In this episode, host Zane Pelletier from ETAS is joined by Gabriel Gonzalez-Garcia, Director of Hardware Security at IOActive, for a fascinating look into the world of drone hacking. Gabriel shares his journey into hardware hacking and explains why unmanned aerial vehicles (UAVs) present a compelling target for security research. The conversation explores fault injection attacks, including what they are, why they’re difficult to execute, and how they can be used to bypass embedded secu...
All content for Empowering Tomorrow's Automotive Software is the property of By the automotive software experts at ETAS and is served directly from their servers
with no modification, redirects, or rehosting. The podcast is not affiliated with or endorsed by Podjoint in any way.
In this episode, host Zane Pelletier from ETAS is joined by Gabriel Gonzalez-Garcia, Director of Hardware Security at IOActive, for a fascinating look into the world of drone hacking. Gabriel shares his journey into hardware hacking and explains why unmanned aerial vehicles (UAVs) present a compelling target for security research. The conversation explores fault injection attacks, including what they are, why they’re difficult to execute, and how they can be used to bypass embedded secu...
ETAS’s Rene Reuter, Product Manager Enterprise Security Systems and Wolfgang Neufeld, Subject Mater Expert Red & Purple Teaming/Penetration Testing take us into the world of red teaming (i.e., real-world attack simulations). They talk about all things red teaming – what it is, why you should (or shouldn’t) do it, when to do it, how it’s done – as well as how it differs from pen testing and the pros and cons of internal vs external teams. If you aren’t familiar with red teaming, or ...
Empowering Tomorrow's Automotive Software
In this episode, host Zane Pelletier from ETAS is joined by Gabriel Gonzalez-Garcia, Director of Hardware Security at IOActive, for a fascinating look into the world of drone hacking. Gabriel shares his journey into hardware hacking and explains why unmanned aerial vehicles (UAVs) present a compelling target for security research. The conversation explores fault injection attacks, including what they are, why they’re difficult to execute, and how they can be used to bypass embedded secu...