Hello,Welcome toChina Automotive Cyber Security Summit 2018!

Agenda-The 3rd Annual China Automotive Cyber Security Summit 2018


(The 25th, Jan. 2018)

08:15 Registration & Coffeebreak

09:00 Chairman Opening Speech

09:10 Development and Improvement of Connected Car

          Relevant Laws and Regulations

  •  Connected car as the future standard configuraton in the automotive industry,

  •   understand its regulations, laws, Supervision, standard etc. draft in the before

      market and after market

  •   How the Government will revise the existing regulations of connected vehicles against its technology

      features and potential security risks

  •   Introduce connected car into current cyber security management system to ensure effective

      controlling of its relevant technology, products, and services

  •   Developing connected car security standard system 

09:40 Real Life Telematics Attacks and Vulnerabilities

  •  Understand the details of recent real-life Telematics /OBD2 dongle attacks and


  •  Discuss the Ecosystem impacts of these serious vehicle vulnerabilities and possible mitigation strategies

  •  With the OBDII port providing access to important vehicle data, learn what efforts companies are

     making to ensure that data being taken out the vehicle is being secured

  •  Bolt-on devices can modify software, affecting  in-vehicle cybersecurity systems. How can defenses be

     developed to adapt to new devices being  introduced to the car?

10:10  Lessons Learned From Attacking a Vehicle 

  • Recap the way the attack we did worked 

  • Understand the things that allowed the attack to happen and things that could have been done to prevent it

  • Compare with the way other makers of cars do things, present defenses cars could use as well as where I see things heading in the future

 10:40 Social Networking & Coffee Break

11:10  Cybersecurity Concerns on Vehicle Technology Evolution

        • How to ensure security of future models of transportation (autonomous..etc) 

        • Demonstrating the gaps in current cyber security systems 

        • Demonstrate how these vehicles could be hacked and what's required to counter this


11:40 Discussion of some basic questions upon 

          Automotive cyber security: Who will guard products

          safety and privacy safety? How to provide better

          safety models? What are the basic safety 

          requirement of connected cars? What are the 

          business development opportunities that will be

          brought by connected cars? 

12:00 Social Networking & Luncheon

13:30 Panel Discussion:  Low-Level Security Issues in Heavy 

          Duty Vehicles-Safety - strengths or Mishap 

          for connected vehicles? As to the locus of responsi-

          bility for monitoring the vehicle for security. Does it 

          belong with the manufacturer, owner, government 

          agency, or an aftermarket security company?

14:00  A Case Study of Vehicular-PKI Establishment for V2X communication 

            of Cooperative-ITS in Korea

14: 30 Reevaluate Vehicle Electronics and Software 

           Architectures and Make sure that Systems are 

           being Developed to be Resilient to Attacks

        • Applying critical thinking to maximize safety and 

           security through your network architecture

        • The metrics used for maximizing safety and security

        • Best practices for designing a vehicle architecture 

        • Consider security in future electrical architectures

15:30 Learn How to Mitigate the Concerns of Protecting 

          the Data Exchange with a Layered Security Approach, 

          eg. Operating System, Network Firewall, Web 

          Runtime, API & Application Layer, and the Best 

          Practices to Implement

16:30   Assurance of Secure V2X Capabilities

        •  An update on the current state of deployment of V2X

            technologies, regulatory and standardisation activities 

            across key global markets

        •  Discuss strategies for the implementation of high speed 

            communications security for connected vehicles based 

            on the IEEE 1609.2 standard

        •  Examples of the most up-to-date implementation of 

            message authentication and user privacy for the 

            connected vehicle system will be demonstrated, the

            2017 Cadillac CTS, the first commercially available vehicle

            with V2V capabilities

17:00   An Eye-opening Talk About the Role Hackers can Play in Protecting Business and Customer Information

         • Defining security (in a grotesque way) the ‘real’ definition of hackers, the way hackers think and work,              and how they can be used instead of feared by companies

         • How bug bounties and the Responsible Disclosure processes can work, but also how they sometimes do                not ·Take you along the path to these fails, 

         •  Discuss the way we can –or could have- improve(d) these processes ·Please you with some nice IoT                   drama. A final ‘calculation’ will try to open the door to a safer online world! (from a hacker’s point of               view that is!) 

