Scaling software-defined vehicle security without increasing costs
Upstream and Blackberry experts discuss the role of synthetic sensors in automotive cybersecurity and how to reduce cloud computing and data traffic costs via edge computing.
Upstream and Blackberry experts discuss the role of synthetic sensors in automotive cybersecurity and how to reduce cloud computing and data traffic costs via edge computing.
Argus Cyber Security and dSPACE experts explain how to mitigate risks by harnessing HIL benches for automated testing in the development stages.
Upstream’s Giuseppe Serio and Shira Sarid-Hausirer share significant findings from the 2024 Global Automotive Cyber Trends Report.
FEV’s Brandon Schulte explores the practical side of automotive cybersecurity and breaks down the complexities through Threat Analysis and Risk Assessment activities.
Elektrobit’s Illia Safiulin discusses zonal architectures and their impact on a real-life scenario regarding in-vehicle communication networks.
UL Solutions and Scaled Agile explain how they have extended their Automotive Process Framework (AFP) to support Essential Scaled Agile Framework® (SAFe®).
Elektrobit’s Isaac Trefz and Uwe Hildebrand present findings from research aimed at creating a proof-of-concept using NXP S32G2 with its HSE subsystem as the target hardware platform.
Upstream’s cybersecurity experts discuss how vSOCs rapidly expand to deliver transformative value beyond compliance.
Continental’s Andreas Greff explains how to use the Continental Automotive Edge cloud-based framework for projects which require the decoupling of software and hardware development.
OpenSynergy’s Pierre-Antoine Bernard explains how COQOS Hypervisor SDK for high-end microcontrollers allows the integration of heterogeneous and mixed-critical software stacks while still maintaining strong isolation.
Siddharth Shukla of ETAS and NXP’s Karthik Sivaramakrishnan demonstrate how to leverage hardware support from NXP’s TJA1153 secure CAN transceiver to enhance IDPS solutions.
Marcos Cardoso and Thomas Irmscher of ETAS explain what automotive security fuzz testing is about and share practical use cases and recipes to use fuzzing in vehicle projects efficiently.
Elektrobit’s Pavithra Kumaraswamy and Andrei Rus explain how to enable secured global time synchronization in automotive networks to reduce potential security risks in vehicles.
Garrett Motion’s George Olaru and Andrei Sin analyze current and future network architectures and explore the cybersecurity solutions in use, assessing their scope and advantages.
NXP’s Thomas Brown and Charlotte Li discuss how the vehicle computer enables these new experiences while respecting the challenges and risks of functional safety and cyber security.
Hitachi and Argus Cyber Security explain how to carry out vehicle vulnerability management earlier in the design process to save time and effort, improve the vehicle’s cyber posture, and shorten time-to-value.
Omar Alshabibi of ETAS explains how to secure the vehicle computer for its entire lifecycle to ensure protection against malicious actors and enable the SDV.
Elektrobit’s Joachim Schlosser discusses problems and possible solutions associated with open-source components and platforms in the automotive industry.
NXP’s Fabrice Poulard explains how to to build in security as part of the architecture rather than trying to layer it on top of an existing design.
Thomas Irmscher and Abdallah Ourad of ETAS discuss their experience of penetration testing on a full-vehicle level and explain how to use a multi-layered approach and powerful tools to make the process easier.