autonomous vehicle security | Synopsys

Fuzz testing for connected and autonomous vehicles

The previous blog post in this series presented an introduction to secure software development for modern vehicles. In this blog post, we will do a deep dive on connected and autonomous vehicles (AVs) ...
Yes, You CAN Steal This Car — by Opening the Fender

Yes, You CAN Steal This Car — by Opening the Fender

CAN You Not? Toyota RAV4 and many others vulnerable to CAN bus injection attack. Cars need zero-trust too ...
Security Boulevard
Secure software development for modern vehicles

Secure software development for modern vehicles

Targeted software security practices can help overcome challenges in satisfying emerging cybersecurity standards in the automotive industry ...
Digital License Plates: Stupid, Pointless, Insecure

Digital License Plates: Stupid, Pointless, Insecure

Reviver’s Rplate digital license plates are insecure: Their design appears to be riddled with privacy holes (not to mention the daft nature of the product itself) ...
Security Boulevard
Navigating the road ahead for automotive cybersecurity

Navigating the road ahead for automotive cybersecurity

With challenging cybersecurity requirements on the horizon for automotive companies in 2022, security teams can look to BSIMM12 for guidance. The post Navigating the road ahead for automotive cybersecurity appeared first on ...
Drive down the risks of security threats with secure ELDs

Drive down the risks of security threats with secure ELDs

During this National Truck Driver Appreciation Week, we review how to ensure security on the road with ELD cyber security considerations. The post Drive down the risks of security threats with secure ...
Practical solutions for a secure automotive software development process following ISO/SAE 21434

Practical solutions for a secure automotive software development process following ISO/SAE 21434

Learn what cyber security activities are critical to building secure automotive software systems using ISO/SAE 21434 as guidance. The post Practical solutions for a secure automotive software development process following ISO/SAE 21434 ...
How to achieve MISRA and AUTOSAR coding compliance

How to achieve MISRA and AUTOSAR coding compliance

Get practical steps for MISRA and AUTOSAR compliance to improve code quality, safety, and security in automotive software. The post How to achieve MISRA and AUTOSAR coding compliance appeared first on Software ...
Analysis of an attack on automotive keyless entry systems

Analysis of an attack on automotive keyless entry systems

The convenience of keyless entry systems can come at a price: your security. Learn how key fob hacks happen and why proactive security measures are a vital part of stopping them. The ...
Automotive threat analysis and risk assessment method

Automotive threat analysis and risk assessment method

The TARA method provides risk evaluation, assessment, treatment, and planning for identified risks. Learn how to apply this method to the ISO SAE 21434 standard. The post Automotive threat analysis and risk ...