Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

PIBuster - Exploiting a Common Misconfiguration in CCS EV Chargers

USENIX via YouTube

Overview

Coursera Flash Sale
40% Off Coursera Plus for 3 Months!
Grab it
Explore a critical security vulnerability in electric vehicle charging infrastructure through this 10-minute conference presentation from VehicleSec '25. Learn about PIBuster, a newly discovered attack vector that targets Qualcomm HomePlug GreenPHY modems commonly used in Combined Charging System (CCS) chargers and vehicles. Discover how researchers from the University of Oxford identified a widespread misconfiguration in the Parameter Information Block (PIB) that enables attackers to overwrite critical modem configurations. Examine the methodology used to create a safe laboratory testbed for evaluating PIB security and understand the specific conditions that make this attack possible. Review findings from a comprehensive analysis of 69 real-world EV charging stations, revealing that 41 exhibited the vulnerable configuration. Understand the implications of this high-impact attack that can cause persistent denial of service requiring hardware replacement to resolve, highlighting significant security concerns in the rapidly expanding EV charging infrastructure.

Syllabus

VehicleSec '25 - Short: PIBuster: Exploiting a Common Misconfiguration in CCS EV Chargers

Taught by

USENIX

Reviews

Start your review of PIBuster - Exploiting a Common Misconfiguration in CCS EV Chargers

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.