Tesla Motors’ Model S will be available for hacking at Defcon next month, where two security experts will reveal five vulnerabilities in the vehicle’s software system
Tesla Motors Inc.’s highly vaunted Model S sedan will undergo the thorough eyes of security professionals for possible flaws and exploits. The connected electric Model S sedan will be up again next month to be exposed to ethical hackers for any digital engineering flaws that may make the vehicle vulnerable to unauthorized access.
At the Defcon hacker conference next month, two renowned security experts, Mark Rogers of “CloudFlare” and Kevin Mahaffey, co-founder of mobile security company “Lookout,” will reveal five glitches in the vehicle’s software design, according to a report from Forbes.
A sixth flaw was independently uncovered by Tesla and has been fixed according to Rogers and Mahaffey.
Talking to Forbes, they said they do not plan to reveal any insights linked to the glitches before their “epic” talk at the conference, aimed at uncovering vehicular software glitches live on stage for the first time.
They will also release a tool for car owners that they claim will make it easier for highly connected vehicles like the Model S to analyze data inflow and outflow.
It is not known whether the above hacking challenge is done under Tesla approval but it will be shipping the Model S unit to Defcon for the same. Though the Model S may be shipped for advertising and not be related to this challenge.
Tesla has not been a big fan of such hacking challenges especially in open fora. The company did not officially endorse the much-publicized hacking competition at the SyScan conference in Beijing in July 2014, which offered tech geeks a reward of $10,000 if they cracked a Tesla Model S.
At the 2014, SyScan conference, Zhejiang University students have hacked the Tesla Model S with an attack that enabled them to open its doors and sun roof, switch on the headlights and sound the horn – all while the car was driving along.
Sadly they won just $1,700 for the effort.
While another entrant named team ‘yo’ exploited an unspecified flaw in the flow design of the car gaining access to the Model S allowing them to alter the car functions while it was in motion. This flaw has not been made public thus far.