Muutke küpsiste eelistusi

Offensive Automotive Cybersecurity: An engineering handbook for exploiting modern automotive platforms [Pehme köide]

  • Formaat: Paperback / softback, kõrgus x laius: 235x191 mm
  • Ilmumisaeg: 27-May-2026
  • Kirjastus: Packt Publishing Limited
  • ISBN-10: 1836648634
  • ISBN-13: 9781836648635
Teised raamatud teemal:
  • Pehme köide
  • Hind: 69,29 €
  • See raamat ei ole veel ilmunud. Raamatu kohalejõudmiseks kulub orienteeruvalt 3-4 nädalat peale raamatu väljaandmist.
  • Kogus:
  • Lisa ostukorvi
  • Tasuta tarne
  • Tellimisaeg 2-4 nädalat
  • Lisa soovinimekirja
  • Formaat: Paperback / softback, kõrgus x laius: 235x191 mm
  • Ilmumisaeg: 27-May-2026
  • Kirjastus: Packt Publishing Limited
  • ISBN-10: 1836648634
  • ISBN-13: 9781836648635
Teised raamatud teemal:
A comprehensive guide to automotive offensive security breaking down real-world exploitation starting from the vehicle backend, through high-performance ECUs down to the edge sensors to bridge the gap between defensive engineering and offensive security techniques.

Key Features

Understand how security weaknesses throughout the vehicle architecture enable exploitation Analyze real-world exploits on vehicle systems to master vehicle penetration testing Design resilient systems by adopting a proactive offensive mindset while applying the secure engineering lifecycle

Book DescriptionThe Engineering Handbook for Offensive Automotive Cybersecurity is your practical guide to understanding how modern automotive vulnerabilities are exploitedso you can build resilient defenses against proven attack methods. As vehicles evolve into software-defined systems, their expanding attack surface increases exposure to sophisticated threats. This book examines the entire connected vehicle ecosystemfrom cloud backends and wireless protocols to in-vehicle networks, HPCs, ECUs, and physical sensorsthrough an offensive security lens. Through a blend of theory and practice, you will learn to execute the full penetration testing lifecycle, encompassing active and passive reconnaissance, firmware reverse engineering, and the construction of complex attack chains. The book provides hands-on insights into exploiting memory corruption bugs in HPCs, abusing diagnostic protocols, and leveraging hardware-level vulnerabilities such as fault injection and side-channel leakage. These techniques are brought to life through detailed real-world case studies, including remote takeovers and exploits of well-known vehicle platforms. By the end of this book, youll be able to think like an adversary, uncover hidden risks before attackers do, apply secure-by-design principles, and implement layered defenses to reduce exploitable weaknesses. What you will learn

Explore the various layers of the vehicle architecture and their exploitable weaknesses Deconstruct real-world attack chains and understand attack patterns Navigate the challenges of balancing product needs with security risks Learn how to use advanced tools and techniques to uncover security weaknesses in your system Understand how high-performance ECUs and modern vehicle architectures create new attack surfaces Apply Secure by Design principles for building resilient vehicle security that is suitable for real-world threats

Who this book is forThis book is for cybersecurity professionals, automotive engineers, security testers, and researchers who want to understand and exploit vulnerabilities in modern vehicle systems. If you focus on building defenses but question whether they can withstand real-world attacks, this book is for you. It is especially valuable for practitioners seeking advanced offensive techniques to better secure their systems against emerging threats. You should have a basic understanding of cybersecurity, embedded systems, and networking concepts.
Table of Contents

Offensive Security Basics
Penetration Testing Phases
Building the Tool Arsenal
Attacking the Vehicle Backend
Attacking Wireless and Remote Attack Systems
Attacking in-vehicle Communication Protocols
Attacking the High Performance ECUs
Attacking vehicle embedded ECUs
Attacking sensors
A Path Forward
Dr. Ahmad MK Nasser is an automotive cybersecurity architect with over 25 years of experience in securing safety-critical systems. He started his career as a software engineer, building automotive network drivers, diagnostics protocols, and flash programming solutions. This naturally led him into the field of automotive cybersecurity, where he designed secure firmware solutions for various microcontrollers and SoCs, defined secure hardware and software architectures of embedded systems, and performed threat analysis of numerous vehicle architectures, ECUs, and smart sensors. His latest work is on securing software in High Performance Computers (HPCs) for software defined vehicles. Ahmad holds a B.S. and an M.S. in electrical and computer engineering from Wayne State University, as well as a Ph.D. in computer science from the University of Michigan in Dearborn. He is currently a senior manager and the lead security architect of DriveOS, NVIDIA's autonomous driving software platform. Dr. Dennis Kengo Oka is an automotive cybersecurity executive and strategist with more than 20 years of global experience in the automotive industry, focusing on secure software development and securing next-generation mobility systems. He holds a Ph.D. in automotive security from Chalmers University of Technology in Sweden. Dennis has led cybersecurity initiatives across the automotive product lifecycle, including remote diagnostics and over-the-air update security, and has contributed to industry standards, cybersecurity testing frameworks, and secure engineering practices. He has held senior and global leadership roles with leading automotive and cybersecurity organizations, including Volvo, Bosch Group (ESCRYPT), and Synopsys, and currently serves as Global Technical & Cybersecurity Advisor at IAV. Across these roles, he has supported OEMs and suppliers in advancing secure development practices and scalable cybersecurity architectures for software-defined and connected vehicle platforms. Dennis also serves on the advisory board of Block Harbor. He has authored more than 80 publications, including books and technical papers, and is a frequent invited speaker at international automotive and cybersecurity conferences. His latest books include Building Secure Cars: Assuring the Automotive Software Development Lifecycle (Wiley, 2021) and Building Secure Automotive IoT Applications: Developing Robust IoT Solutions for Next-Gen Automotive Software (Packt, 2024).