Practical Car Hacking

In the last few years, we have seen many new attacks on cars, but this environment is still hard to get into mainly because the tools are different from classical reversing or hacking tools.
In this training, the car hacking tools will be presented along with many practical sessions to make sure the attendees will be able to redo the attacks later on. We will provide the necessary CAN tools and perform the attacks on real cars. We will also cover the basic theory about the CAN bus, so that the attendees can understand what is going on.
*Special gift: attendees will be given a CAN transceiver / controller and an OBD cable to be able to replay the attacks using any microcontroller, as soon as they come back. They will need to bring a microcontroller board of their choice during the training to connect to their free CAN transceiver / controller. Any SPI enabled microcontroller should be compatible, but the faster the better! The microcontroller may or may not have a CAN interface, we will handle both cases.
Guillaume Heilles is a security engineer at Quarkslab. He's mainly focused on hardware attack s on IoT devices, but also on reverse engineering and exploitation. He has presented the hardware CTF at Hardwear.io in 2017 & a talk on How to drift with any car at 3r4th CCC 2017.
Emma `kylma` Benoit
Emma is a hardware hacker and security researcher at Quarkslab. She graduated with an MSc in computer science in 2014. She learned about reverse engineering through the Blackhoodie workshop before discovering a passion for hardware hacking.
She gave talks with a focus on hardware and helped to run the hardware CTF at Nullcon in 2018. She likes exotic architectures, (de)soldering stuff, dumping memories and (de)constructing PCBs.