viernes, 24 de octubre de 2014

Remote Automotive Attack Surfaces | Chris Valasek

Las investigaciones de seguridad que se presentan del mundo automotriz son escasas y sobre vehículos específicos, por eso no se pueden proveer ataques generales, ya que todos los fabricantes se manejan de manera independiente del resto. Chris, nos comparte sus conclusiones en base a un análisis que realizó a un gran número de autos de diferentes fabricantes, desde una perspectiva de seguridad.

Sobre Chris Valasek

Christopher Valasek serves as Director Vehicle Security Research at IOActive, an industry leader in comprehensive computer security services. In this role, Valasek is responsible for guiding IOActive’s vehicle security research efforts. He is also heavily involved in bleeding-edge automotive security research. Valasek specializes in offensive research methodologies with a focus on reverse engineering and exploitation. Known for his extensive automotive field research, Valasek was one of the first researchers to discuss automotive security issues in detail. His release of a library to physically control vehicles through the CAN bus garnered worldwide media attention. Valasek is also known for his exploitation and reverse engineering of Microsoft® Windows. As a Windows security subject matter expert, he is quoted in several technology publications and has given presentations on the subject at a number of conferences. He is also the Chairman of SummerCon, the oldest US hacker conference.


Aquí te presenta su conferencia:

Chris Valasek saluda a la ekoparty 10! from ekoparty on Vimeo.

No hay comentarios: