Event Feedback | escar USA 2025

Please take a few minutes to tell us your thoughts on escar USA 2025.
1.Which factors influenced your decision to attend escar USA 2025? (select all that apply)(Required.)
2.What were your accommodations during escar USA 2025?(Required.)
3.How do you rate ...(Required.)
Excellent
Good
OK
Poor
No opinion/didn't attend
... the organization of the event?
... the onsite event support?
... the welcome reception Tuesday evening?
... the event materials (e.g., website, handout)?
4.On a scale of 1-10, where 10 is the highest, how would you rate the length and format of escar USA 2025?(Required.)
5.Do you have any thoughts or suggestions on the event length and format?
6.Please rate the presentations at escar USA 2025:(Required.)
Excellent
Good
OK
Poor
No opinion/didn't attend
Everything is Connected: Two Decades of Hacking and Defending the Transportation Infrastructure (Tiffany Rad)
Breaking the Circuit: Attacking EVs, Charging Stations and Management Systems (Shaked Delarea)
Status of the "Cyber'X' Challenges" (Karl Heimer)
Leveraging Large Language Models and Static Code Analysis To Automate Fuzz Testing (Markus Zoppelt)
Back to Security Basics, with Privacy (Andrea Amico)
Roadmap and Status of Joint ISO-SAE Development of Automotive Cybersecurity Publications and Standards (John Krzeszewski)
Collaborative Risk-Sharing Framework for Automotive Cybersecurity (Atefeh Asayesh)
ISO/SAE 21434-based Automotive Risks Assessment Revisited (Amira Barki)
Security Analysis of Ranging Protocols: UWB and Bluetooth Channel Sounding (Sultan Qasim Khan)
Tactical TARA: Is It Safety-critical or Checkbox Compliance? (Urban Jonson)
Drone Security and Fault Injection Attacks (John Sheehy)
SysCall Randomization: A Linux Exploit Mitigation Implemented with Binary Patching (Ryan O'Neill)
Decade of Driving Progress: Insights and Innovations in Automotive Cybersecurity Research (Victor Murray)
SBOMs in the Automotive Indsutry: Real-World Insights and Recommendations (Cortez Frazier Jr.)
Pwn2Own Automotive: Vulnerabilities, Exploits, and Lessons Learned (Brian Gorenc)
A Case Study: Securing Communication Using J1939-91C Certificate-Based Authentication in Autonomous Commercial Vehicles (Joe Lotz)
Fast and Compromised: Automotive Security on a Timer (Omer Ziv)
On The Care and Feeding of Cyber Ninjas, 2025 (Matt Carpenter)
Using EMB3D to Establish Resilient Threat Models for Embedded Devices (Wyatt Ford, Niyo Little Thunder Pearson)
7.On a scale of 1-10, where 10 is "absolutely will" and 1 is "absolutely will not", how likely are you to recommend escar USA to a colleague or friend?(Required.)
8.On a scale of 1-10, where 10 is "absolutely will" and 1 is "absolutely will not", how likely are you to attend future escar USA events?(Required.)
9.We want to hear your comments and ideas. Please tell us what you liked most or would improve about escar USA 2025.
Thank you for your feedback and attending escar USA 2025!