ScapyCon Automotive 2024

ScapyCon Automotive 2024 marked the first-ever ScapyCon — a sold-out event with 80+ participants and workshops by Dissecto, Willem Melching, and Guillaume Valadon.

18.09.2024 – 19.09.2024

Techbase, Regensburg

See program and schedule


ABOUT


ScapyCon Automotive 2024 marked the very first edition of ScapyCon — and it couldn’t have started better. Held at TechBase Regensburg, the two-day event gathered more than 80 participants from across the automotive and cybersecurity community. Day One featured inspiring talks and expert insights into the use of Scapy for network analysis, testing, and packet manipulation. On Day Two, all workshops were fully booked, offering hands-on training for both newcomers and seasoned professionals. With its sold-out sessions, lively exchanges, and practical deep dives, ScapyCon Automotive 2024 set a strong foundation for a growing community at the intersection of Scapy, networking, and automotive cybersecurity.


Speakers


Philippe Biondi

Scapy Author, AIRBUS

Philippe Biondi is the author of Scapy and numerous other security related tools. He is a co-creator of the SSTIC french-speaking conference; He is a co-author of the Security Powertools book. He published several articles in MISC magazine. He gave several talks to security conferences (Blackhat, HITB, GreHack, CansecWest, Defcon, Syscan, etc.)

Aircraft Security

This talk takes you into the world of aircraft security and how Scapy contributes to making aviation systems safer. It begins with a look back at Scapy’s origins — the problems it set out to solve, its first prototype in 2003, and the formation of its maintainer team and key contributors. You’ll also get an inside view of Scapy’s evolution through real stories from its creator, Philippe Biondi. The session wraps up with Philippe’s favorite Scapy tricks and practical examples from the field of aviation security.

Dr. Nils Weiss

CEO, dissecto GmbH

Dr. Weiß delved into penetration testing during his Bachelor’s and Master’s, exploring vulnerabilities in embedded systems and entire vehicles. Active in developing open-source penetration test frameworks like Scapy, he co-founded dissecto GmbH in 2022, focusing on simplifying security diagnostics and solutions for embedded systems.

Past, Present and Future of Automotive Scapy

Take a deep dive into Scapy’s origins and its evolution into a powerful tool for network and automotive packet manipulation. Learn about its supported protocols and advanced features that make Scapy so versatile. We’ll also explore current hot topics like SecOC and how Scapy can adapt to modern automotive cybersecurity needs. The session concludes with an open discussion on missing protocols and future directions for Scapy’s development.

Guillaume Valadon

Cybersecurity Researcher

Guillaume has a PhD in networking and loves to look at data and to craft packets. In his spare time, he co-maintains Scapy and does some reversing engineering. Also, he still remembers what AT+MS=V34 means! Guillaume regularly gives technical presentations, classes and live demonstrations, and writes research papers for conferences and magazines. He is the editor-in-chief of the MISC Magazine in France.

IPv6 & TLS Workshop

In this hands-on workshop, you will learn how to use Scapy to interact with IPv6 and TLS, discover what these packets look like on the network, and manipulate the corresponding Scapy objects to interact with real implementations. Regarding TLS, you will manipulate X.509 certificates to look for relevant information and modify their contents. You will also learn how to decrypt TLS sessions using keys retrieved from Linux processes. Together we will explore IPv6 security and understand how Scapy can be used to perform practical attacks.

Willem Melching

Cybersecurity Researcher

Willem Melching is an independent security researcher with over 7 years of experience, specializing in automotive security and reverse engineering. He contributed to openpilot at comma.ai, develops tools like the SecOC Key Extractor, and shares research via his blog “I CAN Hack.” He also offers car hacking training and holds a degree from TU Delft.

My car, My keys: obtaining CAN bus SecOC signing keys

In this talk we will explain how we broke the SecOC implementation of a 2021 Model Year vehicle by attacking the power steering ECU. We will give a short introduction on SecOC. We will also explain how key management is implemented, and why observing a key update when replacing a part won’t allow extracting the key.

Advanced Hacking Workshop

Join for a hands-on workshop focused on advanced ECU hacking techniques. Ideal for security professionals, automotive engineers, and enthusiasts, this workshop provides practical experience with real-world ECUs, firmware reverse engineering, and vulnerability identification.

