First Pwn2Own Car Competition Goals and Prizes Announced

b08492e5ffa6ff5ea07b51a4c258486e.gif Focus on source code security and collect the latest information at home and abroad!

Compiled by: Code Guard

ZDI will host the first Pwn2Own competition focusing on automotive systems at the Global Automotive Conference in Tokyo, Japan, from January 24 to 26, 2024. ZDI announced the competition goals and prize money today. The three main goals of the competition include:

1. Provide a place to encourage automotive research. Researchers can submit vulnerability reports targeting a variety of products and platforms and receive financial rewards.

2. Incentivize manufacturers to participate in the security research community. Connect the global community of security researchers with automakers to improve vehicle safety and resiliency.

3. Focus on automotive sub-components. I hope everyone will focus on the complex systems that make up the modern automotive ecosystem rather than the car as a microcontroller.

9bcb3d0d8eb30fdc84e442015639e463.png

Tesla is a partner of the competition. ChargePoint will provide the electric vehicle charging piles used in the competition. Researchers from VicOne will assist in determining the target's attack surface for electric vehicles and provide technical guidance. The tournament’s cash and bounty pool ends at $1 million. This competition allows remote participation. Players need to register before January 18, 2024 and provide a white paper explaining the utilization chain and how to operate it at the end of the registration. Like previous competitions, the order of entry will be determined by drawing lots.

The competition is divided into four categories:

  • Tesla

  • In-vehicle entertainment system (IVI)

  • Electric vehicle charging pile

  • operating system

acd1e1999ce7cc7c59f019518369f5d9.png

Tesla Category

In 2019, the Pwn2Own Contest introduced a car category for the first time, and this Pwn2Own Car Contest will cover similar content. Entrants register for Tesla Model 3/Y (Ryzen-based) or Tesla S/X (Ryzen-based) equivalent desktop devices. It's also important to note that while a Tesla is one of the prizes, not all successful attempts will win a Tesla. While some goals offer additional options, to drive a Tesla, contestants will need to target the "Vehicle Included" goal category in the table.

629d227a936b8cbc337d217a704b9e41.png

Below is additional information about optional extras included in the target.

5b25869f8979062fb8871cace68b0faa.png

Players planning to participate in this category need to notify ZDI two weeks before the competition in order to coordinate hardware resources.

d3c5fe7951a9bd8eb77793834caba44d.png

In-Vehicle Infotainment (IVI) Category

When looking at objects in a car system, the first thing that comes to mind is the in-vehicle infotainment (IVI) system, which can act like a radio and connect to your phone, but it can also do much more. Navigation, in-car Internet and WiFi are all provided through these devices, which can also be connected to other vehicle systems through the CAN bus, which makes IVI a target for attackers. These devices also modify existing vehicles to have modern capabilities and possibly modern vulnerabilities. This Pwn2Own car competition will provide three IVIs as target devices. Attempts in this category must target exposed services or communications protocols/physical interfaces accessible to ordinary users.

5bbe995618c5cf6f76ed4f8f50daf8bd.png

198be7c9f31830412c225212c570f09c.png

Electric charging pile category

While there is plenty of research on electric vehicles, the same cannot be said for the review of the ones we plugged into. Attack surfaces such as mobile applications, BLE connections, and OCPP protocols can allow threat actors to cause damage to electric vehicles. This competition will provide six different electric vehicle charging piles. Attack attempts must target the target's exposed services or the target's communication protocols/physical interfaces that are accessible to ordinary users.

82b4edbdc47322379e344e2b8d6a4471.png

84e618c7cd151e2e82084d8da5884a4b.png

operating system

Most people don't think about the operating systems in their cars, but if you drive a recently released Mercedes-Benz, Subaru, Mazda or Toyota, there's a good chance that these vehicles have an automotive-grade Linux system installed on them. How do these online operating systems compare to desktop operating systems? This is what the competition is about to discover. Attempts in this category must target the service/feature that is being exposed, or a communication protocol that is accessible to ordinary users.

4c493a7c536b01c74a2b8f721c86b0e0.png

More details can be found in the original article.

Code Guard trial address: https://codesafe.qianxin.com

Open source guard trial address: https://oss.qianxin.com


Recommended reading

Pwn2Own 2023 Toronto Contest Goals and Prizes Released

Mikrotik finally fixes RouterOS vulnerability in Pwn2Own competition

VMware fixes two critical 0days discovered at Pwn2Own contest

Pwn2Own 2023 Vancouver Contest Ends and Master of Pwn is Born

Pwn2Own 2023 Miami Competition Master of Pwn is born

Original link

https://www.zerodayinitiative.com/blog/2023/8/28/revealing-the-targets-and-rules-for-the-first-pwn2own-automotive

Title image: Pixabay License

This article was compiled by Qi Anxin and does not represent the views of Qi Anxin. Please indicate "Reprinted from Qianxin Code Guard https://codesafe.qianxin.com" when reprinting.

fe711f03ae43241baa60bbc79b575808.jpeg

54da1ca32b40f91b961ad86b03a83b6e.jpeg

Qi Anxin code guard (codesafe)

The first domestic product line focusing on software development security.

   3f4f7801869acf55d234a80787faa2b8.gif If you think it’s good, just click “Looking” or “Like”~

Guess you like

Origin blog.csdn.net/smellycat000/article/details/132595255