Conference Program - escar USA 2023
Please note: The escar USA 2023 program is being developed. Following is the 2022 program as a reference.
Day 1: Wednesday, June 15, 2022 | |||
08:45 - 09:00 AM | Introduction and Welcome | ||
Invited talk | |||
09:00 - 09:45 AM |
Mitigating PLC4TRUCKS Remote Write
|
||
09:45 - 10:15 AM |
CANCAN: CAN-in-CAN Attack for Bypassing Security
|
||
10:15 - 10:40 AM | Coffee Break | ||
10:40 - 11:10 AM |
Electric Vehicle Charging Cybersecurity and Intrusion Detection
|
||
Invited talk | |||
11:10 - 11:55 AM |
Cyberattacks and Defenses for EV Charging
|
||
11:55 AM - 01:10 PM | Lunch Break | ||
01:10 - 01:20 PM |
University of Detroit Mercy Automotive Cybersecurity Programs |
||
01:20 - 01:50 PM |
Runtime Security of Virtualization Platform for Cockpit Domain Controller
|
||
Invited talk | |||
01:50 - 02:35 PM |
Securing Modern Vehicles with AUTOSAR
|
||
02:35 - 03:00 PM | Coffee Break | ||
03:00 - 03:30 PM |
V2V Security Standard in China |
||
|
|||
Invited talk | |||
03:30 - 04:15 PM |
Commonalities in Vehicle Vulnerabilities
|
||
Invited talk | |||
04:15 - 05:00 PM |
Crypto Vulnerabilities in Open Source Software |
||
|
|||
05:00 - 05:10 PM |
Day 1 Closing Remarks |
||
Day 2: Thursday, June 16, 2022 | |||
08:00 - 08:10 AM | Introduction and Welcome | ||
Invited talk | |||
08:10 - 08:55 AM |
Emulation-Driven Reverse Engineering
|
||
Invited talk | |||
08:55 - 09:40 AM |
Post-Quantum Security for the Automotive Industry
|
||
09:40 - 10:10 AM |
Risk Assessment based on ISO/SAE 21434:2021 – Experiences
|
||
10:10 - 10:35 AM | Coffee Break | ||
10:35 - 11:05 AM |
CANShield: Signal-based Intrusion Detection for Controller Area Networks |
||
|
|||
11:05 - 11:35 AM |
CANdid: A Stealthy Stepping-Stone Attack to Bypass Authentication on ECUs
|
||
11:35 AM - 12:35 PM | Lunch Break | ||
Invited talk | |||
12:35 - 01:20 PM |
Securing Autonomous Systems: A Perspective from Space Systems Cybersecurity |
||
|
|||
01:20 - 01:50 PM |
Securing the Software-Defined Vehicle: Challenges and Recommendations |
||
|
|||
01:50 - 02:15 PM | Coffee Break | ||
Invited talk | |||
02:15 - 03:00 PM |
Challenge of Security Models from Silicon to Software and System |
||
|
|||
Invited talk | |||
03:00 - 03:45 PM |
Trustworthy and Responsible AI |
||
|
|||
03:45 - 03:55 PM |
Day 2 Closing Remarks |
||
All times are EDT (Detroit, Michigan, USA)