We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Car Hacking Village - Lojack'd pwning car alarms vehicle trackers

00:00

Formal Metadata

Title
Car Hacking Village - Lojack'd pwning car alarms vehicle trackers
Title of Series
Number of Parts
335
Author
License
CC Attribution 3.0 Unported:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Research by us has revealed direct CAN injection remote via APIs, which we intend to present the detail of live. Viper Alarms uses a back-end from CalAmp, the manufacturer of LoJack. We'll show how the LoJack vehicle tracking & recovery device could be compromised and recovery of a stolen vehicle prevented. This research lead us on to compromise of OEM-approved vehicle trackers and immobilisers. The rabbit hole went very deep indeed. This is a story of systemic compromise through weak platform providers and outsourced security.
Codierung <Programmierung>EncryptionInformation securityAdvanced Encryption Standard
Function (mathematics)Mobile WebSystem identificationParameter (computer programming)Avatar (2009 film)Real numberDisintegrationCAN busDevice driverSimulationDialectPersonal identification number
Linker (computing)Dependent and independent variablesAvatar (2009 film)System callShared memoryDevice driverEmailAmsterdam Ordnance DatumData modelCrash (computing)Software testingVideo trackingInformation securityData recoveryBit rateCurve fittingMobiles ProgrammExecution unitProcess (computing)PasswordMathematicsAddress spaceControl flowLoginDatabaseWebsiteAuthorizationPlastikkarte
Dew point
TrailEmailDependent and independent variablesTwitterOffice suiteGroup actionSocial softwareService (economics)