

Yeah, I started a long, long time ago in the automotive industry. So maybe since you're a new guest on the podcast, give us a sense of your background and how you got started at Canis Labs and how you became, I guess, such a guru on CAN bus. So I'm very happy to be talking with him today. I've been seeing Ken Tindell post quite a bit about CAN bus on LinkedIn lately, and I have done a little bit of research and realized that this guy is quite the expert on CAN bus, specifically in the automotive industry. Today we're talking with Ken Tindell, CTO of Canis Labs. Hello everyone and welcome to the Altium OnTrack podcast. And he's been trying to track down how the hell I did it. So yeah, in that case, that was an injection attack. In fact, his neighbors had a car stolen the same night. But no, it was stolen purely by the odds. I thought it was a trophy hack from some guy that was just going to leave around the corner or something. So a friend of mine who's in fact in cybersecurity for automotive, had his car stolen. Get Your First Month of Altium Designer® for FREE

There are two types of major attacks on the CAN bus: attacking the physical wiring and attacking the computer that has access to the wiring.Ethernet and CAN coexist in autonomous vehicles’ architecture, Ken explains how.


Ken worked with Motorola on designing the MS CAN-the first CAN controller that did all the buffer scheduling correctly.Ken Tindell’s background and how he got started with CAN bus and CAN security.In this episode, we will learn so much about embedded CAN bus, for automobile security and performance straight from the water host, Ken Tindell the CTO of Canis Labs.Ī lot of interesting facts about cyber security and automobile hacking that you would not want to miss! Watch through the end and make sure to check the additional resources below.
