ycliper

Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
Скачать

37C3 - Back in the Driver's Seat: Recovering Critical Data from Tesla Autopilot Using Voltage Glitch

Автор: media.ccc.de

Загружено: 2023-12-29

Просмотров: 43212

Описание: https://media.ccc.de/v/37c3-12144-bac...



Tesla's driving assistant has been subject to public scrutiny for good and bad: As accidents with its "full self-driving" (FSD) technology keep making headlines, the code and data behind the onboard Autopilot system are well-protected by the car manufacturer. In this talk, we demonstrate our voltage-glitching attack on Tesla Autopilot, enabling us root privileges on the system.


Apart from building electric vehicles, Tesla has gained a reputation for their integrated computer platform comprising a feature-rich infotainment system, remote services through Tesla's Cloud and mobile app, and, most notably, an automated driving assistant. Enabled by a dedicated arm64-based system called Autopilot, Tesla offers different levels of "self-driving". The "full self-driving" (FSD) is provided to specific customers via in-car purchases and has been subject to public discourse.

Despite using multiple cameras and Autopilot's machine learning (ML) models, accidents persist and shape FSD reporting. While the platform security of Autopilot's hardware protects the code and ML models from competitors, it also hinders third parties from accessing critical user data, e.g., onboard camera recordings and other sensor data, that could help facilitate crash investigations.

This presentation shows how we rooted Tesla Autopilot using voltage glitching. The attack enables us to extract arbitrary code and user data from the system. Among other cryptographic keys, we extract a hardware-unique key used to authenticate Autopilot towards Tesla's "mothership". Overall, our talk will shed light on Autopilot's security architecture and gaps.

Before delving into Autopilot, we successfully executed a Tesla Jailbreak of the AMD-based infotainment platform and presented our attack at BlackHat USA 2023. This achievement empowered custom modifications to the root file system and temporarily facilitated the activation of paid car features.

Niclas Kühnapfel
Christian Werling
Hans Niklas Jacob - hnj

https://events.ccc.de/congress/2023/h...

#37c3 #Security

Не удается загрузить Youtube-плеер. Проверьте блокировку Youtube в вашей сети.
Повторяем попытку...
37C3 - Back in the Driver's Seat: Recovering Critical Data from Tesla Autopilot Using Voltage Glitch

Поделиться в:

Доступные форматы для скачивания:

Скачать видео

  • Информация по загрузке:

Скачать аудио

Похожие видео

37C3 -  Apple's iPhone 15: Under the C

37C3 - Apple's iPhone 15: Under the C

37C3 -  Adventures in Reverse Engineering Broadcom NIC Firmware

37C3 - Adventures in Reverse Engineering Broadcom NIC Firmware

37C3 -  Unlocking the Road Ahead: Automotive Digital Forensics

37C3 - Unlocking the Road Ahead: Automotive Digital Forensics

Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla's x86-Based Seat Heater

Jailbreaking an Electric Vehicle in 2023 or What It Means to Hotwire Tesla's x86-Based Seat Heater

Your Data Is In—Now What Best Practices to Refine, Route, and Report Security Data using DefectDojo

Your Data Is In—Now What Best Practices to Refine, Route, and Report Security Data using DefectDojo

37C3 -  Full AACSess: Exposing and exploiting AACSv2 UHD DRM for your viewing pleasure

37C3 - Full AACSess: Exposing and exploiting AACSv2 UHD DRM for your viewing pleasure

From Prompts to AGENTS.md: What Survives Across Thousands of Runs | AI Native Dev NYC (with Slides)

From Prompts to AGENTS.md: What Survives Across Thousands of Runs | AI Native Dev NYC (with Slides)

37C3 -  Toniebox Reverse Engineering

37C3 - Toniebox Reverse Engineering

ШУЛЬМАН: новая мобилизация, уход Путина, смута. Чебурнет. Большое интервью / МОЖЕМ ОБЪЯСНИТЬ

ШУЛЬМАН: новая мобилизация, уход Путина, смута. Чебурнет. Большое интервью / МОЖЕМ ОБЪЯСНИТЬ

Focus Music for Work – Deep Concentration Chill Beats for Study and Coding

Focus Music for Work – Deep Concentration Chill Beats for Study and Coding

37C3 -  Breaking

37C3 - Breaking "DRM" in Polish trains

37C3 -  Operation Triangulation: What You Get When Attack iPhones of Researchers

37C3 - Operation Triangulation: What You Get When Attack iPhones of Researchers

2022 Cybersecurity roadmap: How to get started?

2022 Cybersecurity roadmap: How to get started?

37C3 -  Self-cannibalizing AI

37C3 - Self-cannibalizing AI

37C3 -  Turning Chromebooks into regular laptops

37C3 - Turning Chromebooks into regular laptops

Как Ubuntu Предала Linux - Вся Правда о Взлёте и Падении Canonical

Как Ubuntu Предала Linux - Вся Правда о Взлёте и Падении Canonical

38C3 - Hacking yourself a satellite - recovering BEESAT-1

38C3 - Hacking yourself a satellite - recovering BEESAT-1

МЫ ЭТО НЕ СТРОИЛИ. Кто оставил нам ГОТОВУЮ инфраструктуру?

МЫ ЭТО НЕ СТРОИЛИ. Кто оставил нам ГОТОВУЮ инфраструктуру?

37C3 -  Finding Vulnerabilities in Internet-Connected Devices

37C3 - Finding Vulnerabilities in Internet-Connected Devices

Проклятие размерности, или Чем мониторинг отличается от контроля | Андрей Масалович

Проклятие размерности, или Чем мониторинг отличается от контроля | Андрей Масалович

© 2025 ycliper. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]