The automotive industry is rapidly evolving, incorporating advanced technologies and connectivity features into vehicles. However, this progress also brings forth new security challenges. While efforts are being made to address vulnerabilities in older vehicle equipment and the CAN BUS system, there is still work to be done in terms of integrity protection and authentication.

The functionality of modern cars mirrors that of mobile phones, with multiple communication capabilities and various vendors providing components. Original Equipment Manufacturers (OEMs) face difficulties in understanding the full extent of their vehicle’s components and ensuring proper hardware security. Implementing trusted execution environments and secure boot processes is complex, especially with the rapid pace of technological advancements.

The transfer of knowledge from different domains, such as hardware security, mobile security, and protocol security, is beneficial for improving automotive security. However, the automotive industry still lacks the level of maturity required to effectively mitigate threats. Considering that vehicles can potentially be used as weapons and cause harm, it is essential to address these concerns promptly.

The security research community plays a vital role in helping OEMs understand vulnerability disclosure, handling vulnerabilities, and addressing critical issues like car key hacks. By sharing their expertise and pointing out potential risks, the research community assists in raising the overall security posture of the automotive industry.

Detection and prevention of attacks in future vehicles pose a significant challenge. Attackers may intentionally disrupt detection mechanisms and exploit defense mechanisms. Therefore, it is crucial to anticipate and stay several steps ahead of potential attackers to effectively secure vehicles.

While there is progress in the industry’s security efforts, it is important to remain vigilant and continue supporting OEMs in their journey towards enhanced automotive security. Collaboration between engineering and the security research community is crucial to address the evolving threat landscape and build robust defenses against cyber-attacks.

We are thrilled to announce an exclusive opportunity at the upcoming IoT Security Foundation (IoTSF) annual conference. Brace yourself for an unparalleled encounter with a simulated cyber-attack on a car while driving. This unique car simulator hack experience, developed by Copper Horse, will give you a taste of the challenges faced in securing IoT systems.

The Ultimate Simulation:

Attendees at the IoTSF conference will have the extraordinary chance to sit in a remarkably realistic car driving simulator. This advanced rig, created internally at Copper Horse, incorporates authentic vehicle components, a real car CANbus network, and cutting-edge hacking equipment and software. Prepare to lose control of the vehicle in a secure environment, as the simulation showcases the severity of IoT security threats.

Unmatched Realism:

The motion rig, provides an immersive experience by simulating movement along different axes, including traction loss. The steering, pedals, gears, and handbrake ensures a truly realistic driving encounter.

Advanced Control Systems:

Copper Horse has developed ingenious control boxes to enhance the simulation’s authenticity. By translating telemetry data from computer games and simulators into real CAN data, vehicle components like the instrument cluster respond as if under the influence of a hacker. Another control box allows for disabling pedal controls and various functions, simulating the loss of control of the vehicle. This level of detail guarantees an unforgettable and thought-provoking experience.


The IoTSF annual conference promises to be an exceptional event for anyone interested in the ever-growing field of IoT security. Don’t miss your chance to participate in this one-of-a-kind car simulator hack experience!

By registering now, you will gain valuable insights into the challenges posed by cyber threats to connected vehicles. Immerse yourself in a hyper-realistic simulation where you will witness firsthand the dangers that exist in the IoT landscape.

Join us at the IoTSF conference and be a part of the future of IoT security.

Register here:

Copper Horse Vehicle Simulator

James Willison, IoTSF, Project and Engagement Manager