Skip to main content

Home/ CSIA 459/ Group items tagged car

Rss Feed Group items tagged

Cheryl Hoffman

Car hackers 'drive' car with laptop - 1 views

  •  
    Next time you have a passenger in the back seat of your car offering infuriatingly "helpful" advice about your driving skills, count yourself lucky that they aren't doing anything more sinister in their attempts to guide your vehicle.
  •  
    I was quite amused by the picture of the man holding the Nintendo controller in the car on the front page of the article. It doesn't surprise me that a cars ECU can be manipulated. They are programmed to control specific tasks and are not complex nor secure. Most of the information they display and/or process is from various sensors within the engine or chassis. If the failure of important sensors occur, you may not even be able to start your car. It's a fragile system, although it was designed that way for safety, not system security.
scott thomas

Automated biometrics-based personal identification - 1 views

  •  
    Identification Technology Division, EER Systems Inc. McLean, VA 22102; and†National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences, Beijing 100080, China Why Use Biometrics-Based Personal Identification? Biometrics-based personal identification attempts to answer the questions "Who are you?" and "Are you who you claim to be?"
  •  
    Scott, this technology appears not to far away especially when it comes to biometrics/fingerprinting the last car dealership I worked at 4 years ago employed this for retrieving keys to test drive cars and the salespeople liked this a lot because we did not have to worry about keeping up with a key to unlock the key box before signing a car out to test drive. I mean you always got your finger with you and key log kept track of last known person with key so salespeople would not be charged for lost keys. Thanks.
  •  
    Identification Technology Division, EER Systems Inc. McLean, VA 22102; and†National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences, Beijing 100080, China Why Use Biometrics-Based Personal Identification? Biometrics-based personal identification attempts to answer the questions "Who are you?" and "Are you who you claim to be?"
Michael Austin

Comprehensive Experimental Analyses of Automotive Attack Surfaces - 0 views

  •  
    An interesting review of the different attack vectors threatening tomorrow's automobiles.
samuelrios

Homeland Security Drones Designed to Identify Civilians Carrying Guns - 4 views

  •  
    Recently uncovered government documents reveal that the U.S. Department of Homeland Security's (DHS) unmanned Predator B drone fleet has been custom designed to identify civilians carrying guns and track cell phone signals. "I am very concerned that this technology will be used against law-abiding American firearms owners," said founder and executive vice president of the Second Amendment Foundation, Alan Gottlieb.
  • ...2 more comments...
  •  
    Good read. After reading this and another related article (http://news.cnet.com/8301-13578_3-57572207-38/dhs-built-domestic-surveillance-tech-into-predator-drones/) There's a fine line which must be established before the full use of this technology, however it does raise concerns for the future in terms of privacy. It's primary purpose for homeland security is the survey the borders of the united states. There are certainlly risks involved in its use. Ensuring that this technology is effectively secured from attacks to its onboard weapons and communications systems is equally important to the issues raised in the articles.
  •  
    Good post I've heard chatter about drones being flown over the USA before. I could see the benefits of using drones for recon and counter terrorism, but this opens the door for much larger issues. Where will line be drawn in the sand as far as citizen privacy and avoiding the "big brother" hysteria?
  •  
    The power these drones represent is incredible. I can easily see how the can (and will be) abused. As Jammes pointed out, the Primary purpose of DHS is securing our nations borders, yet I have read of DHS rading peoples homes because of an "improperly" imported car! Not to sound like I am about to put a tinfoil hat on, but I do see the distinct possibility of the banning of firearms in this country as happened in England in 1997. These tools will be in place well before that day.
  •  
    The use of Drones in the field as a tool to fight the fight on the borders is one thing, using them as a tool to fight terrorism is still another, but using them as tool to spy on the people of the United States is another. I think this is one that the United States Supreme Court will be deciding soon.
Dan Schulman

Distrubuted GPU Password Cracking. Univertitit van Amsterdam - 0 views

  •  
    A few of my sources are from universities in Norway or Amsterdam. Apparently password cracking is a big thing over there!
  •  
    Dan, thanks for posting. This was a good article, not that I wasn't aware of the information in it, but it was just a good reminder, and something I can use to send around for some people to read who may be using some of the obvious techniques to secure thair passwords, such as "what was your first car", lol Facebook destroyed these types of questions/answer security forms.
Percy Kendrick

What will IT be like in 50 years? - 0 views

  •  
    This video gives an example of technologies of the future and a different way to pose questions for how technology can improve daily life but also where technology can take us.
  • ...1 more comment...
  •  
    I really like the way they talked about complete integration in the video, as that definitely seems to be the direction that everything is going. Forget about dedicated devices, everything from your couch to your car, to your refrigerator will have intense computing power, and will be able to communicate with you and everything else around you to better your life. The only downfall I see of this is it seems like people would forget how to not use technology, and would be completely helpless if it was lost.
  •  
    Complete integration is really important. It is a focus of many technological advancements. This is due to the fact that people want technology that makes life as whole easier not just individual tasks. I am eager to see what technologies the future will actually hold!
  •  
    Interesting assessments by the individuals in that provided video Percy. I personally keyed into the statement that technology will operate in a more conversational (social) manner that's similar to how humans interact. The further technological-based assessments are interesting especially with regard to gene mapping and what diseases somebody may face within their lifetime.
1 - 6 of 6
Showing 20 items per page