Tandon in the News
Researchers Uncover Car Infotainment Vulnerability
Should an automobile manufacturer have to release a patch for a feature that they never deployed? A newly discovered vulnerability in MirrorLink's infotainment software may force an answer.
- Terry Sweeney for Dark Reading September 2nd, 2016
- Source: http://www.darkreading.com/vulnerabilities---threats/researchers-uncover-car-infotainment-vulnerability/d/d-id/1326807
A newly uncovered vulnerability in the MirrorLink infotainment software is forcing lots of hard questions about who's ultimately responsible for security in the automobile supply chain.
Damon McCoy, an assistant professor of computer science and engineering at NYU's Tandon School of Engineering, and a group of students at George Mason University found vulnerabilities in MirrorLink, a standard tool for connecting smartphones to in-vehicle infotainment (IVI) systems. Some carmakers disable MirrorLink because they use a different standard or because their version of MirrorLink is a prototype that can be activated later.