Remote Exploitation Of An Unaltered Passenger Vehicle

This paper outlines the research into performing a remote attack against an unaltered 2014 Jeep Cherokee and similar vehicles that results in physical control of some aspects of the vehicle. Hopefully this additional remote attack research can pave the road for more secure connected cars in our future by providing this detailed information to security researchers, automotive manufacturers, automotive suppliers, and consumers.


MD5 | 8ef1c05f03804965a8e0959a7cddb361


Related Posts