Over the last century, vehicles have become increasingly connected and computerized, with the future promising complete L4/L5 autonomy. The complex software required to run these vehicles all sits on top of firmware, which has been facing an…
https://www.phoenix.com/wp-content/uploads/autonomouse-vehicle-cybersecurity-header.png444713Phoenix Technologieshttps://www.phoenix.com/wp-content/uploads/2020/02/phoenix-logo.pngPhoenix Technologies2021-12-16 17:26:452022-04-19 02:24:35Autonomous Vehicle Cybersecurity: How to Secure Autonomous Vehicles
This is part 4 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, part 2 and part 3 review the various attack vectors and security gaps, and finally, this part explains why you need…
https://www.phoenix.com/wp-content/uploads/cybersecurity-in-autonomous-vehicles-header.jpeg4761000Phoenix Technologieshttps://www.phoenix.com/wp-content/uploads/2020/02/phoenix-logo.pngPhoenix Technologies2021-12-09 17:04:442022-04-19 02:24:57Cybersecurity in Autonomous Vehicles: From Development to Ongoing Mitigation
This is part 3 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, part 2 reviews attack vectors, and this article addresses security gaps. Finally, part 4 explains why you need development…
This is part 2 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack. This part and part 3 review the various attack vectors and security gaps. Finally, part 4 explains why you need…
This is part 1 of a four-part series on autonomous vehicle cybersecurity. This part explains the autonomous vehicle software stack, part 2 and part 3 review the various attack vectors and security gaps. Finally, part 4 explains why you need…
https://www.phoenix.com/wp-content/uploads/autonomous-vehicle-software-stack-header.jpeg5331000Phoenix Technologieshttps://www.phoenix.com/wp-content/uploads/2020/02/phoenix-logo.pngPhoenix Technologies2021-11-11 19:13:192022-04-19 02:25:22Understanding Modern Vehicle Tech: The Autonomous Vehicle Software Stack
Released October 18, 2021 at 10am EST - Campbell, CA
Phoenix Technologies, the world’s first independent secure firmware vendor, is proud to announce that it has joined the Baidu Apollo Autonomous Driving ecosystem as a software partner.…
https://www.phoenix.com/wp-content/uploads/2020/02/phoenix-logo.png00Phoenix Technologieshttps://www.phoenix.com/wp-content/uploads/2020/02/phoenix-logo.pngPhoenix Technologies2021-10-18 17:39:222022-04-19 16:19:08Phoenix Technologies Joins Baidu Apollo Autonomous Vehicle Ecosystem as Software Partner
Phoenix FirmGuard gives IT and system administrators (SAs) the ability to remotely manage the Phoenix SecureSuiteTM firmware security tools across all devices running Phoenix firmware. This helps administrators improve device management,…
韌體保護:如何解決韌體安全漏洞
Taiwan5 大自駕車安全漏洞
TaiwanAutonomous Vehicle Cybersecurity: How to Secure Autonomous Vehicles
BlogSecuring Autonomous Vehicle Firmware
eBooks, ResourcesCybersecurity in Autonomous Vehicles: From Development to Ongoing Mitigation
BlogThe Top 5 Autonomous Vehicle Security Gaps
BlogAutonomous Vehicle Hacking: Exploring Potential Attack Vectors
BlogUnderstanding Modern Vehicle Tech: The Autonomous Vehicle Software Stack
BlogPhoenix Technologies Joins Baidu Apollo Autonomous Vehicle Ecosystem as Software Partner
NewsFirmGuard™ Solution Brief
Resources, Solution Briefs