Martin Schmiedecker
Cyber Security: Small, and Large!
#1about 3 minutes
The role of security in specialized vehicle projects
An introduction to Bosch Engineering's work on small-series projects like autonomous excavators and high-performance cars, where security is critical.
#2about 3 minutes
A brief history of early automotive hacking vectors
Early academic research demonstrated how to compromise cars through vectors like manipulated MP3 files and spoofed tire pressure sensors.
#3about 1 minute
The landmark 2015 remote Jeep hack
The infamous remote hack of a Jeep Cherokee over its cellular connection forced the industry to take remote threats seriously.
#4about 5 minutes
Vulnerabilities in keyless entry and vehicle data
Modern attacks target convenience features, from signal relaying for keyless entry to sophisticated hacks for stealing Teslas and manipulating digital odometers.
#5about 2 minutes
Understanding attacker motivations and barriers
Attackers are driven by curiosity and the need for self-repair, while the high cost of vehicles has historically been a major barrier to research.
#6about 4 minutes
Modern cybersecurity challenges for developers
Developers now face increasing system complexity, supply chain attacks, ransomware threats, and a growing attack surface from vehicle connectivity.
#7about 4 minutes
The expanding role and risks of software in cars
Software now controls every aspect of a modern vehicle, introducing risks like integer overflows that can have catastrophic consequences in autonomous systems.
#8about 2 minutes
Using smartphones as a more secure car key
Replacing traditional key fobs with smartphones offers enhanced security and enables new convenient services like seamless digital keys for rental cars.
#9about 2 minutes
Upcoming legislation and industry security standards
New regulations like ISO 21434 and UNECE mandates will require manufacturers to implement and audit verifiable security processes throughout the vehicle lifecycle.
#10about 2 minutes
Resources for staying current on automotive security
Developers can stay informed about the latest threats and research by following industry groups like the Automotive Security Research Group (ASRG).
#11about 9 minutes
Q&A on liability, standards, and future threats
A discussion covering complex topics like liability in autonomous accidents, security standardization, preventing hardware hacking, and the potential for centralized failures.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
07:51 MIN
An overview of the automotive security landscape
Automotive Security Challenges: A Supplier's View
Unlock Moments
Create a free account to watch a limited number of Moments each month.
Upgrade to PRO for unlimited access to the full archive.
Upgrade to PRO for unlimited access to the full archive.
You have an account? Log in
04:00 MIN
Exploring the security vulnerabilities of connected cars
Using all the HTML, Running State of the Browser and "Modern" is Rubbish
Unlock Moments
Create a free account to watch a limited number of Moments each month.
Upgrade to PRO for unlimited access to the full archive.
Upgrade to PRO for unlimited access to the full archive.
You have an account? Log in
02:26 MIN
Why developers make basic cybersecurity mistakes
Don't Be A Naive Developer: How To Avoid Basic Cybersecurity Mistakes
Unlock Moments
Create a free account to watch a limited number of Moments each month.
Upgrade to PRO for unlimited access to the full archive.
Upgrade to PRO for unlimited access to the full archive.
You have an account? Log in
03:40 MIN
Real-world examples of modern car hacking techniques
Cybersecurity for Software Defined Vehicles
Unlock Moments
Create a free account to watch a limited number of Moments each month.
Upgrade to PRO for unlimited access to the full archive.
Upgrade to PRO for unlimited access to the full archive.
You have an account? Log in
07:58 MIN
Q&A on security, internships, and competitive analysis
Agile work at CARIAD – Creating a customer web application for controlling the vehicle
Unlock Moments
Create a free account to watch a limited number of Moments each month.
Upgrade to PRO for unlimited access to the full archive.
Upgrade to PRO for unlimited access to the full archive.
You have an account? Log in
03:11 MIN
Managing security over the entire vehicle lifecycle
Cybersecurity for Software Defined Vehicles
Unlock Moments
Create a free account to watch a limited number of Moments each month.
Upgrade to PRO for unlimited access to the full archive.
Upgrade to PRO for unlimited access to the full archive.
You have an account? Log in
06:39 MIN
New threats from modern vehicle E/E architectures
Automotive Security Challenges: A Supplier's View
Unlock Moments
Create a free account to watch a limited number of Moments each month.
Upgrade to PRO for unlimited access to the full archive.
Upgrade to PRO for unlimited access to the full archive.
You have an account? Log in
04:50 MIN
Security challenges of autonomous driving and forensics
Automotive Security Challenges: A Supplier's View
Unlock Moments
Create a free account to watch a limited number of Moments each month.
Upgrade to PRO for unlimited access to the full archive.
Upgrade to PRO for unlimited access to the full archive.
You have an account? Log in
Featured Partners
Related Videos
Cybersecurity for Software Defined Vehicles
Henning Harbs
Automotive Security Challenges: A Supplier's View
Davor Frkat
Getting under the skin: The Social Engineering techniques
Mauro Verderosa
You can’t hack what you can’t see
Reto Kaeser
Climate vs. Weather: How Do We Sustainably Make Software More Secure?
Panel Discussion
Securing Your Web Application Pipeline From Intruders
Milecia McGregor
What makes Cybersecurity different for critical infrastructure?
Kurt Eder
The best of two worlds - Bringing enterprise-grade Linux to the vehicle
Joachim Werner
Related Articles
View all articles



From learning to earning
Jobs that call for the skills explored in this talk.


e.solutions GmbH




Excellence AG
Kotlin
Kubernetes
Apache Kafka
Microservices
Continuous Delivery
+1

Vesterling Consulting GmbH
€70-90K
Software Architecture


dspace digital signal processing and control engineering GmbH
Remote
GIT
Linux
DevOps