Your browser is not optimized for viewing this website.

More information »


Filter by Category


GRIMM's Defensive Automotive Engineering Security Training


with CyPhy Team

Calendar Sep 13, 2021 at 9 am

Course Description

In this course, participants will gain an understanding of the automotive cybersecurity threat-landscape from an attackers perspective. Automotive attack surfaces will be highlighted, with a focus on attack techniques to provide insight into creating better defensive designs. In addition to traditional course lectures, the attendee will benefit from hands-on offensive exercises in a lab environment. These exercises will ensure each student cements their new-found comprehension of real-world exploitation. Participants will enhance their abilities to integrate defensive security measures into their vehicle networks.

Course Objectives

This 5-day course will expose each student to the attacker’s perspective of automotive security. Each day the student will have hands-on labs to complement the days lecture. During this week students will learn to develop strategies for minimizing attack surfaces and creating designs that are more resistant to security breaches. They will leave the course knowing:

Building on Real-World examples, students will gain hands-on experience and classroom details of many currently-deployed security problems -- and how to detect, avoid, and fix them -- including:

And the basics of Reverse Engineering of Hardware and Software to make it all real.

Day 1:

●  Approach to Secure Design Thinking.

●  CAN Tools and Low-Level Interactions


●  ISO-TP Details

Day 2:

●  Interactive UDS

●  J2534, Software Updates, and ECU Configuration

●  Introduction to Hardware Reverse Engineering

●  Remote Code Execution

Day 3:

●  FlexRay, LIN, and other modern communication Details

●  Infotainment Flaws and Remedies

●  Telematics Attack Surface and Current Design Flaws

Day 4:

●  J1939 and CAN

●  Supply Chain Woes and Guidance

●  Automotive Risk Assessment

●  Remote Keyless Entry and Passive/Proximity Key Problems

●  Introduction to Software Reverse Engineering

Day 5:

●  Vehicle to Everything (V2X) Attack Surface and Methods

●  Automotive Ethernet

●  Capture The Flag!

Who Should Attend: 

  • Mechancial / Electrical / Systems Automotive Engineers
  • Computer Science / Networking Professionals interested in exploring Automotive Security

Note: GRIMM’s trainers strive to accommodate students with all levels of technical knowledge. However, students with some technical background and knowledge of automotive technologies will excel at the hands-on lab activities incorporated into the course.

Additionally, several of the tools used will be learned more easily by students with an understanding of a programming language(s).


Students need to bring a laptop capable of running the VirtualBox virtualization software (Windows/Linux/Mac, no Chromebooks).

All other necessary material will be provided by GRIMM.

Forgot password?
Staff Log In