- This event has passed.
GRIMM Automotive Security Training
June 24, 2019 @ 9:00 am - June 28, 2019 @ 5:00 pm$4,000
WMCAT is proud to sponsor GRIMM’s 5-Day Automotive Security Workshop June 24-28, 2019!
In this course, participants will gain an understanding of the automotive cybersecurity threat-landscape from an attackers perspective. Automotive attack surfaces will be highlighted, with a focus on attack techniques to provide insight into creating better defensive designs. In addition to traditional course lectures, the attendee will benefit from hands-on offensive exercises in a lab environment. These exercises will ensure each student cements their new-found comprehension of real-world exploitation. Participants will enhance their abilities to integrate defensive security measures into their vehicle networks.
This 5-day course will expose each student to the attacker’s perspective of automotive security. Each day the student will have hands-on labs to complement the day’s lecture. During this week students will learn to develop strategies for minimizing attack surfaces and creating designs that are more resistant to security breaches. They will leave the course knowing:
Building on Real-World examples, students will gain hands-on experience and classroom details of many currently-deployed security problems — and how to detect, avoid, and fix them — including:
And the basics of Reverse Engineering of Hardware and Software to make it all real.
- Approach to Secure Design Thinking
- CAN Tools and Low-Level Interactions
- ISO-TP Details
- Interactive UDS
- J2534, Software Updates, and ECU Configuration
- Introduction to Hardware Reverse Engineering
- Remote Code Execution
- FlexRay, LIN, and other modern communication Details
- Infotainment Flaws and Remedies
- Telematics Attack Surface and Current Design Flaws
- J1939 and CAN
- Supply Chain Woes and Guidance
- Automotive Risk Assessment
- Remote Keyless Entry and Passive/Proximity Key Problems
- Introduction to Software Reverse Engineering
- Vehicle to Everything (V2X) Attack Surface and Methods
- Automotive Ethernet
- Capture The Flag!
Who Should Attend:
- Mechanical / Electrical / Systems Automotive Engineers
- Computer Science / Networking Professionals interested in exploring Automotive Security
Note: GRIMM’s trainers strive to accommodate students with all levels of technical knowledge. However, students with some technical background and knowledge of automotive technologies will excel at the hands-on lab activities incorporated into the course.
Additionally, several of the tools used will be learned more easily by students with an understanding of a programming language(s).
Students need to bring a laptop capable of running the VirtualBox virtualization software (Windows/Linux/Mac, no Chromebooks).
All other necessary material will be provided by GRIMM.
West Michigan Center for Arts + Technology (WMCAT)
614 First St NW, Suite 300
Grand Rapids, MI 49504
WMCAT is located at the corner of First St NW and Seward Ave NW.
WMCAT is the entire third floor of the building.
There is a ramp connected to the building (fee to park, not managed by WMCAT). Enter the ramp on Seward Ave NW (just south of First St) and go straight up to the second floor. There is an entrance to the building on the northeast corner of the second floor of the ramp. Enter here, follow the WMCAT signs, and take the stairs or elevator up to third floor.
There is limited street parking on First St NW and Seward Ave NW (some spaces metered and some not).
There are DASH lots on Seward Ave NW near Lake Michigan Drive ($2 a day).
Also, if attendees are coming from within downtown offices they can ride the DASH bus for free. The DASH West route drops off at Bridge St NW and Seward Ave NW, very close to our building. DASH Route
If parking on street, DASH lot or taking the DASH, enter building at main entrance on First St NW and take elevator or stairs up to third floor.