BEGIN:VCALENDAR
VERSION:2.0
PRODID:-//pretalx//pretalx.com//bsides-exeter-2026//speaker//PWLLB3
BEGIN:VTIMEZONE
TZID:GMT
BEGIN:STANDARD
DTSTART:20001029T030000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=10
TZNAME:GMT
TZOFFSETFROM:+0100
TZOFFSETTO:+0000
END:STANDARD
BEGIN:DAYLIGHT
DTSTART:20000326T020000
RRULE:FREQ=YEARLY;BYDAY=-1SU;BYMONTH=3
TZNAME:BST
TZOFFSETFROM:+0000
TZOFFSETTO:+0100
END:DAYLIGHT
END:VTIMEZONE
BEGIN:VEVENT
UID:pretalx-bsides-exeter-2026-3BVKMH@pretalx.com
DTSTART;TZID=GMT:20260425T110000
DTEND;TZID=GMT:20260425T112000
DESCRIPTION:Imagine your car's brakes **stop responding**. Not because of a
  mechanical fault\, but because a **security system** is drowning out the 
 signal. That is not science fiction. It is what can happen when intrusion 
 detection goes wrong inside a **real-time vehicle network** built for spee
 d\, not security.\n\nWhile researching for my MSc dissertation\, I simulat
 ed **five attacks** against a virtual CAN bus. Some were loud and obvious.
  Others slipped through silently\, exactly as a real attacker would intend
 .\n\nBut detecting the attacks was not the hardest part. **Doing it withou
 t destabilising the same safety-critical systems I was protecting** turned
  out to be. Rule-based detection missed the quiet ones. Machine learning f
 lagged too much. **A hybrid approach combining both** was the only method 
 that handled the full range reliably.\n\nThis talk explores what actually 
 happens when **security meets a moving car**\, and why detecting attacks i
 s meaningless if the **defence itself becomes the risk**. Attendees will l
 eave with a clearer picture of what it actually takes to **defend a vehicl
 e network** responsibly.
DTSTAMP:20260501T070549Z
LOCATION:Auditorium
SUMMARY:I Simulated Hacking a Car. Then I tried to defend It. Here's What B
 roke! - Rakesh Elamaran
URL:https://pretalx.com/bsides-exeter-2026/talk/3BVKMH/
END:VEVENT
END:VCALENDAR
