GRIMM, a leader in security engineering, is ramping up its Michigan team as the automotive industry continues to seek security help.
Automobiles make up a large part of the Internet of Things, which means vulnerabilities provide hackers an opportunity to prove vehicles are unsafe — in part because today, nearly every car is Internet-connected and doesn’t require physical access to attack. From controlling the steering, accelerating, braking, and communications, this presents an extremely large attack surface. As automotive original equipment manufacturers (OEM) and their Tier 1 direct suppliers have become more aware of the threat, their need for end-to-end hardware and software vulnerability assessments has grown. Later this year, GRIMM will break ground on an innovative car-hacking lab in Michigan. The Lab will have a combination of hardware and software tool sets found in automotive, aviation, and industrial control systems. It will also have classroom training space where GRIMM experts will teach hands-on advanced courseware for automotive and ICS security.
Next week, GRIMM will co-chair the first-ever SANS Automotive Cybersecurity Summit to showcase the threat of industrial control system attacks, and cyber-physical attacks on vehicles. Stop by to see Matt Carpenter and GRIMM’s Michigan-based team, and “3PO,” GRIMM’s mobile auto-hacking demonstration of how easy it is to hack a car. 3PO consists of most of the major sub-systems resident on a representative automobile, much like those in garages all across America.