Automotive Cyber Security
Fuzz testing for connected and autonomous vehicles
The previous blog post in this series presented an introduction to secure software development for modern vehicles. In this blog post, we will do a deep dive on connected and autonomous vehicles (AVs) ...
Yes, You CAN Steal This Car — by Opening the Fender
CAN You Not? Toyota RAV4 and many others vulnerable to CAN bus injection attack. Cars need zero-trust too ...
Secure software development for modern vehicles
Targeted software security practices can help overcome challenges in satisfying emerging cybersecurity standards in the automotive industry ...
Digital License Plates: Stupid, Pointless, Insecure
Reviver’s Rplate digital license plates are insecure: Their design appears to be riddled with privacy holes (not to mention the daft nature of the product itself) ...
Navigating the road ahead for automotive cybersecurity
With challenging cybersecurity requirements on the horizon for automotive companies in 2022, security teams can look to BSIMM12 for guidance. The post Navigating the road ahead for automotive cybersecurity appeared first on ...
Drive down the risks of security threats with secure ELDs
During this National Truck Driver Appreciation Week, we review how to ensure security on the road with ELD cyber security considerations. The post Drive down the risks of security threats with secure ...
Practical solutions for a secure automotive software development process following ISO/SAE 21434
Learn what cyber security activities are critical to building secure automotive software systems using ISO/SAE 21434 as guidance. The post Practical solutions for a secure automotive software development process following ISO/SAE 21434 ...
How to achieve MISRA and AUTOSAR coding compliance
Get practical steps for MISRA and AUTOSAR compliance to improve code quality, safety, and security in automotive software. The post How to achieve MISRA and AUTOSAR coding compliance appeared first on Software ...
Analysis of an attack on automotive keyless entry systems
The convenience of keyless entry systems can come at a price: your security. Learn how key fob hacks happen and why proactive security measures are a vital part of stopping them. The ...
Automotive threat analysis and risk assessment method
The TARA method provides risk evaluation, assessment, treatment, and planning for identified risks. Learn how to apply this method to the ISO SAE 21434 standard. The post Automotive threat analysis and risk ...