Policies and guidelines -- Threat modeling -- Vehicle communications -- Utilizing the Linux SocketCAN interface -- Diagnostic communications -- CAN Bus RE -- ECU hacking -- ECU test benches -- Infotainment systems -- Vehicle to vehicle -- Weaponizing -- TPMS -- Keysystems -- Hotwiring -- Embedded system attack -- Performance tuning
Summary
If you're curious about automotive security and have the urge to hack a two-ton computer, this detailed resource will give you a deeper understanding of the computer systems and embedded software in modern vehicles. -- Edited summary from book
Bibliography
Includes bibliographical references and index
Notes
Online resource; title from title page (viewed March 24, 2016)