Refine Your Search

Search Results

Viewing 1 to 8 of 8
Training / Education

Keys to Creating a Cybersecurity Process from the J3061 Process Framework

Connected vehicles are increasingly seen as a potential target for cybersecurity attacks. A key differentiator for the automotive industry is the use of cyber-physical systems, where a successful cybersecurity attack could affect physical entities. Often involving embedded electronics and real time control, these systems require different solutions in addition to established IT security principles and reactive responses to threats. Cybersecurity needs to be designed and built into cyber-physical systems throughout the development lifecycle to provide defense in depth.
Training / Education

Introduction to Car Hacking with CANbus

Vehicle cybersecurity vulnerabilities could impact a vehicle's safe operation. Therefore, engineers should ensure that systems are designed free of unreasonable risks to motor vehicle safety, including those that may result due to existence of potential cybersecurity vulnerabilities. The automotive industry is making vehicle cybersecurity an organizational priority.
Training / Education

Introduction to the Secure Microkernel, seL4

2019-07-16
Security continues to be an ever-growing concern in more and more design spaces. There are daily articles about security breaches and there is a need for much higher security through the entire system stack. Thorough testing of systems can lead to stronger security in systems, but testing can only expose so many vulnerabilities. Formal methods is another solution that ensures specific behaviors will not occur. seL4 is the first formally proven microkernel and it is open-source. This makes it a great solution for systems that need strong security.
Training / Education

Performing a Cybersecurity Threat Analysis and Risk Assessment

2019-06-24
SAE J3061 sets out a recommended cybersecurity engineering process framework for organizations developing cyber physical systems. One of the recommendations of this framework is to carry out a threat analysis and risk assessment early in the product development. A threat analysis identifies and models the relevant threats against assets, and a risk assessment classifies the impact and likelihood associated with each threat. The approach enables the prioritization of risks and appropriate risk treatment measures to be determined in subsequent development phases.
Training / Education

Validating Requirements and Improving Specifications with Telematics Data

2019-06-19
Field failures cause high warranty expenses, perhaps the highest quality cost. Failures occur when new designs are introduced, existing products are sold in new markets, and product specifications don’t reflect actual product usage. Any mistake in product specifications affects the entire product development process and cascades through the supply chain. New product requirements are developed using prior requirements, rely on customer surveys, use “expert” opinion, or are the result of compromises to meet timing or management direction. The resulting requirements may be excessive or insufficient.
Training / Education

Keys to Creating a Cybersecurity Process from the J3061 Process Framework

2019-04-29
Connected vehicles are increasingly seen as a target for cybersecurity attacks. A key differentiator for the automotive industry is the use of cyber-physical systems, where a successful cybersecurity attack can affect physical entities. Often involving embedded electronics and real time control, these systems require different solutions in addition to established IT security principles and reactive responses to threats. Cybersecurity needs to be designed and built into cyber-physical systems throughout the development lifecycle to provide defense in depth.
Training / Education

Cybersecurity An Introduction for the Automotive Sector

2019-04-26
The automotive industry is the new "battleground" for cybersecurity. Following the path of desktops/laptops, tablets, and mobile phones, the automotive industry is now the "hot" area for both academic researchers and hackers. This will transform the automotive industry just as it transformed traditional information technology and the mobile markets; it is inescapable, but it can be beneficial and a well prepared company can find significant benefit in being a market leader. What does cybersecurity mean? Who is attacking and why? What must we change? What can stay the same? What is the larger organization's role in cyber?
Training / Education

Design Considerations for Secure Embedded Systems

2019-04-22
Embedded hardware is everywhere you look today from your vehicle’s infotainment system to refrigerator to medical devices and everything else in-between. With so much exposure one would think that such devices are secure against attack; however, sadly for many devices this is not the case. For proof, just look no further than your local news reports. They are full of reports on devices being hacked. So, as engineers, how do we go about first identifying and mitigating (or capitalizing) the potential security vulnerabilities within these devices?
X