Next up, one talk I feel is huge and monumental and will impact the car hacking movement #BHEU
@ToyotaMotorCorp infotec team opening up about vehicle security. The glorious and sexy world of ECUs and CAN. CAN has no concept of security at all, and was never developed with it in mind
Toyota and other car companies now actively researching and preparing for cyber security attacks. There’s a blatant lack of cyber security engineers who also understand the automotive industry. #carhacking
Today’s cars have overly large attack surface areas. Thankfully stellar efforts have been made to get people interested. @CarHackVillage but what exists is a harmless real car for people to test and to learn
What is needed is an attractive platform for vehicular cyber security . One that is open and valid. So @ToyotaMotorCorp have created PASTA.
The ability to write to ECU firmware is huge. You can create more, explore more and do so in a safe environment. #carhacking
And this is PASTA AND I JUST MANGASM’D
Very compact and made in Japan.
There are 4 ECUs that allow writing and modifying using C. OBD-II, clipping area and a junction box. This helps with physical access attack simulation and defence. Junction boxes help with addition of new ECUs. This adds to in-vehicle networks (think adaptability and making new)
They based it around the RX63N microcontroller by Renesas. Toyota designed the ECU from scratch and will release full schematics and code to @github
Then they are opening up the CAN protocol to all, no more secrets like other car manufacturers. Yes Toyota!!!
A key design choice was making this adaptable. Couple it with a model car. Oh my hat
Full interaction with simulators, which means you can test how a potential attack will impact the safety and operability of the car
This being blackhat, let’s pwn a car. Inject malicious CAN packets. Manipulate steering
To date, NO car manufacturer would even attempt at doing what Toyota has just done. I couldn’t praise Toyota enough here. This industry has adopted security through security for too long. This is what @BlackHatEvents is all about. #BHEU
Roadmap will include full support for LIN, CAN FD, IVI, wireless I/F. It’s a joint initiative with Yokohama University. They want to force discussion about the critical nature of automotive security and get everyone involved
I stand by my initial comment: this will hopefully now change the fact that vehicular security has not been taken seriously and been a closed club for few. Massive respect. github.com/pasta-auto@pasta_auto@ToyotaMotorCorp#BHEU
Final pictures of my Xmas present
• • •
Missing some Tweet in this thread? You can try to
force a refresh
My wife and I are launching a new business and this week is menu prep and creation. Takoyakis made with proper Katsuobishi and Nori.
All hand made and yeah I think these will be popular
Second menu option testing. Chicken laksa curry learned from our time living in Singapore. We struggle to get a proper laksa here in London so time to change that.
It's a Sunday.
Kids are playing Lego
Wife is chilled
Guess this means it's teardown and tinker time with IKEAs indoor pollution sensor
Ok it's pretty well-designed. David Wahl is the designer, who's responsible for a lot of pretty damn good designs. Has usb-c to power but doesn't come with a cable.
Simply put, Victor and Thomas performed a side-channel attack that targeted the Google Titan Security Key’s secure element (the NXP A700X chip)
Ok sure, side-channels are all the rage but they achieved this by observing local electromagnetic radiations made during ECDSA signatures (the core cryptographic operation of the FIDO U2F protocol)
This is a thread for @Matt_Gerlach on how one could better work with data collected from pihole. However, it could also be useful for anyone else who wants to better understand how pervasive the global tracking world is and to do something about it. #privacy#surveillance.
First up, adblockers do not work anymore. The industry has moved on a lot (they use the same ones you do, don't kid yourself that this industry isn't blackhat af and do dodgy thing)
It's better to cut the snake's head off rather than make it dance to your beat.
Based off @wimremes's request yesterday about what you need, equipment-wise, for a hardware lab, I thought maybe it useful to start a thread for the basics (well some bits aren't that basic and ill highlight them when they appear)
First a disclaimer, this is my personal lab
I surround myself with super-intelligent people who are far better at this than me. I'm lucky in that they've educated me and we also have a friggin' amazing commercial lab in the office where I learned a lot.
Before you start building/hacking/prototyping anything, you need to ask yourself this simple one question:
What is it you want to achieve?
This sets the basis for the rest of the thread.
Do you want to extract firmware from ICs and memory?
Do you want to prototype stuff?
Arnaud Montagard's images of America are just to die for. They remind me of William Eggleston and do nothing to stop my desire to do a proper road trip from coast to coast avoiding the main roads.
As expected with such a compelling body of work, his first book is sold out and I'm a bit gutted but you snooze and you lose.