AUTOSAR for holistic vehicle protection
ESCRYPT’s Dr Michael Peter Schneider examines the security mechanisms included in the latest AUTOSAR releases and explains how they should be integrated into the Software Engineering Process.
ESCRYPT’s Dr Michael Peter Schneider examines the security mechanisms included in the latest AUTOSAR releases and explains how they should be integrated into the Software Engineering Process.
Experts from OpenSynergy and LDRA discuss the inherent security of a virtualized architecture, and how that strength can be underpinned by applying secure development techniques to code that handles data passed between processes.
ESCRYPT’s cybersecurity experts discuss the organizational processes that OEMs and suppliers must implement to comply with the latest software update delivery regulations.
Experts from Elektrobit and Argus Cyber Security explain the need for a secure architecture and how to enforce security zones with intrusion detection and prevention systems.
Experts from ESCRYPT explain how and to what extent you can use the existing AUTOSAR security software to realize UNECE-compliant automotive cybersecurity.
ESCRYPT’s Omar Alshabibi explains how to bootstrap a V2X OBU or RSU at the manufacturing plant of an OEM or Tier 1 supplier in the most efficient way.
AVL’s Stefan Marksteiner and David Tromba explain how to structure cybersecurity testing in an automotive environment.
Experts from ESCRYPT, KPMG, and Alyne discuss how to manage cybersecurity supplier governance effectively.
ESCRYPT’s Dr. Eng. Siddharth Shukla provides insight into E/E architecture trends, focusing on the benefits and challenges of Ethernet in automotive E/E architectures.
ESCRYPT’s Dr Efstathia Katsigianni outlines the role of asymmetric cryptography for the security of automotive systems.
Experts from Elektrobit and Argus Cyber Security provide insight into the technology challenges posed by the new requirements and discuss innovative ways in which OEMs and their suppliers can address them.
EB’s Dr Sebastian Ohl outlines a new approach to the development and integration of next-generation automotive architectures based on HPC.
ESCRYPT’s Dr. Martin Moser provides insight into different IT security testing methods, the benefits of whitebox testing, and discusses the system components that should be tested.
In this webinar, Jill Britton and Steve Howard of Perforce discuss what it means to comply with a coding standard, and how to achieve compliance quickly and efficiently.
FEV’s Tom Tasky discusses how gateway technology has become critical for prototype and proof-of-concept connected vehicle builds.
Experts from Altran discuss how the company’s combined expertise in automotive, connectivity engineering, cybersecurity and data science can help to monetize V2X beyond road safety.
A panel of experts from Canoo, Linux Foundation/AGL, Sibros, UL and Uptane, explore the importance of safety-driven automotive security.
AVL experts discuss the Ajunic ECU, which can be installed in passenger and commercial vehicles to implement ADAS and automated driving functions.
The Co-Chairs of the UNECE Task Force share their perspective on the process of drafting a vehicle cybersecurity regulation and how they see it impacting the industry.
ESCRYPT’s Dr. Jan Holle provides unique insight into the deployment of network-based intrusion detection systems (IDS) in vehicles.