😀 Hello
-
I am a Director at Linklayer
We help companies solve embedded security problems, offer information security training, and build tools for hackers
-
Previously, I have worked as a Technical Director for NCC Group and as a Principal Consultant for Atredis Partners
-
I serve on the review boards for the Black Hat and Sector conferences
✉️ Contact
-
@ericevenchick on Twitter
-
Eric Evenchick on LinkedIn
-
You can also send me an email
🔨 Projects
-
Open source CAN-FD to USB adapter with isolation and Single Wire CAN
-
Low cost, open source CAN to USB adapter
-
A proof of concept for developing ARM TrustZone applications in Rust
-
Bluetooth low energy device for sniffing the Wiegand protocol
-
Open source tool for offline reverse engineering of automotive diagnostics
📣 Talks
- NorthSec 2021 — Building CANtact Pro
- escar 2021 — Observations from the Front Lines
- Black Hat Europe 2018 — RustZone: Writing Trusted Applications in Rust (info, source)
- DEFCON 26 Car Hacking Village — Go Hack Cars (source)
- Black Hat Asia 2018 — RustZone: Writing Trusted Applications in Rust (info, source, slides)
- SecTor 2017 — Reverse Engineering Automotive Diagnostics (video)
- PyCon USA 2017 — Hacking Cars with Python (info, video, slides)
- Black Hat Asia 2017 — Open Sourcing Automotive Diagnostics (info)
- SecTor 2016 — CANtact: Open Tools for Automotive (video)
- HackInBo 2016 — A Brief Introduction to Automotive Network Security (video)
- NorthSec 2016 — CANtact: Open Tools for Automotive (video)
- Black Hat Asia 2016 — CANtact: Open Tools for Automotive (info, video)
- Black Hat Europe 2015 — Breaking Access Controls with BLEKey (info, video)
- SecTor 2015 — Breaking Access Controls with BLEKey (video)
- Black Hat USA 2015 — Breaking Access Controls with BLEKey (info, video)
- NorthSec 2015 — Hopping on the CAN Bus (video)
- Black Hat Asia 2015 — Hopping on the CAN Bus (info, video, slides)