Case Study : Smart Vehicle Safety Control
- Steven Chang
- Dec 28, 2020
- 2 min read
Updated: Jun 24

Last month, China's Tencent Keen Security Lab exploited a security vulnerability in Tesla's Android system, successfully gaining remote control over the Tesla CAN BUS network. They managed to abruptly apply the brakes while the vehicle was moving at high speed. This incident caused a sensation in the autonomous driving industry.
In reality, such events are inevitable. Open-source systems will always have vulnerabilities and bugs. However, open-source technology also brings many benefits, so there is no need to completely shut it down.
上個月,中國騰訊柯恩安全實驗室。利用了 Tesla android 安全漏洞。成功的遠程控制了Tesla CAN BUS 網路。讓他在高速行進間。急踩煞車。這個案例轟動了整個無人駕駛領域。
實際上是必然的事情.開源讓系統永遠會有漏洞與Bug。開源給我們帶來好處,不需要把他封閉。
By simply adding an ISDNA hardware firewall between the Tesla multimedia communication module and the Tesla CAN BUS network, your Tesla will be fully protected, preventing this type of security attack.
In the future, using Android or iOS as a multimedia communication platform will be inevitable. However, with our solution, the public can rest assured. Even if vulnerabilities exist, we will provide protection against similar threats.
With our security measures in place, your Tesla will no longer face safety issues. The most attackers could do is launch a remote DDoS attack. The only entities capable of controlling your Tesla would be your own smartphone and backend system.
If we install an iSDNA hardware firewall between the Tesla communication module and the Tesla CAN bus network, this security threat can be effectively prevented.
只需要在Tesla 多媒體通訊模組與 TeslaCAN BUS 網路 中間加入了ㄧ組 ISDNA 硬件防火牆。他就會保障你的特施拉。阻止這次的不安全的攻擊。未來。Android / iOS 當多媒體通訊載台是必然的。但是只需要我們方案。就可以讓社會大眾放心。即使有漏洞。類似的事情由我們保護著。
有了我們的保護。你的 Tesla 再也不會有安全問題了。他們最多可以做的只有遠程 DDos。 能控制Tesla的只後你的手機與後台系統。



Comments