Case study: Jeep Cherokee attack
Potential remote attack surface in Jeep Cherokee
Some of the attacking points discovered by Miller and Valasek in the Jeep Cherokee are as follows: TPMS, Bluetooth, FM/AMXM, RKE, cellular, internet through radio, RFHM (radio frequency hub) to controller area network (CAN) bus.They exploited one of the vulnerabilities in the car infotainment system that uses cellular connection to provide access to the internet and other services.Your task
Watch the video of the Jeep Cherokee attack.Further information about the Jeep Cherokee attack can be found here.Conduct some research to find out what other ways Miller and Valasek tried to attack the in-vehicle networks.
Reference
Miller, C., and Valasek, C. (2015) Remote Exploitation of an Unaltered Passenger Vehicle. Las Vegas: Black Hat USAAutomotive Cyber Security: An Introduction

Our purpose is to transform access to education.
We offer a diverse selection of courses from leading universities and cultural institutions from around the world. These are delivered one step at a time, and are accessible on mobile, tablet and desktop, so you can fit learning around your life.
We believe learning should be an enjoyable, social experience, so our courses offer the opportunity to discuss what you’re learning with others as you go, helping you make fresh discoveries and form new ideas.
You can unlock new opportunities with unlimited access to hundreds of online short courses for a year by subscribing to our Unlimited package. Build your knowledge with top universities and organisations.
Learn more about how FutureLearn is transforming access to education