Table of Contents:
  • Policies and guidelines
  • Threat modeling
  • Vehicle communications
  • Utilizing the Linux SocketCAN interface
  • Diagnostic communications
  • CAN Bus RE
  • ECU hacking
  • ECU test benches
  • Infotainment systems
  • Vehicle to vehicle
  • Weaponizing
  • TPMS
  • Keysystems
  • Hotwiring
  • Embedded system attack
  • Performance tuning
  • Includes bibliographical references and index