#HITB2023HKT D1T1 - Extracting Info From Automotive Internet Units - A. Kondikov & Y. Serdyuk
Almost all modern cars have a connection to the Internet.
Usually, Internet access is provided by a separate module that has a built-in eSIM and is connected to the cellular network and the vast majority of these modules are based on SoC from Qualcomm’s MDM series of processors. In this talk we will cover the different techniques which can be used to extract the firmware from these modules, as well as how to properly analyze the resulting image and work with the file system.
If you want to learn how to extract info from a car’s automotive unit, this talk is for you.
===
Lead security researcher and reverse engineer at Navinfo Europe. His areas of interest include embedded/automotive hardware and software reverse engineering as well as hunting down 0-day vulnerabilities. During his career, he has participated in CTF competitions as a member of the fargate/TeamVolk team. Alexey is currently part of the cyber security team at Navinfo Europe focused on hacking connected cars.
---
I am a Reverse Engineer with solid experience of more than twelve years. Reverse engineering is my hobby and work. My focus on reverse engineering is proprietary network protocols and the format of data. I went the big way from reverse engineering malware to reverse engineering industrial control systems and embedded systems. Now my focus is on modern electrical cars, vulnerability findings, and exploit development.
1 view
1811
506
1 year ago 00:32:36 1
#HITB2023HKT D1T1 - Extracting Info From Automotive Internet Units - A. Kondikov & Y. Serdyuk