言語:英語 仕様:ソフトカバー 寸法:15 × 20.8 cm 定価: ISBN:9780990490104
As vehicles have evolved they have become more and more connected. The newer systems have more electronics and are more connected to the outside world than ever before. Vehicles use internal networks that are connected to wireless systems. Many cars include internet capabilities, WiFi, bluetooth and more. These are all potential attack vectors that could jeopardize the safety and security of the vehicle. This book teaches you the same techniques used to audit complex IT infrastructures and applies them to modern day vehicles. After reading this book you will be able to assess a car to determine security weaknesses in it's design. The book is broken down to different section involving different types of attacks of each component of the vehicle. You can read the whole thing or just jump to the areas that interest you. This book focuses on the tricks and techniques used to analyze any vehicle. It is not a recipe book for specific models. This allows the techniques to be applied to any vehicle. The book does not require previous knowledge of mechanics but instead focuses more on the computer science areas of attacks. Embedded system research, network analysis and wireless communications are a large focus on developing attacks. If you are a mechanic, security researcher, concerned citizen or in charge of security reviews for an automotive company, this manual will guide you and provide a great reference. Small enough to fit into your glove box or leave around your hackerspace. This book is a product of the OpenGarages research and is also licensed under Creative Commons license which can be shared for free. See the OpenGarages.org website for more information.
言語:英語
仕様:ソフトカバー
寸法:15 × 20.8 cm
定価:
ISBN:9780990490104
As vehicles have evolved they have become more and more connected. The newer systems have more electronics and are more connected to the outside world than ever before. Vehicles use internal networks that are connected to wireless systems. Many cars include internet capabilities, WiFi, bluetooth and more. These are all potential attack vectors that could jeopardize the safety and security of the vehicle. This book teaches you the same techniques used to audit complex IT infrastructures and applies them to modern day vehicles. After reading this book you will be able to assess a car to determine security weaknesses in it's design. The book is broken down to different section involving different types of attacks of each component of the vehicle. You can read the whole thing or just jump to the areas that interest you. This book focuses on the tricks and techniques used to analyze any vehicle. It is not a recipe book for specific models. This allows the techniques to be applied to any vehicle. The book does not require previous knowledge of mechanics but instead focuses more on the computer science areas of attacks. Embedded system research, network analysis and wireless communications are a large focus on developing attacks. If you are a mechanic, security researcher, concerned citizen or in charge of security reviews for an automotive company, this manual will guide you and provide a great reference. Small enough to fit into your glove box or leave around your hackerspace. This book is a product of the OpenGarages research and is also licensed under Creative Commons license which can be shared for free. See the OpenGarages.org website for more information.
車両は進化するにつれて、ますますコネクテッド化が進んでいます。車両は、無線システムに接続された内部ネットワークを使用します。これらはすべて、車両の安全性とセキュリティを危険にさらす可能性のある潜在的な攻撃ベクトルです。この本を読むと、自動車を評価して、その設計におけるセキュリティ上の弱点を特定できるようになります。全体を読むことも、興味のあるエリアにジャンプすることもできます。特定の機種に特化したレシピ本ではありません。この本では力学に関する事前の知識は必要ありませんが、代わりに攻撃のコンピューター サイエンス分野に重点を置いています。あなたが整備士、セキュリティ研究者、関係者、あるいは自動車会社のセキュリティレビュー担当者であれば、このマニュアルは大いに参考になるでしょう。この本は OpenGarages の研究の成果であり、クリエイティブ コモンズ ライセンスに基づいてライセンスされており、無料で共有できます。
(この宣伝文は発売当時のものをそのままGoogle翻訳したものです。ほとんどはマーカーペンやボールペンのアンダーラインですが、1ヵ所だけ文字もあります。
【管理用】
9624Y4036