Security researchers attending the Pwn2Own CanSecWest security conference this March in Vancouver, Canada, will be incentivized to hack a Tesla Model 3 car.
Researchers will be able to win prizes ranging from $35,000 to $300,000, depending on the exploits they use and the car systems they target.
Participants will be challenged to gain code execution rights on car components like the modem, tuner, WiFi, Bluetooth, autopilot, gateway, or VCSEC systems.
A successful exploit must start a communications channel with a rogue base station or other malicious organization.
Researchers also can compete to achieve code execution privileges on the car's infotainment system and browse malicious content.
Another competition will give researchers the opportunity to target Tesla's key fob and phone-as-key protocols and perform code execution, unlock doors, or start the car.
View Full Article
Abstracts Copyright © 2019 SmithBucklin, Washington, DC, USA
No entries found