Conference Program - escar USA 2022
Tuesday, June 14, 2022, 6:00 PM - 8:00 PM
Casual get-together at the Roy E. Wilbanks Golf Clubhouse at the Eagle Crest Golf Club (located adjacent/within
walking distance from hotel).
The cost for this optional event is included in the escar registration cost, but you will need to indicate your
interest when prompted in the event registration process.
Day 1: Wednesday, June 15, 2022 | |||
08:45 - 09:00 AM | Introduction and Welcome | ||
Invited talk | |||
09:00 - 09:45 AM |
Mitigating PLC4TRUCKS Remote Write
|
||
|
|||
Session I | |||
09:45 - 10:15 AM |
CANCAN: Encapsulation of CAN-FD Messages for Circumvention of Security Measures
|
||
|
|||
10:15 - 10:40 AM | Coffee Break | ||
|
|||
Session II | |||
10:40 - 11:10 AM |
Electric Vehicle Charging Cybersecurity and Intrusion Detection
|
||
Invited talk | |||
11:10 - 11:55 AM |
Cyberattack and Defense for EV Charging
|
||
|
|||
11:55 AM - 01:10 PM | Lunch Break | ||
|
|||
01:10 - 01:20 PM |
University of Detroit Mercy Automotive Cybersecurity Programs |
||
|
|||
Session III | |||
01:20 - 01:50 PM |
Runtime Security of Virtualization Platform for Cockpit Domain Controller
|
||
Invited talk | |||
01:50 - 02:35 PM |
Securing Modern Vehicles with AUTOSAR
|
||
|
|||
02:35 - 03:00 PM | Coffee Break | ||
|
|||
Session IV | |||
03:00 - 03:30 PM |
V2V Security Standard in China
|
||
|
|||
Invited talk | |||
03:30 - 04:15 PM |
Commonalities in Vehicle Vulnerabilities
|
||
Invited talk | |||
04:15 - 05:00 PM |
Crypto Vulnerabilities in Open Source Software |
||
|
|||
|
|||
05:00 - 05:10 PM |
Day 1 Closing Remarks |
||
Day 2: Thursday, June 16, 2022 | |||
08:00 - 08:10 AM | Introduction and Welcome | ||
Invited talk | |||
08:10 - 08:55 AM |
Trustworthy and Responsible AI
|
||
Invited talk | |||
08:55 - 09:40 AM |
Post-Quantum Security for the Automotive Industry
|
||
|
|||
Session I | |||
09:40 - 10:10 AM |
Risk Assessment based on ISO/SAE 21434:2021 – Experiences
|
||
|
|||
10:10 - 10:35 AM | Coffee Break | ||
|
|||
Session II | |||
10:35 - 11:05 AM |
CANShield: Signal-based Intrusion Detection for Controller Area Networks
|
||
|
|||
|
|||
11:05 - 11:35 AM |
CANdid: A Stealthy Stepping-Stone Attack to Bypass Authentication on ECUs
|
||
|
|||
11:35 AM - 12:35 PM | Lunch Break | ||
Invited talk | |||
12:35 - 01:20 PM |
Securing Autonomous Systems: A Perspective from Space Systems Cybersecurity |
||
|
|||
|
|||
Session III | |||
01:20 - 01:50 PM |
Securing the Software-Defined Vehicle: Challenges and Recommendations |
||
|
|||
|
|||
01:50 - 02:15 PM | Coffee Break | ||
Invited talk | |||
02:15 - 03:00 PM |
Challenge of Security Models from Silicon to Software and System |
||
|
|||
Invited talk | |||
03:00 - 03:45 PM |
Emulation-Driven Reverse Engineering |
||
|
|||
|
|||
03:45 - 03:55 PM |
Day 2 Closing Remarks |
||
All times are EDT (Detroit, Michigan, USA)