Upstream’s Giuseppe Serio and Professor Hans-Joachim Hof of the Technische Hochschule Ingolstadt explain how stakeholders can implement threat analysis and make intelligent changes to secure the new E-mobility landscape.
Experts from Marvell and Elektrobit explain how innovative hardware solutions and intelligent software can jointly deal with the challenges posed by emerging connected vehicle trends.
Michael Schneider of ETAS explains how AUTOSAR offers a way to implement a multi-level security approach by providing standardized security building blocks that can be used off the shelf.
Norbert Bissmeyer and Omar Alshabibi of ETAS explain how OEMs can create efficient and secure V2X PKI integration with a global harmonized solution.
Sasken’s Narasimha Bashyam and Debashis Panigrahi explain how to stay on top of Android security releases to maintain customer loyalty.
Tero Salminen of OpenSynergy explains how virtualizing a single function increases connected vehicle systems security and makes updating and upgrading software components much more straightforward.
Sasken’s Vasudevan Mukundan and Debashis Panigrahi discuss a cloud-native framework that could scale V2X deployments reliably and securely, reducing cost and time-to-market.
Andrew Coombes and Rohan Pandit of ETAS present a use case of integrating an HSM into a microcontroller hypervisor system.
Elektrobit’s Illia Safiulin provides unique insight into the demands on software solutions needed for new zonal architectures in connected vehicles.
AVL’s Harald Petschnik and Guy Gilam of Cybellum explore the impact of cybersecurity trends on the automotive ecosystem.
Garrett’s Stephane Strahm and Cavy Pan present an IDS software that integrates multi-network and application processor detection-isolation-report-response algorithms.
ESCRYPT’s Dr Moritz Minzlaff and Dr Carolina Adaros of Robert Bosch explain how to build an automotive cybersecurity incident response team.
ESCRYPT experts Joe Cusumano and John McShane discuss automotive-specific fuzzing, a robust testing technique that unmasks hidden security risks in automotive systems.
ESCRYPT’s Rohan Pandit and Suraj Ramachandrappa discuss future market trends and requirements regarding the HSM in the automotive cybersecurity domain towards next-generation vehicle E/E architectures.
Thomas Leifert of Keysight Technologies explains how UNECE WP.29 UN R155 relates to ISO/SAE 21434, the implications to the automotive industry, and how a successful implementation might look.
Paul Wooderson of HORIBA MIRA discusses cybersecurity challenges and solutions when implementing the requirements of the new UNECE Regulation 155 and international standard ISO/SAE 21434.
AVL’s Stefan Marksteiner and Cybellum’s Eyal Traitel explain how cyber digital twins can be automatically derived from automotive components and subsequently used to formulate security tests that verify their cybersecurity.
NXP experts explain why designing ECUs for functional safety, cybersecurity, and AUTOSAR compliance requires an understanding of the embedded hardware and software components available for implementation.
ESCRYPT’s Siddharth Shukla and Andreas Weber discuss different cyber attack prevention techniques and how to combine them with IDS sensors to protect the vehicle E/E architecture.
Experts from ESCRYPT explain why it is essential to use a combination of automated SIEM and human expert teams for fleet security monitoring.