Program Agenda

Insight. Research. Knowledge

This year’s program was uniquely curated by the program committee. In addition to the invited speakers selected by the committee, numerous submitted papers underwent a blind review process and were chosen for presentation. The goal of the program is to provide valuable insights and best practices that help attendees excel in automotive cybersecurity.

All approved presentation can be accessed by clicking the presentation title below. Presentations will be available the day after they were presented.

Day 1 Agenda


Time

7:15-8:15 AM

Activity/Presentation

Breakfast

8:15-8:25 AM

Welcome and Introduction

8:25-9:10 AM

From Vulnerability Management to Vulnerability Elimination: Rethinking Automotive Software in the Era of AI Offensive Agents

9:10-9:35 AM

CAUTION: HIGH VOLTAGE, LOW SECURITY - A Familiar Tale of Cybersecurity Woes

Maggie Shipman

9:35- 10:00 AM

The EV Cyber Kill Chain: From Charging Port to Cloud - Attacks, Missed Signals, and What Industry Must Fix Next

Sharika Kumar

Networking Break

10:30- 11:15 AM

Automotive Cybersecurity Research in the Age of AI and Quantum

Dan Massey

11:15- 11:40AM

Physics Informed Dual Channel Metalens Enabled Polarization Fingerprints for Rapid Contactless Hardware Authentication

Hafiz Malik

11:40 AM- 12:25 PM

Automotive Product Security Alphabet

Pawel Brzezinski

Lunch

1:25- 1:40 PM

FIDO Device Onboard (FDO): Securing the Connected Future for the Automotive Industry

Richard Kerslake

1:40- 1:55 PM

Automotive Threat Matrix: What's New and How to Get Started

Karl LeBoeuf

1:55- 2:40 PM

Euro 7, Anti-tampering and the Expanding Cybersecurity Landscape

Rami Riashi

2:40- 3:05 PM

Compliance Offence as a Services: Why OEMs Pay for Unconventional Adversaries in the Tailpipes

Shin Li

Networking Break

3:35-4:00 PM

Off-the-Shelf Car Hacking: How Commercial Devices Are Defeating Modern Vehicle Security

Nimrod Stoler

4:00-4:25 PM

Persistent Personal Data Exposure Across Vehicle Ownership and Control Transitions

Christos Papadopoulos

4:25-4:50 PM

From Code to Compliance: Meeting U.S. Connected Vehicle Origin Requirements

Doug Britton

4:50-4:55 PM

Closing Remarks

5:00-6:00 PM

Poster Session - NEW for 2026

5:00-7:00 PM

Evening Reception

Speaker

Ahmad Nasser

Day 2 Agenda


Time

Activity/Presentation

Speaker

7:15-8:15 AM

Breakfast

8:15-8:20 AM

Welcome

8:20-9:05 AM

Don’t Look Up: There Are Sensitive Internal Links in the Clear on GEOSatellites

Annie Dai

9:05-9:30 AM

EVSEFuzz: A Tool for Automated Testing of Protocol Implementations

Roland Varriale

9:30-9:55 AM

Battle-Testing NIST IR 8473 with Pwn2Own Automotive: Control Coverage of Real-World EVSE Exploit Chains

Shin Li

9:55-10:20 AM

Constructive Assurance Cases for Cybersecurity

Brian Murray

Networking Break

Networking Break

10:50-11:15 AM

Patchlings: Enabling A/B-Equivalent OTA Updates for Deeply Embedded Automotive ECUs

Sekar Kulandaivel

11:15-11:40 AM

The Vehicle May be Sick: Denial of Diagnostic Services by Exploiting the CAN Transport Protocol

Seungjin Baek

11:40 AM-12:25 PM

Extraction of Secrets from 40nm CMOS Gate Dielectric Breakdown Antifuses by FIB Passive Voltage Contrast

Andrew Zonenberg

1:25-1:40 PM

SAE J3334 Threat Analysis and Risk Assessment (TARA) Guidelines Task Force Update

Chad Childers

Lunch

1:40-1:55 PM

SESIP Supporting ISO/SAE 21434 objectives for cybersecurity assurance levels (CAL) and Targeted Attack Feasibility (TAF)

Francesca Forestieri

1:55-2:40 PM

Vibe Coding the Wild West

Matt Carpenter

Networking Break

3:10-3:35 PM

Overview of Chinese Cybersecurity Regulation GB 44495-2024

Pawel Brzezinski

3:35-4:20 PM

Everything Is a Fleet Now: Securing the Transportation API Mesh Across Automotive, Trucking, Rail, Maritime, Transit, and Aviation

Urban Jonson

4:20 PM

Closing Remarks

OUR MISSION

The overall goal and objective of escar is to provide a forum for collaboration among private industry, academia and government regarding modern in-vehicle cyber security threats, vulnerabilities and risk mitigation/countermeasures.

WHAT TO EXPECT

Speakers give recent insights and encourage discussions about security in the automotive life cycle, security technologies for automotive components and networks, future security technologies.

Our Sponsors