25/05/2022: KOFFEE has been published on the Journal of Computer Virology and Hacking Techniques!!!!
26/04/2021: KOFFEE Module into Metasploit Framework!!!!
02/12/2020: KIA Head Unit vulnerability is now a public CVE!
06/11/2020: Huawei University Challenge: CINNAMON wins the Third Place!!!
07/04/2020: STRIVE2020: The Program of the Workshop is now available!
04/12/2019: Workshop on Security Framework "Away from People yet at the Heart of their Privacy"
29/09/2021: KOFEE @ ASRG
01/12/2019: Interview to Ilaria Matteucci at Internet Festival -DigitalWorld, Rai Scuola-
27/11/2019: Candy Cream available on our gitLab
19/11/2019: CANDY CREAM @ FMWEEK
27/09/2019: CANDY CREAM @ MODENA SMART LIFE
02/07/2019: Interview to Gianpiero Costantino at Autoteq5G
20/06/2019: CANDY CREAM @ AUTOTEQ5G
14/05/2019: STRIVE2019 deadline extended to 20/05/2019!
26/04/2019: Candy Cream Exploit
15/04/2019: Submission to STRIVE2019 s now open!
Associate Professor at the "Dipartimento di Matematica e Informatica" of the "Università di Catania", ItalyHome Page
Researcher of the "Trust Security and Privacy" at the "IIT" of the "CNR", ItalyHome Page
PhD Student at the "Dipartimento di Matematica e Informatica" of the "Università di Catania", ItalyHome Page
PhD Student at the "Dipartimento di Matematica e Informatica" of the "Università di Catania", Italy
Research Fellow of the "Trust Security and Privacy" at the "IIT" of the "CNR", Italy
TOUCAN is a new security protocol designed to be secure and at the same time both CAN and AUTOSAR compliant. It achieves security in terms of authenticity, integrity and confidentiality.Learn More
CANDY is a set of malicious APP injected into a genuine Android APP, acting as a Trojan-horse on the Android In-Vehicle infotainment system to remotely collect information circulating on the CAN busLearn More
This project designs of a protocol for the exchange of session keys based on the experimental study of the adoption of RSA in the automotive context, in the light of the constraints and requirements that this application domain imposes.Learn More
CARS is a Context Aware Reputation System able to identify insider attackers and isolate them taking into account contextual conditions derived from sensors spread along the entire urban network.Learn More
CAN Flood is a post-exploitation module that floods a CAN interface for a number of rounds. The module is general as it is parametric in the frame list. CAN Flood is available within the Metasploit FrameworkLearn More
CandyRe is a cybersecurity attack that exploits the Android ADB Debug Port Remote Access vulnerability of an Android based infotainement system to remotely send crafted CAN messages to a simulated odometer.Learn More
CandyCream is an exploit that works on an Android In-Vehicle infotainment system connected to the car through the CAN bus.Learn More
COSCA is a European project selected in the H2020 competitive selection N° 825618 - NGI_TRUST 2nd Open Call - 2019002. The duration of the project is one year. The project outputs a conceptual Framework for car security, drivers’ privacy and trust enhancement, thus orienting the Next Generation Internet at its core.
MIT License Copyright (c)  [SOWHAT R&D] Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the "Software"), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions: The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software. THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
© 2019 Combine. All rights reserved | Design by W3layouts.
sowhat security of the way to handle automotive systems