The complexity of vehicle cybersecurity seems to be increasing at an ever-accelerating pace. With the electrification of transportation, the adoption of AI, and new regulations and standards, “secure by design” seems to be moving out of reach. How can we navigate this complex realm and make actual progress? What does the industry need to focus on? What can academia do to help advance the state of the possible? Join us as we explore some answers to these important questions.

Speaker's Biography: Urban conducted some of the first research into heavy vehicle cybersecurity in 2014 and wrote one of the first papers on the subject in 2015. While at NMFTA, Urban founded and ran the heavy vehicle cybersecurity / commercial transportation security and research program. With over thirty-five years of experience, Urban is a hands-on technologist and leader. He has a successful track record of understanding, analyzing, mapping, and providing solutions for complex systems. Urban maintains several vehicle cybersecurity advisory roles, including technical support to SAE International standards committees, a Technology & Maintenance Council (TMC) S.5 and S.12 Study Group Member, ESCAR USA Conference Program Committee, CyberTruck Challenge Board Member and Speaker, and a Transportation Cybersecurity Subject Matter Expert for FBI InfraGard and FBI Automotive Sector Specific Working Group.

View More Papers

WIP: Shadow Hack: Adversarial Shadow Attack Against LiDAR Object...

Ryunosuke Kobayashi, Kazuki Nomoto, Yuna Tanaka, Go Tsuruoka (Waseda University), Tatsuya Mori (Waseda University/NICT/RIKEN)

Read More

Secure Multiparty Computation of Threshold Signatures Made More Efficient

Harry W. H. Wong (The Chinese University of Hong Kong), Jack P. K. Ma (The Chinese University of Hong Kong), Sherman S. M. Chow (The Chinese University of Hong Kong)

Read More

File Hijacking Vulnerability: The Elephant in the Room

Chendong Yu (Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences), Yang Xiao (Institute of Information Engineering, Chinese Academy of Sciences and School of Cyber Security, University of Chinese Academy of Sciences), Jie Lu (Institute of Computing Technology of the Chinese Academy of Sciences), Yuekang…

Read More

Why People Still Fall for Phishing Emails: An Empirical...

Asangi Jayatilaka (Centre for Research on Engineering Software Technologies (CREST), The University of Adelaide, School of Computing Technologies, RMIT University), Nalin Asanka Gamagedara Arachchilage (School of Computer Science, The University of Auckland), M. Ali Babar (Centre for Research on Engineering Software Technologies (CREST), The University of Adelaide)

Read More