In the last few years, we have seen many new attacks on cars, but this environment is still hard to get into mainly because the tools are different from classical reversing or hacking tools.
In this training, the car hacking tools will be presented along with many practical sessions to make sure the attendees will be able to redo the attacks later on. We will provide the necessary CAN tools and perform the attacks on real cars. We will also cover the basic theory about the CAN bus, so that the attendees can understand what is going on.
*Special gift: attendees will be given a CAN transceiver / controller and an OBD cable to be able to replay the attacks using any microcontroller, as soon as they come back. They will need to bring a microcontroller board of their choice during the training to connect to their free CAN transceiver / controller. Any SPI enabled microcontroller should be compatible, but the faster the better! The microcontroller may or may not have a CAN interface, we will handle both cases.
Guillaume Heilles is a security engineer at Quarkslab. He's mainly focused on hardware attack s on IoT devices, but also on reverse engineering and exploitation. He has presented the Hardware CTF at hardwear.io in 2017, 2018 & a talk on How to drift with any car at 3r4th CCC 2017.
Valérian Comiti is a security expert in embedded systems at Quarkslab. He enjoys reversing firmwares and finding vulnerabilities for a wide set of systems. In 2018, he presented YaDiff at SSTIC to help reversers to propagate theirs analysis to different versions of a firmware. On his spare time, he likes developing softwares for his model aircrafts and CNC machines.