
||||
open-source ECU seed-key unlocking tool.</li>
|
||||
</ul>
|
||||
<h3 id="java">Java</h3>
|
||||
<ul>
|
||||
@@ -940,3 +968,6 @@ Response</a></li>
|
||||
<p>Your contributions are always welcome! Please take a look at the <a
|
||||
href="https://github.com/jaredmichaelsmith/awesome-vehicle-security/blob/master/contributing.md">contribution
|
||||
guidelines</a> first.</p>
|
||||
<p><a
|
||||
href="https://github.com/jaredthecoder/awesome-vehicle-security">vehiclesecurity.md
|
||||
Github</a></p>
|
||||
|
||||
Reference in New Issue
Block a user