Tim Krach
I’m a security engineer specializing in embedded and automotive systems, currently leading penetration testing activities and supporting broader security initiatives at Astemo.
As one of our full-time security specialists, I drive both technical assessments and strategic improvements – performing full-scope pentests, leading Threat Analysis and Risk Assessments (TARA), and influencing product development toward secure design.
With a background in reverse engineering, software development, and vulnerability research, I combine deep technical expertise with strong Japanese communication skills to advocate for security across teams and bridge gaps between engineers, managers, and OEM customers.
Car Hacking Village - Intro to CAN with RAMN
The Car Hacking Village workshop provides a hands-on introduction to the CAN protocol using Toyota’s open source hardware platform, the Resistant Automotive Miniature Network. The session begins with a short overview of the RAMN, followed by guidance on how to connect and get set up. Participants will then work through a series of capture-the-flag challenges that explore different aspects of CAN communication and behavior using the RAMN hardware. The workshop is designed to be largely self-directed, with the speaker available throughout to assist with setup issues and to help participants overcome technical hurdles during the challenges. A laptop capable of running Linux, either natively or in a virtual machine, is required. Participants should also have can-utils or another Linux-based CAN tool installed prior to the workshop.



