Program Agenda

Insight. Research. Knowledge

This year’s program was uniquely curated by the escar USA Steering Committee. In addition to the invited speakers selected by the committee, submitted papers underwent a blind review process by the Program Committee. In 2026, we are including an Academic Track, focusing on papers from those working on mobility cybersecurity research, as well as a Poster Session.

All approved presentations can be accessed at the conclusion of the event by clicking the presentation title below.

Day 1 Agenda


Time

7:15-8:15 AM

Activity/Presentation

Breakfast

8:15-8:25 AM

Welcome and Introduction

8:25-9:10 AM

Invited Speaker | From Vulnerability Management to Vulnerability Elimination: Rethinking Automotive Software in the Era of AI Offensive Agents

9:10-9:35 AM

Maggie Shipman

9:35- 10:00 AM

Sharika Kumar

Networking Break

10:30- 11:15 AM

Dan Massey

11:15- 11:40AM

Hafiz Malik

11:40 AM- 12:25 PM

Pawel Brzezinski

Lunch

1:25- 1:40 PM

Richard Kerslake

1:40- 1:55 PM

Karl LeBoeuf

1:55- 2:40 PM

Invited Speaker | Euro 7, Anti-tampering and the Expanding Cybersecurity Landscape

Rami Riashy

2:40- 3:05 PM

Shin Li

Networking Break

3:35-4:00 PM

Nimrod Stoler

4:00-4:25 PM

Christos Papadopoulos

4:25-4:50 PM

Doug Britton

4:50-4:55 PM

Closing Remarks

5:00-6:00 PM

5:00-7:00 PM

Evening Reception

Speaker

Ahmad Nasser

Day 2 Agenda


Time

Activity/Presentation

Speaker

7:15-8:15 AM

Breakfast

8:15-8:20 AM

Welcome

8:20-9:05 AM

Annie Dai

9:05-9:30 AM

Roland Varriale

9:30-9:55 AM

Shin Li

9:55-10:20 AM

Brian Murray

Networking Break

Networking Break

10:50-11:15 AM

Sekar Kulandaivel

11:15-11:40 AM

Seungjin Baek

11:40 AM-12:25 PM

Andrew Zonenberg

1:25-1:40 PM

Chad Childers

Lunch

1:40-1:55 PM

Francesca Forestieri

1:55-2:40 PM

Matt Carpenter

Networking Break

3:10-3:35 PM

Pawel Brzezinski

3:35-4:20 PM

Urban Jonson

4:20 PM

Closing Remarks

OUR MISSION

The overall goal and objective of escar is to provide a forum for collaboration among private industry, academia and government regarding modern in-vehicle cybersecurity threats, vulnerabilities and risk mitigation/countermeasures.

WHAT TO EXPECT

Speakers give recent insights and encourage discussions about security in the automotive life cycle, security technologies for automotive components and networks, future security technologies.

Our Sponsors