Las investigaciones de
seguridad que se presentan del mundo automotriz son escasas y sobre vehículos
específicos, por eso no se pueden proveer ataques generales, ya que todos los
fabricantes se manejan de manera independiente del resto. Chris, nos comparte
sus conclusiones en base a un análisis que realizó a un gran número de autos de
diferentes fabricantes, desde una perspectiva de seguridad.
Sobre Chris Valasek
Christopher Valasek serves
as Director Vehicle Security Research at IOActive, an industry leader in
comprehensive computer security services. In this role, Valasek is responsible
for guiding IOActive’s vehicle security research efforts. He is also heavily
involved in bleeding-edge automotive security research. Valasek specializes in
offensive research methodologies with a focus on reverse engineering and
exploitation. Known for his extensive automotive field research, Valasek was
one of the first researchers to discuss automotive security issues in detail.
His release of a library to physically control vehicles through the CAN bus
garnered worldwide media attention. Valasek is also known for his exploitation
and reverse engineering of Microsoft® Windows. As a Windows security subject
matter expert, he is quoted in several technology publications and has given
presentations on the subject at a number of conferences. He is also the
Chairman of SummerCon, the oldest US hacker conference.
Aquí te presenta su conferencia:
Chris Valasek saluda a la ekoparty 10! from ekoparty on Vimeo.
No hay comentarios:
Publicar un comentario