17:30  Intelligent Connected Vehicle Information Security Architecture and Practice

18:00  End of Day One

DAY TWO SUMMIT Friday (26th, Jan. 2018)

08:15  Registration & Coffeebreak

09:00  Chairman Recap Day One Summit

09:10  Learn the Cybersecurity Solutions based on

           Big Data and Cloud Platform

09:40   Next Generation Security Architecture for Vehicle: IVI, 

            Ethernet, Cloud and AI


10:10 Secure Can Bus In-vehicle Communication

        •Use lightweight cryptography to achieve CAN 

           implicit authentication 

        •A Secure Design for Practical Identity-Anonymized 

          CAN Application

10:40  Social Networking & Coffee Break

11:10  Addressing Cyber Security Throughout The Supply 

           Chain To Secure The Vehicle’s Evolving Ecosystem

11:40 Towards a Systematic Penetration Testing 

          Framework for In-Vehicular CAN Networks

12:00 Social Networking & Luncheon

13:30 Master the Cutting-edge Security Technology and 

          Methods that are Used in the Process of 

          Developing Underlying Software

14:00 Strategies to Protect ECU Software from Attack

       • Intrusion Detection and Prevention – Protecting

          Gateway ECUs

       • How to Realize Communication Security between

          Outside-in car and Backend -New Generation of

          Telematics Security Key Technology

14:30  Intrusion Detection & Reaction 

        • Automotive Firewalls and Intrusion Detection Systems

        • Intrusion Detection by Density Estimation of Reception 

           Cycle Periods for In-Vehicle Networks

        • Early Warning Systems and Confirm Information Security Review System

15:00  Integration of Security Test Methods Throughout the 

            Validation and Verification Process

15:30    Cyber Security in Intra Vehicle Communication and

             Inter Vehicle Communication; Protecting Infotain-

             ment, Telematics, and Mobile Commerce to Include 

             Bluetooth, WiFi, and WiMax    

16:00    Virtualization Software Architecture and Security

16:30   Runtime Self-Protection in a Trusted Blockchain-

             inspired Ledger

17:00   Get An Pratical Data 

         • to get the big picture of the kind of vulnerabilities 

            seen, which systems and attack vectors seem to 

            be the most affected, and how significant the 

            vulnerabilities really are

        • This data will be useful when considering cybers

            security strategy and planning, giving a valuable 

            insight into common struggles, failures, and 

            solutions that the industry faces

17: 30  End of the Summit


“ Better and better, the event is very good for us to consider connected vehicle security and safety, help us

    to increase the protection latitude and broaden our horizon”-- SAIC GM

“ Very professional event with forward-looking contents ”-- Lingyun Industrial Corporations Ltd.

“ It is very valuable to understand the program of foreign mainstream manufacturers and security 

    experts solutions“--  Zhengzhou Xin Da Jie An Ltd.

“ Well done to promote network security, highly technical, worthy of participation“-- Cherry Automotive

“ I have enjoyed learing part and have leard new things do’t  know before thank you”-- SBD

“ Gave a great overview what’s going on in that field in Asia fast growing innovative movement”

    -- ZF Friedrichshafen AG

“ It was a great conference with lots of valuable information in a very beautiful location” -- Hella

“A lot of authoritative experts have been invited and many new ideas have been given“ --Continental  


“Very nice! The first time to understand the car networking security, a lot of contact with the forefront of the 

    industry knowledge and current development status, the host is great, very good Simultaneous 


    -- Wuhan HongXu Informations Technology Ltd.


Next Item:It's the last one
Previous Item:It's the first one