Yoshi kohno car hack




















The UW engineers are international leaders in addressing problems others haven't considered and helping guide the direction of the entire field. Their findings have driven security improvements in cars, medical devices, electronic voting machines and online browsing. The lab's work is increasingly influential as computers are installed in countless everyday devices, making users' lives better and easier, but also putting them at risk for identity theft and even physical harm.

This year alone, more than security breaches have compromised more than million records kept by credit card and insurance companies, hospitals, government agencies and others. To combat these and other cyber threats, Kohno and Roesner investigate ways that people can co-opt a computerized product or use online information, warping it into something never intended. Take the car example: The UW researchers, in partnership with alumni Alexei Czeskis and Karl Koscher and computer scientists from the University of California at San Diego, were curious about the security of modern vehicles and their computerized systems.

So the teams at each university bought cars and plugged their computers into the vehicles' computers to see if they could decode, and ultimately hijack, the cars' software. They did it by listening as the computer systems talked to each other. Then, he said, you "try to repeat things, and see if you get the same reaction. Once the engineers figured out how to talk to the cars' computers and manipulate their functions while plugged in, they moved to the next phase: controlling the cars remotely.

The researchers identified a number of digital entry points including Bluetooth cell-phone devices, satellite radio signals and a cellular network that allows users such as dealerships to communicate with cars Through the cell network, they demonstrated that they could remotely take control of the car and drive them.

But up to that point, the carmakers hadn't thought to install systems that would make it difficult. That's no longer the case. Kohno, and W. Maisel and T. New England Journal of Medicine, 13 , April Juels, V. Brajkovic, and T. Lee, K. Fu, T. Heart Rhythm Journal, 6 10 , October Denning, C. Matuszek, K. Smith, and T. Gardner, M. Bishop, and T. Levy, and H.

Outstanding Student Paper Award. Raghavan, T. Snoeren, and D. Privacy Enhancing Technologies Symposium, August , Neurosecurity: Security and Privacy for Neural Devices.

Denning, Y. Matsuoka, and T. Neurosurgical Focus, July Bellare, T. Lucks, N. Schneier, D. Whiting, J. Callas, and J. Everitt, T. Bragin, J. Czeskis, K. Koscher, M. Andrews, N. Grey, B. Czeskis and K. Koscher and J. Smith and T. Jung, A. Sheth, B. Greenstein, D. Wetherall, G. Maganis, and T. Lee, B. Ransford, K. Circulation, 18 Supplement , October Ferguson, S. Lucks, B. Whiting, M. Document revised September Ristenpart, G.

Maganis, A. Krishnamurthy, and T. Denning, K. Fu, and T. Hilaire, K. Koscher, S. Kohno, and B. Piatek, T. McCoy, K. Bauer, D. Grunwald, T. Searchable encryption revisited: Consistency properties, relation to anonymous IBE, and extensions. Abdalla, M.

Bellare, D. Catalano, E. Kiltz, T. Kohno, T. Lange, J. Malone-Lee, G. Neven, P. Paillier, and H. Journal of Cryptology, 21 3 , July McCoy, J. Pang, T. Seshan, and D. MobiSys, June , Best Paper Award. Halperin, T. Heydt-Benjamin, B. Ransford, S. Clark, B. Defend, W. Morgan, K. Outstanding Paper Award. Reis, S. Kohno, and N. Heydt-Benjamin, K. Kriplean, E. Welbourne, N. Khoussainova, V. Rastogi, M. Balazinska, G.

Borriello, T. Low-resource Routing Attacks Against Tor. McCoy, D. Workshop on Privacy in the Electronic Society, October 29, Rastogi, E.

Khoussainova, T. Kriplean, M. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Usenix Security, August , Gardner, A. Yasinsac, M. Bishop, T. Kohno, Z. Hartley, J.

Kerski, D. Gainey, R. Walega, E. Hollander, and M. Report commissioned by the Florida Department of State, July Protecting Privacy in the Wireless Era. Greenstein, R. Gummadi, J. Pang, M. Chen, T. Kohno, and V. Designing voting machines for verification. Sastry, T. Usenix Security, July August 4, Herding hash functions and the Nostradamus attack. Kelsey and T. Molnar, T. Kohno, N. Sastry, and D. Key regression: Enabling efficient key distribution for secure distributed storage.

Fu, S. Kamara, and T. SSH transport layer encryption modes. Kohno, and C. Remote physical device fingerprinting. Broido, and K. Broido, and k. Congressional Testimony. Analysis of an electronic voting system. Stubblefield, A. Rubin, and D. Bellare and T. New security proofs for the 3GPP confidentiality and integrity algorithms.

Iwata and T. Fast Software Encryption, February , CWC: A high-performance conventional authenticated encryption mode.

Viega, and D. Analysis of RMAC. Knudsen and T. Helix: Fast encryption and authentication in a single cryptographic primitive. Ferguson, D. Whiting, B. Schneier, J.

Kelsey, S. Lucks, and T. Token-based scanning for source code security problems. Viega, J. Bloch, T. Kohno, and G. Kohno and M.

Trust and mistrust in secure applications. Viega, T. Communications of the ACM, 44 2 , February A network-flow-based scheduler: Design, performance history and experimental analysis. Gabow and T. Bloch, Y. Kelsey, D. Whiting, D. Wagner, C. Hall, N. Ferguson, T. Search for:. Follow csenews on Twitter Get Email Notifications. Published by Kristin Osborne on July 24,



0コメント

  • 1000 / 1000