با برنامه Player FM !
MitM Attacks on SOME/IP Protocol - PlaxidityX Ep 10
Manage episode 455628574 series 3607667
Automotive networks face an alarming threat: Man-in-the-Middle (MITM) attacks exploiting the SOME/IP protocol. This episode explores how attackers intercept and manipulate communications between ECUs using in-vehicle Ethernet networks, enabling them to falsify data, disrupt services, and compromise safety.
We outline the attack setup, flow, and the devastating impacts on vehicle behavior, from denial of service to user information disclosure. Using real-world examples, we show how attackers exploit vulnerabilities in SOME/IP Service Discovery mechanisms to gain control.
Tune in to learn how proactive automotive cybersecurity measures are shaping the future of connected vehicles and protecting against the growing threat of SOME/IP protocol hijacks.
Chapters:
(00:00) Introduction to MitM Attacks on SOME/IP Protocol
(01:44) Background to SOME/IP and Service Discovery
(02:51) Reference Attack Setup
(03:24) MitM Attack Flow
(05:30) Attack Mitigation
(06:44) The Role of the SOME\IP in the E/E Architecture
(08:08) Outro of MitM Attacks on SOME/IP Protocol Episode
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
19 قسمت
Manage episode 455628574 series 3607667
Automotive networks face an alarming threat: Man-in-the-Middle (MITM) attacks exploiting the SOME/IP protocol. This episode explores how attackers intercept and manipulate communications between ECUs using in-vehicle Ethernet networks, enabling them to falsify data, disrupt services, and compromise safety.
We outline the attack setup, flow, and the devastating impacts on vehicle behavior, from denial of service to user information disclosure. Using real-world examples, we show how attackers exploit vulnerabilities in SOME/IP Service Discovery mechanisms to gain control.
Tune in to learn how proactive automotive cybersecurity measures are shaping the future of connected vehicles and protecting against the growing threat of SOME/IP protocol hijacks.
Chapters:
(00:00) Introduction to MitM Attacks on SOME/IP Protocol
(01:44) Background to SOME/IP and Service Discovery
(02:51) Reference Attack Setup
(03:24) MitM Attack Flow
(05:30) Attack Mitigation
(06:44) The Role of the SOME\IP in the E/E Architecture
(08:08) Outro of MitM Attacks on SOME/IP Protocol Episode
Contact us:
https://www.linkedin.com/company/plaxidityx/
https://www.youtube.com/@PlaxidityX
contact@plaxidityx.com
19 قسمت
Kaikki jaksot
×به Player FM خوش آمدید!
Player FM در سراسر وب را برای یافتن پادکست های با کیفیت اسکن می کند تا همین الان لذت ببرید. این بهترین برنامه ی پادکست است که در اندروید، آیفون و وب کار می کند. ثبت نام کنید تا اشتراک های شما در بین دستگاه های مختلف همگام سازی شود.