state-sponsored activists, for various motives. In addition, it is unclear to owners what mecha-
nisms and processes are being employed by Tesla to prevent social engineering of its own
employees and also to protect the location privacy of car owners.
Cars in the market today are vulnerable to software flaws that can be mitigated by the
inclusion of strong security design and analysis earlier on and throughout the product devel-
opment process. We ought to pay careful attention and strive to remediate issues that can put
our physical safety and privacy at risk. It’s probably not a bad guess to say that our exposure to
the attack surface posed by connected cars, especially as we head toward the world of fully
autonomous vehicles, is bound to multiply should we not take considerable action now.
CHAPTER 6: CONNECTED CAR SECURITY ANALYSIS—FROM GAS TO FULLY
(^188) ELECTRIC