25/05/2022: KOFFEE has been published on the Journal of Computer Virology and Hacking Techniques!!!!
26/04/2021: KOFFEE Module into Metasploit Framework!!!!
02/12/2020: KIA Head Unit vulnerability is now a public CVE!
06/11/2020: Huawei University Challenge: CINNAMON wins the Third Place!!!
07/04/2020: STRIVE2020: The Program of the Workshop is now available!
05/12/2019: Call for Paper STRIVE2020 at IEEE VTC2020-Spring
04/12/2019: Workshop on Security Framework "Away from People yet at the Heart of their Privacy"
29/09/2021: KOFEE @ ASRG
01/12/2019: Interview to Ilaria Matteucci at Internet Festival -DigitalWorld, Rai Scuola-
27/11/2019: Candy Cream available on our gitLab
19/11/2019: CANDY CREAM @ FMWEEK
27/09/2019: CANDY CREAM @ MODENA SMART LIFE
02/07/2019: Interview to Gianpiero Costantino at Autoteq5G
20/06/2019: CANDY CREAM @ AUTOTEQ5G
14/05/2019: STRIVE2019 deadline extended to 20/05/2019!
26/04/2019: Candy Cream Exploit
15/04/2019: Submission to STRIVE2019 s now open!
Associate Professor at the "Dipartimento di Matematica e Informatica" of the "Università di Catania", Italy
Home PageResearcher of the "Trust Security and Privacy" at the "IIT" of the "CNR", Italy
Home PageResearcher of the "Trust Security and Privacy" at the "IIT" of the "CNR", Italy
Home PagePhD Student at the "Dipartimento di Matematica e Informatica" of the "Università di Catania", Italy
Home PagePhD Student at the "Dipartimento di Matematica e Informatica" of the "Università di Catania", Italy
Research Fellow of the "Trust Security and Privacy" at the "IIT" of the "CNR", Italy
TOUCAN is a new security protocol designed to be secure and at the same time both CAN and AUTOSAR compliant. It achieves security in terms of authenticity, integrity and confidentiality.
Learn MoreCANDY is a set of malicious APP injected into a genuine Android APP, acting as a Trojan-horse on the Android In-Vehicle infotainment system to remotely collect information circulating on the CAN bus
Learn MoreThis project designs of a protocol for the exchange of session keys based on the experimental study of the adoption of RSA in the automotive context, in the light of the constraints and requirements that this application domain imposes.
Learn MoreCARS is a Context Aware Reputation System able to identify insider attackers and isolate them taking into account contextual conditions derived from sensors spread along the entire urban network.
Learn MoreCAN Flood is a post-exploitation module that floods a CAN interface for a number of rounds. The module is general as it is parametric in the frame list. CAN Flood is available within the Metasploit Framework
Learn MoreKOFFEE exploits the CVE-2020-8539 to execute the micomd binary with valid payloads on Kia Motors Head Units. By using KOFFEE an attacker can control the head unit and send CAN bus frames into the Multimedia CAN of the vehicle
Learn MoreCandyRe is a cybersecurity attack that exploits the Android ADB Debug Port Remote Access vulnerability of an Android based infotainement system to remotely send crafted CAN messages to a simulated odometer.
Learn MoreCandyCream is an exploit that works on an Android In-Vehicle infotainment system connected to the car through the CAN bus.
Learn MoreCOSCA is a European project selected in the H2020 competitive selection N° 825618 - NGI_TRUST 2nd Open Call - 2019002. The duration of the project is one year. The project outputs a conceptual Framework for car security, drivers’ privacy and trust enhancement, thus orienting the Next Generation Internet at its core.
MIT License Copyright (c) [2019] [SOWHAT R&D] Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
© 2019 Combine. All rights reserved | Design by W3layouts.
sowhat security of the way to handle automotive systems