Reinhard Kugler
A Hitchhikers Guide to Container Security - Automotive Edition 2024
#1about 2 minutes
Recalling a famous remote car hack from 2015
A historical remote car hack demonstrates how attackers gained control over vehicle functions by pivoting from the infotainment system.
#2about 4 minutes
Shifting from distributed ECUs to centralized computers
The automotive industry is moving from a complex network of individual electronic control units (ECUs) to centralized high-performance computers (HPCs) to simplify updates and maintenance.
#3about 6 minutes
Running containers with access to vehicle electronics
A live demonstration shows how a containerized application can directly access and manipulate a car's internal network to control components like the instrument cluster.
#4about 5 minutes
Using eBPF to observe and secure container networking
eBPF programs can be attached to the Linux kernel to observe and filter a container's network traffic at a low level without requiring a sidecar.
#5about 2 minutes
Securing hardware update channels with eBPF policies
eBPF can trace and block unauthorized write operations to hardware interfaces like the SPI bus, preventing malicious firmware flashing from a compromised container.
#6about 2 minutes
Understanding the offensive potential of eBPF rootkits
eBPF is a dual-use technology that can also be used to create stealthy, in-memory rootkits capable of modifying network packets on the fly.
Related jobs
Jobs that call for the skills explored in this talk.
Information Security Officer - Part-time (w/m/d)
aedifion GmbH
Köln, Germany
€30-45K
Intermediate
Network Security
Security Architecture
+1
(Senior) Platform Engineer (f/m/d)
MARKT-PILOT GmbH
Stuttgart, Germany
Remote
€75-90K
Senior
Kubernetes
Terraform
+1
Matching moments
25:53 MIN
New threats from modern vehicle E/E architectures
Automotive Security Challenges: A Supplier's View
18:51 MIN
Q&A on securing CAN bus and future architectures
Cybersecurity for Software Defined Vehicles
27:08 MIN
Applying containerization and immutable OS concepts to cars
The best of two worlds - Bringing enterprise-grade Linux to the vehicle
06:04 MIN
An overview of the automotive security landscape
Automotive Security Challenges: A Supplier's View
00:02 MIN
The role of security in specialized vehicle projects
Cyber Security: Small, and Large!
52:02 MIN
Exploring the security vulnerabilities of connected cars
Using all the HTML, Running State of the Browser and "Modern" is Rubbish
00:43 MIN
The automotive industry's shift to software-defined vehicles
Cybersecurity for Software Defined Vehicles
33:00 MIN
Navigating the challenges of automotive safety certification
The best of two worlds - Bringing enterprise-grade Linux to the vehicle
Featured Partners
Related Videos
Cybersecurity for Software Defined Vehicles
Henning Harbs
A solution to embed container technologies into automotive environments
Falk Langer & Lukas Stahlbock
The best of two worlds - Bringing enterprise-grade Linux to the vehicle
Joachim Werner
Automotive Security Challenges: A Supplier's View
Davor Frkat
Cyber Security: Small, and Large!
Martin Schmiedecker
Turning Container security up to 11 with Capabilities
Mathias Tausig
Car's are Technology on Wheels - Impact of Software and IT Competence in Automotive
Rahima Yakoob
Software defines the vehicle: Why customers and developers will love cars even more
Peter Bosch
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.



Embedded Security Engineer - Schwachstellenanalyse | Car IT | Secure Coding
Prognum Automotive GmbH
Ulm, Germany
Remote
C++

Mitarbeiter Vehicle Cyber Security
Bertrandt AG
Mannheim, Germany



Security Specialist Automotive
Brunel GmbH
Regensburg, Germany

System/Solution Architect - Automotive Functional Safety
Luxoft
Wolfsburg, Germany
Senior
Software Architecture

System/Solution Architect - Automotive Functional Safety
Luxoft
Berlin, Germany
Senior
Software Architecture