Refine Your Search

Topic

Search Results

Article

2014-07-31
Finding ways to prevent cyber attacks on vehicles has the attention of the global automotive industry as well as a few high school and college students.
Article

2019-05-22
The researchers at the COE for Assured Autonomy in Contested Environments – all of which histories of innovation for Department of Defense problems of interest – will focus on the availability, integrity, and effective use of information by leveraging its diverse expertise in dynamics, mathematics, control theory, information theory, communications, and computer science.
Article

2017-04-06
The number of threats will increase rapidly as more vehicles are connected, and vulnerabilities on older vehicles will be in constant need of updating.
Article

2019-04-22
Software needs security. That's a consequence of using software to control critical systems. It's difficult because software is inherently a complex artifact, even when the code just consists of a single sequential program in a single programming language, with well-defined inputs and outputs. Of course, actual software rarely if ever has such a simple structure. Security needs software. That's a consequence of the complexity just mentioned. No process can ensure security at scale unless it is automated by using software itself: programming languages, verification tools, software platforms.
Article

2018-04-11
Blatant security hacks on connected/autonomous vehicles aren’t the “big threat.” A security expert believes the top hacking targets will be hard-to-detect, and the potential source of that information: in-vehicle microphones.
Article

2014-12-03
Although in-vehicle vulnerabilities have been identified, others exist in cloud-based systems. Public facilities, from traffic-light-controlling central computers to non-automotive infrastructure, may have little or no protection, speakers asserted.
Article

2019-08-13
Austrian telematics company, Dolphin Technologies GmbH, has created a new cryptocurrency that could lead to less mobile phone-related traffic accidents. The company’s Mobilio app rewards drivers with points when they ignore their mobile phones while driving.
Article

2017-06-16
It's possible to thwart most, but not all, cyber incidents.
Article

2017-03-17
Experts serve cautionary tales for connected cars while discussing potential cyber solutions.
Article

2018-04-11
Connectivity gives automakers and industry suppliers a wealth of data, but it’s not going to be easy to turn that data into useful information.
Article

2015-12-16
Connectivity opens vehicle systems to the dark side of the Internet, forcing automakers to quickly develop strategies to ensure that they don’t join the litany of corporations hit by hack attacks. SAE is nearing the release of the J3061 best practices document that will help OEMs create structured programs that provide protection that will remain effective throughout vehicle lifetimes.
Article

2016-06-30
As new vehicles become more connected to the internet, to other cars, and to the road infrastructure, the number of potential intrusion points for hackers is growing fast.
Article

2019-02-14
As mobility software becomes increasingly complex and connected, so does the risk of human error and system safety. To combat this, New York-based software company AdaCore will work with Nvidia Corporation of Santa Clara, California to apply open-source Ada and SPARK programming languages for select software security firmware elements in highly-complex, safety-critical systems like Nvidia’s DRIVE AGX automated and autonomous vehicle solutions.
Article

2016-01-04
A hacked Jeep Cherokee and weakness in a Progressive Insurance dongle were cited at forum as what should be avoided with future efforts to develop meaningful college curriculum in cyber security.
Article

2019-08-09
ArmorFlash provides non-volatile memory (NVM) storage of encrypted and integrity-protected assets for for artificial intelligence (AI)-based Level 2+ advanced driver assistance systems (ADAS) through Level 5 autonomous driving solutions.
Article

2019-08-26
The Commonwealth Center for Advanced Manufacturing (CCAM), a non-profit consortium based in Prince George County, Virginia, uses a 3D visualization lab to expand beyond the walls of its 62,000-square-foot brick and mortar facility and deliver a collaborative development for researchers in industry, academia, and government.
Article

2019-07-18
The Mobility Open Blockchain Initiative – a global nonprofit working to create standards in blockchain, distributed ledgers, and related technologies for consumers, smart cities, and mobility – has launched the industry's first vehicle identification (VID) standard incorporating blockchain technology into a digital vehicle identification system.
Article

2019-05-29
Agencies involved in the operation obtained a special exemption from the Federal Aviation Administration’s national security flight restrictions over the airspace above the event, for purposes of keeping the crowds, drivers, and race personnel safe.
Article

2019-06-24
Airbus intends to closely cooperate with start-ups in order to unlock new technologies in artificial intelligence, data analytics, and cyber security for France and Germany’s Future Combat Air System (FCAS) program.
Article

2019-06-04
Through this work, Wind River and Airbiquity look to enable secure and intelligent software updates and data management for these vehicles through over-the-air (OTA) programming technology. The work may also lead to similar solutions for traditional aerospace and unmanned aircraft system (UAS) industries.
X