For every security feature added to a vehicle, we earn a new key management problem. A major supplier explains this immense challenge.
#1about 5 minutes
Understanding the role of a Tier 1 automotive supplier
Bosch Engineering operates as a key supplier for diverse mobility sectors, integrating cybersecurity into custom components and vehicle concepts.
#2about 8 minutes
An overview of the automotive security landscape
The increasing connectivity in modern vehicles expands the attack surface, creating significant safety risks and data privacy concerns.
#3about 5 minutes
Learning from historical and recent vehicle attacks
Analyzing past incidents like the Jeep Cherokee hack and current CAN bus injection exploits reveals how attackers can gain physical and remote control of vehicles.
#4about 7 minutes
Hardware limitations and secure communication challenges
Long hardware lifecycles and resource constraints create significant challenges for implementing features like secure onboard communication (SecOC) with its strict latency requirements.
#5about 7 minutes
New threats from modern vehicle E/E architectures
The trend toward centralized, software-defined vehicles using containers and hypervisors increases complexity and introduces new threats like ransomware.
#6about 6 minutes
Managing keys and updates over the vehicle lifetime
Suppliers face significant challenges in managing cryptographic keys and preserving software build chains to deliver secure updates for over 15 years.
#7about 2 minutes
Preparing for the threat of post-quantum cryptography
The industry must plan for post-quantum cryptography now to protect vehicles that will still be on the road when current algorithms are broken.
#8about 5 minutes
Adhering to automotive security standards and regulations
Regulations like ISO 21434 and UNECE R155 drive security processes, requiring suppliers to establish vulnerability management programs and support OEMs in achieving vehicle type approval.
#9about 5 minutes
Security challenges of autonomous driving and forensics
Autonomous vehicles require tight co-engineering of safety and security, along with new capabilities for digital forensics to investigate incidents.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
03:18 MIN
The role of security in specialized vehicle projects
Cyber Security: Small, and Large!
02:58 MIN
Volkswagen's approach to in-vehicle network security
Cybersecurity for Software Defined Vehicles
03:11 MIN
Managing security over the entire vehicle lifecycle
Cybersecurity for Software Defined Vehicles
04:00 MIN
Exploring the security vulnerabilities of connected cars
Using all the HTML, Running State of the Browser and "Modern" is Rubbish
03:18 MIN
Q&A on securing CAN bus and future architectures
Cybersecurity for Software Defined Vehicles
02:32 MIN
Bosch's strategy for connected, automated, and electrified vehicles
On developing smartphones on wheels
01:57 MIN
The automotive industry's shift to software-defined vehicles
Cybersecurity for Software Defined Vehicles
06:22 MIN
Exploring real-world automotive use cases from Bosch
The future of automotive mobility: Upcoming E/E architectures, V2X and its challenges
Dev Digest 138 - Are you secure about this?Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Daniel Cranney
How software is steering vehicle technologyThe automotive industry is entering a transformative era, and developers have a unique opportunity to be part of it. Cars are no longer just mechanical machines; they’re sophisticated tech platforms with software at their core. This shift, defined by...
Benedikt Bischof
Walking Into The Era of Supply Chain RisksWelcome to this issue of the WeAreDevelopers Live Talk series. This article recaps an interesting talk by Vandana Verma who introduced the audience interesting topic of supply chain risks.About the Speaker:Vandana is Security Solutions Architect at S...
Chris Heilmann
Dev Digest 110 - XY marks the spotty securityThis time we give you a collection of links about the XZ backdoor, solve the last CODE100 puzzle, announce the next round of it, let you play with colours and explain why Lava lamps are great to keep the web secure.News and ArticlesThe big piece of n...
From learning to earning
Jobs that call for the skills explored in this talk.