Program Agenda
Insight. Research. Knowledge
This year’s program was uniquely curated by the program committee. In addition to the invited speakers selected by the committee, numerous submitted papers underwent a blind review process and were chosen for presentation. The goal of the program is to provide valuable insights and best practices that help attendees excel in automotive cybersecurity.
All approved presentation can be accessed by clicking the presentation title below. Presentations will be available the day after they were presented.
Day 1 Agenda
Time
7:15-8:15 AM
Activity/Presentation
Breakfast
8:15-8:25 AM
Welcome and Introduction
8:25-9:10 AM
From Vulnerability Management to Vulnerability Elimination: Rethinking Automotive Software in the Era of AI Offensive Agents
9:10-9:35 AM
CAUTION: HIGH VOLTAGE, LOW SECURITY - A Familiar Tale of Cybersecurity Woes
Maggie Shipman
9:35- 10:00 AM
The EV Cyber Kill Chain: From Charging Port to Cloud - Attacks, Missed Signals, and What Industry Must Fix Next
Sharika Kumar
Networking Break
10:30- 11:15 AM
Automotive Cybersecurity Research in the Age of AI and Quantum
Dan Massey
11:15- 11:40AM
Physics Informed Dual Channel Metalens Enabled Polarization Fingerprints for Rapid Contactless Hardware Authentication
Hafiz Malik
11:40 AM- 12:25 PM
Automotive Product Security Alphabet
Pawel Brzezinski
Lunch
1:25- 1:40 PM
FIDO Device Onboard (FDO): Securing the Connected Future for the Automotive Industry
Richard Kerslake
1:40- 1:55 PM
Automotive Threat Matrix: What's New and How to Get Started
Karl LeBoeuf
1:55- 2:40 PM
Euro 7, Anti-tampering and the Expanding Cybersecurity Landscape
Rami Riashi
2:40- 3:05 PM
Compliance Offence as a Services: Why OEMs Pay for Unconventional Adversaries in the Tailpipes
Shin Li
Networking Break
3:35-4:00 PM
Off-the-Shelf Car Hacking: How Commercial Devices Are Defeating Modern Vehicle Security
Nimrod Stoler
4:00-4:25 PM
Persistent Personal Data Exposure Across Vehicle Ownership and Control Transitions
Christos Papadopoulos
4:25-4:50 PM
From Code to Compliance: Meeting U.S. Connected Vehicle Origin Requirements
Doug Britton
4:50-4:55 PM
Closing Remarks
5:00-6:00 PM
Poster Session - NEW for 2026
5:00-7:00 PM
Evening Reception
Speaker
Ahmad Nasser
Day 2 Agenda
Time
Activity/Presentation
Speaker
7:15-8:15 AM
Breakfast
8:15-8:20 AM
Welcome
8:20-9:05 AM
Don’t Look Up: There Are Sensitive Internal Links in the Clear on GEOSatellites
Annie Dai
9:05-9:30 AM
EVSEFuzz: A Tool for Automated Testing of Protocol Implementations
Roland Varriale
9:30-9:55 AM
Battle-Testing NIST IR 8473 with Pwn2Own Automotive: Control Coverage of Real-World EVSE Exploit Chains
Shin Li
9:55-10:20 AM
Constructive Assurance Cases for Cybersecurity
Brian Murray
Networking Break
Networking Break
10:50-11:15 AM
Patchlings: Enabling A/B-Equivalent OTA Updates for Deeply Embedded Automotive ECUs
Sekar Kulandaivel
11:15-11:40 AM
The Vehicle May be Sick: Denial of Diagnostic Services by Exploiting the CAN Transport Protocol
Seungjin Baek
11:40 AM-12:25 PM
Extraction of Secrets from 40nm CMOS Gate Dielectric Breakdown Antifuses by FIB Passive Voltage Contrast
Andrew Zonenberg
1:25-1:40 PM
SAE J3334 Threat Analysis and Risk Assessment (TARA) Guidelines Task Force Update
Chad Childers
Lunch
1:40-1:55 PM
SESIP Supporting ISO/SAE 21434 objectives for cybersecurity assurance levels (CAL) and Targeted Attack Feasibility (TAF)
Francesca Forestieri
1:55-2:40 PM
Vibe Coding the Wild West
Matt Carpenter
Networking Break
3:10-3:35 PM
Overview of Chinese Cybersecurity Regulation GB 44495-2024
Pawel Brzezinski
3:35-4:20 PM
Everything Is a Fleet Now: Securing the Transportation API Mesh Across Automotive, Trucking, Rail, Maritime, Transit, and Aviation
Urban Jonson
4:20 PM
Closing Remarks
OUR MISSION
The overall goal and objective of escar is to provide a forum for collaboration among private industry, academia and government regarding modern in-vehicle cyber security threats, vulnerabilities and risk mitigation/countermeasures.
WHAT TO EXPECT
Speakers give recent insights and encourage discussions about security in the automotive life cycle, security technologies for automotive components and networks, future security technologies.
Our Sponsors