Michael Schroeder, Security Analyst, Booz Allen Hamilton
Michael Schroeder, presents analysis that show the vulnerabilities in the cellular interface that would allow access to the vehicle’s computer system.
Cars are made up of electronic control units (ECU) that control your steering wheel to antilock brakes. The number of ECU’s in vehicles are increasing every year. All the units are connected to a network using multi-different platforms. “When I bought my car back in 2010 super Outback, it had 9 ECU’s”, in the 2016 models they could have up to 19 ECU’s.
Michael Schroeder is a security analyst with Booz Allen’s Dark Labs that focuses on embedded device security. Mike has over 14 years of experience working with embedded systems that ranges from writing low level software for cryptographic ASICs to reverse engineering and attacking a variety of connected products, including cars. Mike has worked with a variety of clients to both defend and attack embedded systems, including multiple Defense Department programs. He holds a BS in Computer Engineering from the University of Maryland in College Park, an MS in Electrical Engineering from Johns Hopkins University, and is an instructor with Booz Allen’s binary reverse engineering course.