For every security feature added to a vehicle, we earn a new key management problem. A major supplier explains this immense challenge.
#1about 5 minutes
Understanding the role of a Tier 1 automotive supplier
Bosch Engineering operates as a key supplier for diverse mobility sectors, integrating cybersecurity into custom components and vehicle concepts.
#2about 8 minutes
An overview of the automotive security landscape
The increasing connectivity in modern vehicles expands the attack surface, creating significant safety risks and data privacy concerns.
#3about 5 minutes
Learning from historical and recent vehicle attacks
Analyzing past incidents like the Jeep Cherokee hack and current CAN bus injection exploits reveals how attackers can gain physical and remote control of vehicles.
#4about 7 minutes
Hardware limitations and secure communication challenges
Long hardware lifecycles and resource constraints create significant challenges for implementing features like secure onboard communication (SecOC) with its strict latency requirements.
#5about 7 minutes
New threats from modern vehicle E/E architectures
The trend toward centralized, software-defined vehicles using containers and hypervisors increases complexity and introduces new threats like ransomware.
#6about 6 minutes
Managing keys and updates over the vehicle lifetime
Suppliers face significant challenges in managing cryptographic keys and preserving software build chains to deliver secure updates for over 15 years.
#7about 2 minutes
Preparing for the threat of post-quantum cryptography
The industry must plan for post-quantum cryptography now to protect vehicles that will still be on the road when current algorithms are broken.
#8about 5 minutes
Adhering to automotive security standards and regulations
Regulations like ISO 21434 and UNECE R155 drive security processes, requiring suppliers to establish vulnerability management programs and support OEMs in achieving vehicle type approval.
#9about 5 minutes
Security challenges of autonomous driving and forensics
Autonomous vehicles require tight co-engineering of safety and security, along with new capabilities for digital forensics to investigate incidents.
Related jobs
Jobs that call for the skills explored in this talk.
Dev Digest 138 - Are you secure about this?Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Daniel Cranney
How software is steering vehicle technologyThe automotive industry is entering a transformative era, and developers have a unique opportunity to be part of it. Cars are no longer just mechanical machines; they’re sophisticated tech platforms with software at their core. This shift, defined by...
Daniel Cranney
Dev Digest 191: Malware interviews, EU ❤️ Open Source and Skilled AgentsInside last week’s Dev Digest 191 .
💻 Want to write for the WeAreDevelopers Magazine?
⚒️ Claude skills - a less token hungry MCP?
🫰 How much does Cursor spend on AWS?
🧠 LLMs and Brain Rot
🟥 Change your NPM tokens now!
🧑 Fake AI recruiters delivering...