Thomas Sermpinis

Technical Director, Auxilium

Thomas is the Technical Director of Auxilium Cyber Security and independent security researcher with main topics of interest in the automotive, industrial control, embedded device and cryptography sectors. During his research, he published several academic papers, 0days and tools.

V2GEVIL: ghost in the wires

In this talk, we’ll explore the world of electric vehicle cybersecurity, focusing on charging communication, vulnerabilities in EVCC implementation, and the development of a dedicated security tool. We’ll discuss charging standards, communication protocols, and real-world scenarios to understand the evolving landscape of electric mobility cybersecurity. Additionally, we’ll showcase and discuss the hardware required for connecting to the vehicle charging port.

Alexander Schröder

Penetration Tester, AVL

Alexander is a penetration tester at AVL Software & Functions GmbH. He started his journey in this field during his Master’s focused on automotive security, supporting the development of Automotive Scapy. Currently, he is dedicated to pentesting automotive systems and supporting the development of secure vehicles.

You CAN’t fuzz this

Fuzzing is a widely used technique in traditional IT for uncovering numerous vulnerabilities. But how effective is it in testing automotive systems? This presentation explores the possibilities and challenges of applying fuzzing to the CAN bus, the backbone of vehicle communication networks. We will explore how to identify and fuzz ideal targets (and how Scapy can help us), but also discuss the limitations and challenges of fuzzing the CAN bus.

Thomas Faschang

Cybersecurity Engineer, KTM

Thomas is a PhD student at the Institute of Technical Informatics at TU Graz, specializing in Automotive Cybersecurity. His research focuses on developing a Testing and Training Framework for Automotive Cybersecurity, which formed the basis of his Master’s thesis. Currently, Thomas works as a Vehicle Cybersecurity Engineer at KTM AG.

Using Scapy for Cybersecurity Verification in ISO/SAE 21434

Automotive Original Equipment Manufacturers (OEMs) must comply with UNECE Regulation 155 to achieve vehicle homologation. As a result, OEMs follow the ISO/SAE 21434 standard. Key aspects of this standard include Threat Analysis and Risk Assessment (TARA), Cybersecurity Requirements, and their verification. To verify cybersecurity requirements, the Scapy library offers a powerful toolkit for writing test cases. This presentation provides an overview of the product security workflow in automotive OEMs and explains how Scapy can be integrated into the process.

Francisco Cotrina

HW/SW Developer, TTTech-Auto

Francisco is a HW and SW developer working for 8 years at TTTech-Auto where he designs and implements Automotive Secure Gateways, focusing in Cybersecurity and Communications. Monday to Friday he wears a white hat and on weekends a black one.

Implementing and Testing Layer 2 Firewall Rules with Scapy

The internal networks used in modern automotive systems are relying on Ethernet protocols, using smart switches. We have learned from IT world that they should be protected on L2 layer, usually via firewall rules. I show how such approach might be easy to understand, but it needs to be accurate, updateable, and loggeable. Testing those rules requires careful and deep implementation, supported by flexible tools such as Scapy.

Falk Mayer

Co-Founder, breachlabz

Falk co-founded BreachLabz, a Munich-based team focused on penetration testing for the automotive industry. With degrees in physics and a background in information, IoT, and automotive security, Falk specializes in testing, vulnerability management, and risk assessments, particularly in line with UN R155 and ISO/SAE 21434 compliance standards.

JTAG Enumeration using the RP2040 on the HydraProbe

In this session, we’ll dive into the world of hardware debug ports on automotive components. You’ve probably heard the advice, “Lock your debug ports,” but for many, checking whether JTAG is locked remains a bit of a mystery. We’ll walk you through the basics of the JTAG protocol, how to connect to it, and show you how to use the RP2040 co-processor on the Hydravision Probe to adapt your scripts for different microcontrollers.

Jan-Peter von Hunnius

Cybersecurity Specialist

Jan-Peter is a cybersecurity expert in IT/embedded systems and vehicle security. With over 20 years of experience, he has worked with global automotive suppliers and OEMs. A former partner at CYRES Consulting, he specializes in cybersecurity engineering processes per ISO/SAE 21434, UN R155, and ASPICE.

Insights into vehicle security attack vectors

We look at the current state of vehicle security, highlighting infamous hacks and show where vulnerabilities still exist: From (not so much) secret key material and exploitable diagnostic services to bad encryption schemes and lack of message authentication. An inspiring raid through the open flanks of cybersecurity in (modern) vehicles.


GALLERY