Scaling V2X deployments securely and reliably for autonomy
Sasken’s Vasudevan Mukundan and Debashis Panigrahi discuss a cloud-native framework that could scale V2X deployments reliably and securely, reducing cost and time-to-market.
Sasken’s Vasudevan Mukundan and Debashis Panigrahi discuss a cloud-native framework that could scale V2X deployments reliably and securely, reducing cost and time-to-market.
Andrew Coombes and Rohan Pandit of ETAS present a use case of integrating an HSM into a microcontroller hypervisor system.
Elektrobit’s Illia Safiulin provides unique insight into the demands on software solutions needed for new zonal architectures in connected vehicles.
AVL’s Harald Petschnik and Guy Gilam of Cybellum explore the impact of cybersecurity trends on the automotive ecosystem.
Garrett’s Stephane Strahm and Cavy Pan present an IDS software that integrates multi-network and application processor detection-isolation-report-response algorithms.
ESCRYPT’s Dr Moritz Minzlaff and Dr Carolina Adaros of Robert Bosch explain how to build an automotive cybersecurity incident response team.
ESCRYPT experts Joe Cusumano and John McShane discuss automotive-specific fuzzing, a robust testing technique that unmasks hidden security risks in automotive systems.
ESCRYPT’s Rohan Pandit and Suraj Ramachandrappa discuss future market trends and requirements regarding the HSM in the automotive cybersecurity domain towards next-generation vehicle E/E architectures.
Thomas Leifert of Keysight Technologies explains how UNECE WP.29 UN R155 relates to ISO/SAE 21434, the implications to the automotive industry, and how a successful implementation might look.
Paul Wooderson of HORIBA MIRA discusses cybersecurity challenges and solutions when implementing the requirements of the new UNECE Regulation 155 and international standard ISO/SAE 21434.
AVL’s Stefan Marksteiner and Cybellum’s Eyal Traitel explain how cyber digital twins can be automatically derived from automotive components and subsequently used to formulate security tests that verify their cybersecurity.
NXP experts explain why designing ECUs for functional safety, cybersecurity, and AUTOSAR compliance requires an understanding of the embedded hardware and software components available for implementation.
ESCRYPT’s Siddharth Shukla and Andreas Weber discuss different cyber attack prevention techniques and how to combine them with IDS sensors to protect the vehicle E/E architecture.
Experts from ESCRYPT explain why it is essential to use a combination of automated SIEM and human expert teams for fleet security monitoring.
Experts from ESCRYPT provide unique insight into automotive security regulations and standards in China, including MIIT’s critical upcoming regulation.
ESCRYPT’s Jan Holle and Andreas Weber explain why distributed E/E architectures require a distributed IDPS that maps the specific protection needs of the vehicle systems.
Dr. Dennis Kengo Oka outlines a practical step by step guide to building fuzz testing into the CI pipeline using the Zephyr Project RTOS as an example.
SBD Automotive’s Jitesh Joshy and David McClure reveal how true success comes from marrying real-world pen test findings, deep threat modelling expertise, and insight into competitor adoption trends.
ESCRYPT experts discuss the global demands on the ESCRYPT Intrusion Detection and Prevention Solution (IDPS) and its several components based on a review of binding legislation.
EB experts discuss the latest UNECE regulations covering over-the-air software updates and explain how OEMs and suppliers can overcome evolving challenges to implement them successfully.