Chapter preview · Arc V — Secure what you ship
Chapter 18 — Connected AND Secured? Think Again
Why Every Smart Product Is a Security Liability Across Its Entire Stack – and How To Spec Against It
Connected products run software across layers of silicon, firmware, radios, buses, sensors, cloud APIs, companion apps, and a supply chain of third-party components – every such layer is an attack surface. The failures scale from embarrassed customers to hijacked pacemakers to weaponized national infrastructure. The fixes are well-known – and routinely skipped.
On a July afternoon in 2015, journalist Andy Greenberg climbed into a Jeep Cherokee on the outskirts of St. Louis, merged onto Interstate 64, and began a drive he'd remember for the rest of his career. Two security researchers – Charlie Miller and Chris Valasek – were ten miles away, poring over a laptop in Miller's living room. They had told Greenberg what they planned to do. He had agreed to be the test subject. He still wasn't ready.
First the air conditioning blasted cold. Then the radio switched to a local hip-hop station at full volume. The windshield wipers fired, spraying fluid across the glass. Greenberg was laughing nervously, jabbing at the dashboard controls. Nothing responded.
Want to read the rest?
Join the early access list to get the full chapter and the rest of the book.
Join the Early Access List