As a Tesla owner, I think this is great, because as an Engineer, I fully expect that Tesla was get owned (literally) here. I have no problem with that - I want people trying to break the security, and I want Tesla to pay them, and to improve it.<p>The reality is that a Tesla is mostly really good software, really good engine, and really good battery, surrounded by a reasonable (but not excellent) rest of the car. That's more then worth it to me, and the Tesla Stretch is real, because the car is incredibly compelling. I would argue that the value is just as much a outcome of the software, and it needs to be hardened.
From what I've read about Tesla's software this could be a <i>bold move</i>.<p>Between the infotainment system, onboard Linux computer, autopilot, self-driving hardware, OTA updates, mobile apps, and the amount they phone home, Tesla are probably doing some of the most advanced computing in any consumer car (some deconstructions have suggested they are miles ahead here, pardon the pun).<p>This is great, but it all comes with additional surface area for attacks, and software engineers have spoken out about the fast paced shipping that happens at Tesla and the corners that are cut as a result.
This will be interesting. A Jeep Cherokee was hacked a couple years ago. The results are pretty bad. It cost Chrysler a lot of money in recalls to fix the issue.[1]<p>[1]<a href="https://www.wired.com/2016/08/jeep-hackers-return-high-speed-steering-acceleration-hacks/" rel="nofollow">https://www.wired.com/2016/08/jeep-hackers-return-high-speed...</a>
Regardless, how good/bad Tesla software will fair with the security contest, this is the best possible way to improve product security within a short amount of time, just like the cat-and-mouse game Apple play with the Jailbreaking community.
> Entries against “Key Fobs or Phone-as-Key” target must achieve code execution, arbitrary vehicle unlock, or arbitrary vehicle start using protocol-related weaknesses. Entries related to Key Fob relay or “rolljam” attacks are not allowed<p>Does that mean that they think that such attacks are too easy? If they use rolling codes, will they classify any attack with jamming as "rolljam"? If they don't, why specify this?
If my understanding of the pwn2own event is correct, it's not a CTF event and the exploits are typically developed in advance, and then demonstrated during the event? If there are 2 or more exploits which all work reliably, who is determined to be the "winner"?
This is some seriously good marketing. Tesla is in a unique position to offer their car up as a prize and target. Other manufacturers could do this but because it is hard to update their firmware they don't do it.
What prize do you get for pwning it sufficiently to make it drive off on its own? Sounds like that would be the ultimate hacking competition: you get the car if you make it drive to your own home.
Undergrads at various universities regularly pwn vehicle systems and write reports about it for academic credit. The M3 has a lot more surface area than the typical car most people are hacking. My prediction is that the M3 is gonna get chewed up and spit out. This isn't a "will it get pwned" competition it's a "who will pwn it best/fastest" competition.
It looks like Tesla doesn't update many parts of its OS; <a href="https://www.reddit.com/r/teslamotors/comments/ag6r2f/please_help_our_turkish_tesla_community_reach/" rel="nofollow">https://www.reddit.com/r/teslamotors/comments/ag6r2f/please_...</a>
This is a great contest. The value of winning a Tesla will be more than the value of the Model3 up for grabs.<p>And it's relatively cheap for Tesla to pay out to get these vulnerabilities found and addressed.
I give it 67 seconds<p>edit: there is nothing stopping someone from leasing a tesla, finding an exploit and shooting it within the first 10 seconds, no? In general, how does this work at pwn2own?
> And the first successful researcher can also drive off in their own brand new Model 3 after the competition ends<p>If you've successfully hacked a car and shared your method would you then get in said car and drive it away? I'd like a patch or at least a factory reset first....
Nice marketing stunt, but how many security researchers already have a Model 3 or are going to buy one to do this?<p>Guessing just already-successful firms / personalities that want to win Tesla pen-testing contracts in the future?<p>Or has Tesla released binary blobs of their firmware systems online?