AutoSec Auto Safety Live Class on July 29 | China Automobile Data - Vulnerability Mining of Vehicle Information Interaction System and Introduction to Compliance Verification System

While the intelligent network connection technology makes the car a terminal of the Internet of Everything, massive amounts of data may be exposed to this network. Risks such as platform vulnerabilities, communication hijacking, and privacy leaks are very serious, and data security has also become the focus of public attention. With the rapid development of intelligent network technology, regulations and standards in the field of automotive network security are gradually being formulated. In April of this year, the Ministry of Industry and Information Technology released the "Guidelines for the Access Management of Intelligent Connected Automobile Manufacturers and Products (Trial)" for comments. In the same month, the National Information Security Standardization Technical Committee also released the draft standard of "Information Security Technology Safety Requirements for Collecting Data from Connected Vehicles". In May, the Cyberspace Administration of China, together with relevant departments, drafted the "Several Regulations on Automobile Data Security Management (Draft for Comment)" to continuously improve the management of automotive network security and strongly support automotive network security.

The in-vehicle information interaction system is an important node for the interaction between the in-vehicle ECU and the off-vehicle network. With the development of V2X, some in-vehicle information interaction systems also undertake the business of V2X communication terminals. With the drafting of automotive information security standards, the in-vehicle information interaction system software and communication protocols will become more and more standardized. Therefore, relevant suppliers of in-vehicle information interaction systems need to have standard compliance research and development capabilities, and at the same time understand the common vulnerability mining methods of hackers to further ensure the safety of cars on the road.

Focusing on the hot spots and pain points of the in-vehicle information interaction system, the AutoSec ​​car safety live broadcast course organized by TaasLabs continues to deliver high-quality content for everyone. In this issue, we are honored to invite Mr. Ning Yuqiao, senior technical manager of automotive information security of China Automobile Data, to share with you the topic of "Introduction to Vulnerability Discovery and Compliance Verification System of Vehicle Information Interaction System" on July 29.

【Speakers】

Ning Yuqiao Senior Technical Manager of Automotive Information Security

China Automotive Data Co., Ltd.

Ning Yuqiao, senior technical manager of the Network Technology Research Office of the Intelligent Network Department of China Automobile Data Co., Ltd., is mainly responsible for the research of automotive information security penetration testing technology and the development of automated testing tools. He has rich experience in security penetration. He has participated in the construction and operation of the China Automotive Industry Vulnerability Database (CAVD).

【the speech topic】

Vulnerability mining and compliance verification system introduction of vehicle information interaction system

【Key topic】

Introduction to Vehicle Information Interaction System

What standard compliance research and development capabilities should suppliers of in-vehicle information interaction systems possess?

Learn about common vulnerability mining methods for hackers

【Live Time】

July 29, 2021, 19:30-20:30

【way of participation】

Scan the QR code below

Add WeChat to the live broadcast group

Free live chat for a limited time

Guess you like

Origin blog.csdn.net/TaasLabs/article/details/119139919