In this presentation, we will explain the inner workings of this technology and showcase the new capability that was developed in the Tesla hacking 2017. Multiple 0-days of different in-vehicle components are included in the new attack chain.

By Ling Liu + Wenkai Zhang + Yuefeng Du

Full abstract and materials:

Posted by Charlie