Davor Frkat

Automotive Security Challenges: A Supplier's View

For every security feature added to a vehicle, we earn a new key management problem. A major supplier explains this immense challenge.

Automotive Security Challenges: A Supplier's View
#1about 5 minutes

Understanding the role of a Tier 1 automotive supplier

Bosch Engineering operates as a key supplier for diverse mobility sectors, integrating cybersecurity into custom components and vehicle concepts.

#2about 8 minutes

An overview of the automotive security landscape

The increasing connectivity in modern vehicles expands the attack surface, creating significant safety risks and data privacy concerns.

#3about 5 minutes

Learning from historical and recent vehicle attacks

Analyzing past incidents like the Jeep Cherokee hack and current CAN bus injection exploits reveals how attackers can gain physical and remote control of vehicles.

#4about 7 minutes

Hardware limitations and secure communication challenges

Long hardware lifecycles and resource constraints create significant challenges for implementing features like secure onboard communication (SecOC) with its strict latency requirements.

#5about 7 minutes

New threats from modern vehicle E/E architectures

The trend toward centralized, software-defined vehicles using containers and hypervisors increases complexity and introduces new threats like ransomware.

#6about 6 minutes

Managing keys and updates over the vehicle lifetime

Suppliers face significant challenges in managing cryptographic keys and preserving software build chains to deliver secure updates for over 15 years.

#7about 2 minutes

Preparing for the threat of post-quantum cryptography

The industry must plan for post-quantum cryptography now to protect vehicles that will still be on the road when current algorithms are broken.

#8about 5 minutes

Adhering to automotive security standards and regulations

Regulations like ISO 21434 and UNECE R155 drive security processes, requiring suppliers to establish vulnerability management programs and support OEMs in achieving vehicle type approval.

#9about 5 minutes

Security challenges of autonomous driving and forensics

Autonomous vehicles require tight co-engineering of safety and security, along with new capabilities for digital forensics to investigate incidents.

Related jobs
Jobs that call for the skills explored in this talk.

d

Saby Company
Delebio, Italy

Junior

test

Milly
Vienna, Austria

Intermediate

Featured Partners

Related Articles

View all articles
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?
DC
Daniel Cranney
How software is steering vehicle technology
The automotive industry is entering a transformative era, and developers have a unique opportunity to be part of it. Cars are no longer just mechanical machines; they’re sophisticated tech platforms with software at their core. This shift, defined by...
How software is steering vehicle technology
BB
Benedikt Bischof
Walking Into The Era of Supply Chain Risks
Welcome to this issue of the WeAreDevelopers Live Talk series. This article recaps an interesting talk by Vandana Verma who introduced the audience interesting topic of supply chain risks.About the Speaker:Vandana is Security Solutions Architect at S...
Walking Into The Era of Supply Chain Risks
CH
Chris Heilmann
WWC24 Talk - Scott Hanselman - AI: Superhero or Supervillain?
Join Scott Hanselman at WWC24 to explore AI's role as a superhero or supervillain. Scott shares his 32 years of experience in software engineering, discusses AI myths, ethical dilemmas, and tech advancements. Engage with his live demos and insights o...
WWC24 Talk - Scott Hanselman - AI: Superhero or Supervillain?

From learning to earning

Jobs that call for the skills explored in this talk.