How do you secure 100 million lines of code in a car that's always online?
#1about 2 minutes
The automotive industry's shift to software-defined vehicles
The transition from hardware-centric cars to complex, connected software-defined vehicles introduces new capabilities and challenges.
#2about 3 minutes
Understanding the UNECE R155 cybersecurity regulation
The UNECE R155 regulation mandates a certified cybersecurity management system (CSMS) for all new vehicles, impacting the entire supply chain.
#3about 3 minutes
Managing security over the entire vehicle lifecycle
Vehicle cybersecurity must be maintained for over a decade, requiring continuous monitoring, incident response, and robust over-the-air update capabilities.
#4about 3 minutes
Volkswagen's approach to in-vehicle network security
Volkswagen's security technology kit uses a secure service-oriented architecture (SOA) with TLS to protect in-vehicle communication between ECUs.
#5about 2 minutes
The OBD port as a physical attack vector
The standardized On-Board Diagnostics (OBD) port creates a significant physical vulnerability, comparable to an unsecured USB port on a laptop.
#6about 4 minutes
Real-world examples of modern car hacking techniques
Several real-world examples, including CAN injection, key fob brute-forcing, and relay attacks, demonstrate common vehicle vulnerabilities.
#7about 1 minute
Defending against attacks and the future of automotive security
Ultra-wideband (UWB) technology prevents relay attacks by measuring signal time-of-flight, representing a paradigm shift towards proactive, long-term cybersecurity management.
#8about 3 minutes
Q&A on securing CAN bus and future architectures
The discussion covers securing legacy systems like CAN bus, the role of open standards like AUTOSAR, and the importance of domain separation in future vehicle architectures.
Related jobs
Jobs that call for the skills explored in this talk.
Matching moments
07:51 MIN
An overview of the automotive security landscape
Automotive Security Challenges: A Supplier's View
04:00 MIN
Exploring the security vulnerabilities of connected cars
Using all the HTML, Running State of the Browser and "Modern" is Rubbish
03:18 MIN
The role of security in specialized vehicle projects
Cyber Security: Small, and Large!
06:39 MIN
New threats from modern vehicle E/E architectures
Automotive Security Challenges: A Supplier's View
04:50 MIN
Security challenges of autonomous driving and forensics
Automotive Security Challenges: A Supplier's View
03:43 MIN
Modern cybersecurity challenges for developers
Cyber Security: Small, and Large!
05:19 MIN
Adhering to automotive security standards and regulations
How software is steering vehicle technologyThe automotive industry is entering a transformative era, and developers have a unique opportunity to be part of it. Cars are no longer just mechanical machines; they’re sophisticated tech platforms with software at their core. This shift, defined by...
Chris Heilmann
Dev Digest 138 - Are you secure about this?Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Benedikt Bischof
Walking Into The Era of Supply Chain RisksWelcome to this issue of the WeAreDevelopers Live Talk series. This article recaps an interesting talk by Vandana Verma who introduced the audience interesting topic of supply chain risks.About the Speaker:Vandana is Security Solutions Architect at S...
Chris Heilmann
Dev Digest 110 - XY marks the spotty securityThis time we give you a collection of links about the XZ backdoor, solve the last CODE100 puzzle, announce the next round of it, let you play with colours and explain why Lava lamps are great to keep the web secure.News and ArticlesThe big piece of n...
From learning to earning
Jobs that call for the skills explored in this talk.