Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Exploiting Vulnerabilities in EV Charging Communications

DEFCONConference via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore critical security vulnerabilities in electric vehicle charging infrastructure through this 55-minute DEF CON 33 conference talk that examines attacks against widely-used EV charging protocols. Discover how researchers exploited flaws in power-line communication technologies that affect nearly all electric vehicles and charging stations, specifically targeting the QCA 7000 Homeplug modem series used in popular charging systems like CCS and NACS. Learn about multiple newly identified vulnerabilities in these modems that enable persistent denial of service attacks, and examine findings from a comprehensive study of EV chargers and vehicles that reveals widespread security weaknesses in current deployments. Understand practical real-world attack scenarios where HomePlug communication links can be hijacked to compromise EV charging communications, even from a distance, and gain insights into firmware reverse engineering techniques that can lead to code execution on these critical infrastructure components.

Syllabus

DEF CON 3 3 - Exploiting Vulns in EV Charging Comms - Jan Berens, Marcell Szakály, Sebastian Köhler

Taught by

DEFCONConference

Reviews

Start your review of Exploiting Vulnerabilities in EV Charging Communications

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.