From mboxrd@z Thu Jan 1 00:00:00 1970 From: Sven Geggus Subject: OT: Comprehensive Experimental Analyses of Automotive Attack Surfaces Date: Fri, 13 Jan 2012 09:35:26 +0000 (UTC) Message-ID: Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: QUOTED-PRINTABLE Return-path: Received: from mail.gnuher.de ([78.47.12.54]:41632 "EHLO mail.gnuher.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752610Ab2AMJyU (ORCPT ); Fri, 13 Jan 2012 04:54:20 -0500 Received: from ultimate100.geggus.net ([2a01:198:297:1::1]) by mail.gnuher.de (envelope-from ) with esmtpsa (TLS1.0:RSA_AES_256_CBC_SHA1:32) (Exim 4.72) id 1RldXl-0003cr-Aw for linux-can@vger.kernel.org; Fri, 13 Jan 2012 10:35:29 +0100 Received: from news by ultimate100.geggus.net (envelope-from ) with local (Exim 4.72) id 1RldXi-0000wi-P9 for linux-can@vger.kernel.org; Fri, 13 Jan 2012 10:35:26 +0100 Sender: linux-can-owner@vger.kernel.org List-ID: To: linux-can@vger.kernel.org While not particular a CANbus topic (at least not only) but probably of interest to subscribers of this list anyway: http://www.autosec.org/pubs/cars-usenixsec2011.pdf At least the vulnerable "PassThru" device is almost certainly using Lin= ux CAN stack which is of course not the cause of the security problem ;) Regards Sven --=20 Unix is simple and coherent, but it takes a genius =E2=80=93 or at any = rate a programmer =E2=80=93 to understand and appreciate the simplicity (Dennis M. Ritchie) /me is giggls@ircnet, http://sven.gegg.us/ on the Web