MYSECurity.TV

Home   /   RESOURCES   /   MYSEC.TV   / Analysis of an attack on automotive keyless entry systems

Analysis of an attack on automotive keyless entry systems

Tech & Sec Weekly
SHARE:

IN THIS VIDEO

Interview with Dr Dennis Kengo Oka, Principal Automotive Security Strategist, Synopsys Software Integrity Group.

With increased connectivity capabilities and larger and more complex software in automotive systems, modern vehicles are becoming more susceptible to cyber security attacks. Over the years, security researchers identified a number of vulnerabilities in automotive systems that have raised awareness about the need for automotive cyber security. One example that was made public in November 2020 was a set of vulnerabilities in the Tesla Model X keyless entry system discovered by Lennert Wouters at the University of Leuven in Belgium.

It’s important to note that the issues were responsibly disclosed to Tesla in August 2020 by security researchers, and Tesla released an over-the-air (OTA) patch to address them in November 2020.

Since there is limited information publicly available, please note also that some assumptions have been made about the target systems and type of weaknesses/vulnerabilities in order to facilitate this discussion on security solutions.

OTHER VIDEOS IN THIS SERIES

sp
March 17, 2026
In this exclusive interview from Axiom Space headquarters in Houston, Aaron Tullos, Vice President of Station Engineering, gives Australia in Space TV an inside look at the engineering behind the Axiom Station, a commercial space station designed to operate in low Earth orbit.Watch Now
a6
March 8, 2026
At Zero Trust World #ZTW26 in Orlando, we speak with Emile Barakat, Director of Operations – APAC at ThreatLocker, about the new Australian regional office and partners and clients in the APAC region.Watch Now
a5
March 8, 2026
At Zero Trust World #ZTW26 in Orlando, we speak with Kieran Human, Security Enablement Lead at ThreatLocker, on how SQL injection remains one of the most persistent vulnerabilities in cybersecurity, with tens of thousands of known CVEs and continued relevance in modern attacks.Watch Now
a4
March 8, 2026
At Zero Trust World #ZTW26 in Orlando, we speak with Ryan Bowman, VP of Operations at ThreatLocker, about the growing risks of Shadow IT and how organisations can regain control over their environments.Watch Now