2026-05-06 –, IFEN room 2, Workshops and AI Security Village (Building D)
Modern cars are no longer mechanical devices. They're complex, interconnected computer networks. And like any networked system, they can be hacked. This workshop introduces participants to the fundamentals of automotive cybersecurity through real-world, hands-on exploration of in-vehicle communication and attack techniques.
In this interactive workshop, attendees will learn how modern cars communicate internally and how attackers can exploit weaknesses in these systems. After a quick introduction to automotive security concepts and vehicle network architecture, participants will dive straight into practical exercises using the Controller Area Network (CAN) bus.
You'll capture and analyze live CAN traffic, reverse engineer messages sent to critical components, and craft spoofed signals that manipulate the instrument cluster. All within a safe and controlled lab environment. Through guided exercises, demonstrations, and collaborative problem-solving, you'll gain a clear understanding of how real automotive attacks work and what defenders should look out for.
Key Takeaways:
- Understand modern automotive security fundamentals and vehicle network design
- Capture, analyze, and interpret CAN bus traffic
- Reverse engineer real in-vehicle messages
- Craft and send spoofed signals to demonstrate attack paths in a controlled environment
Prerequisites:
Participant should bring a laptop with the following characteristics:
- Laptop running a Linux distribution (or a Linux VM with USB passthrough enabled)
- Available USB-A port, or USB-C port with compatible cable
Chief Technology Officer at Warpnet, Roald has a broad background in security engineering, platform operations, and IT compliance. He contributes to open-source projects and serves as an organizer of BSides Groningen and BSides Amsterdam.