The Car Hacker’s Handbook

CERT-LatestNews ThreatsActivists ThreatsCybercrime ThreatsStrategic VulnerabilitiesAll VulnerabilitiesApplications VulnerabilitiesCrypto VulnerabilitiesFirmware VulnerabilitiesHardware VulnerabilitiesNetwork

When building or designing an automotive system, you should continue to drill down into as many complex processes as possible. Bring in the development team, and start discussing the methods and libraries used by each application so you can incorporate them into their own threat diagrams.