How do you secure 100 million lines of code in a car that's always online?
#1about 2 minutes
The automotive industry's shift to software-defined vehicles
The transition from hardware-centric cars to complex, connected software-defined vehicles introduces new capabilities and challenges.
#2about 3 minutes
Understanding the UNECE R155 cybersecurity regulation
The UNECE R155 regulation mandates a certified cybersecurity management system (CSMS) for all new vehicles, impacting the entire supply chain.
#3about 3 minutes
Managing security over the entire vehicle lifecycle
Vehicle cybersecurity must be maintained for over a decade, requiring continuous monitoring, incident response, and robust over-the-air update capabilities.
#4about 3 minutes
Volkswagen's approach to in-vehicle network security
Volkswagen's security technology kit uses a secure service-oriented architecture (SOA) with TLS to protect in-vehicle communication between ECUs.
#5about 2 minutes
The OBD port as a physical attack vector
The standardized On-Board Diagnostics (OBD) port creates a significant physical vulnerability, comparable to an unsecured USB port on a laptop.
#6about 4 minutes
Real-world examples of modern car hacking techniques
Several real-world examples, including CAN injection, key fob brute-forcing, and relay attacks, demonstrate common vehicle vulnerabilities.
#7about 1 minute
Defending against attacks and the future of automotive security
Ultra-wideband (UWB) technology prevents relay attacks by measuring signal time-of-flight, representing a paradigm shift towards proactive, long-term cybersecurity management.
#8about 3 minutes
Q&A on securing CAN bus and future architectures
The discussion covers securing legacy systems like CAN bus, the role of open standards like AUTOSAR, and the importance of domain separation in future vehicle architectures.
Related jobs
Jobs that call for the skills explored in this talk.
How software is steering vehicle technologyThe automotive industry is entering a transformative era, and developers have a unique opportunity to be part of it. Cars are no longer just mechanical machines; they’re sophisticated tech platforms with software at their core. This shift, defined by...
Chris Heilmann
Dev Digest 138 - Are you secure about this?Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Daniel Cranney
Understanding and Mitigating Common Web VulnerabilitiesVulnerabilities exist in many forms on the web, and attackers continue to find creative ways to exploit them.
Technological advances like the proliferation of AI are of course exciting nd filled with opportunities, they equally present opportunities ...
Benedikt Bischof
Walking Into The Era of Supply Chain RisksWelcome to this issue of the WeAreDevelopers Live Talk series. This article recaps an interesting talk by Vandana Verma who introduced the audience interesting topic of supply chain risks.About the Speaker:Vandana is Security Solutions Architect at S...
From learning to earning
Jobs that call for the skills explored in this talk.