Lessons From Pwn2Own Automotive: Securing the Future of EV Charging Systems

premium account

Recording of Wednesday, May 07, 2025 | The smarter E Europe Conferences 2025 | Conference Program | Language: English | Duration: 16:11 .

Pwn2Own Automotive 2024 in Tokyo Unveils New Categories and Highlights EV Charger Vulnerabilities.

The Pwn2Own Automotive competition is a pivotal event in cybersecurity, focusing on the automotive sector. Since its inception in 2005, it has evolved to include hacking challenges for various technologies, with notable milestones such as the first hack of a Tesla Model 3 in 2019 and earlier events like the Jeep-hack in 2016. Tokyo frequently hosts these competitions due to local expertise. The contest encompasses multiple categories beyond automotive technology, including web browsers and cloud systems. Participants are incentivized through rewards for discovering vulnerabilities known as "0-day exploits." Trend Micro's subsidiary VicOne collaborates with ZDI (Zero Day Initiative) to monitor automobile cyber threats actively. Recent statistics reveal numerous unique findings across different vehicles, highlighting ongoing efforts to encourage ethical hackers by offering reward systems aimed at preemptively addressing security flaws before exploitation occurs maliciously. Additionally, there is an emphasis on securing infrastructure against growing risks from discovered vulnerabilities—illustrated by hacks on EV chargers from companies like Ubiquiti and Tesla—which underscores adopting secure-by-design practices and maintaining proactive security strategies involving vulnerability scanning and threat detection tools while adhering to industry standards.

Automated summarization by AI Conver

Speaker

Johan Veenstra
Business Development & Partner Manager
VicOne
USA

Talk of session: Securing Data in Charging: How to Enhance Communication Within the Ecosystem

This session will address the growing issues of cybersecurity, authentication and payment in the EV charging ecosystem, focusing on data security, secure payments, and the integrity of communication between vehicles, charging infrastructure, and the grid. Discussions will explore how these aspects can be supported via back-end protocols, including OPNC, open charging standards, PKIs, etc.

Further Talks of this session:

Welcome and Introduction

Speaker

Lonneke Driessen
Director
OCA
The Netherlands

To Talk

Cyber Security Vulnerabilities in the EV Charging Infrastructure, and What We Can and Must Do About It

Speaker

Harm van den Brink
Lead Cyber Security
ElaadNL
The Netherlands

Recording of presentation not authorized for publication.

Information Security and Protocols: An Update on What Is Happening with OCPP, OPNC and PKIs

Speaker

Lonneke Driessen
Director
OCA
The Netherlands

To Talk

Securing Data: Cybersecurity Monitoring of Charging Infrastructure

Speaker

Felix Sprenger
Cybersecurity Officer
Siemens AG
Germany

To Talk

Closing

Speaker

Lonneke Driessen
Director
OCA
The Netherlands

To Talk

Partners & Sponsors

You are using an outdated browser

The website cannot be viewed in this browser. Please open the website in an up-to-date browser such as Edge, Chrome, Firefox, or Safari.