Refine Your Search

Search Results

Viewing 1 to 2 of 2
Technical Paper

Deep Learning Based Real Time Vulnerability Fixes Verification Mechanism for Automotive Firmware/Software

2021-04-06
2021-01-0183
Software vulnerability management is one of the most critical and crucial security techniques, which analyzes the automotive software/firmware across the digital cockpit, ADAS, V2X, etc. domains for vulnerabilities, and provides security patches for the concerned Common Vulnerabilities and Exposures (CVE). The process of automotive SW/FW vulnerability management system between the OEMs and vendors happen through a channel of fixing a certain number of vulnerabilities by 1st tier supplier which needs to be verified in front of OEMs for the fixed number and type of patches in there deliverable SW/FW. The gap of verification between for the fixed patches between the OEMs and 1st tier supplier requires a reliable human independent intelligent technique to have a trustworthiness of verification.
Technical Paper

Mechanism for Secure Storage without a Trusted Execution Environment for Low/Mid Automotive Segments

2021-04-06
2021-01-0145
Increasing adoption of connected vehicles has led the vehicle manufacturers to deal with security issues in a vehicle-embedded system. In order to secure the security critical instructions/operations such as security functions, cryptographic credentials in a connected embedded system Arm Trustzone Technology is widely used in automotive embedded system across Cockpit, ADAS, V2X, etc. The Arm Trustzone technology protects the security critical operations by executing them in a trusted execution environment (TEE) parallelly by isolating them through hardware from classic rich execution environment (REE) using the shared hardware resources by protecting the confidentiality and integrity of the system.
X