Posts

Autonomous Vehicle Cybersecurity: How to Secure Autonomous Vehicles

Over the last century, vehicles have become increasingly connected and computerized, with the future promising complete L4/L5 autonomy. The complex software required to run these vehicles all sits on top of firmware, which has been facing an…

Cybersecurity in Autonomous Vehicles: From Development to Ongoing Mitigation

This is part 4 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, part 2 and part 3 review the various attack vectors and security gaps, and finally, this part explains why you need…
Interior of autonomous car. Car digitalization concept.

The Top 5 Autonomous Vehicle Security Gaps

This is part 3 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack, part 2 reviews attack vectors, and this article addresses security gaps. Finally, part 4 explains why you need development…

Autonomous Vehicle Hacking: Exploring Potential Attack Vectors

This is part 2 of a four-part series on autonomous vehicle cybersecurity. Part 1 explains the autonomous vehicle software stack. This part and part 3 review the various attack vectors and security gaps. Finally, part 4 explains why you need…

Understanding Modern Vehicle Tech: The Autonomous Vehicle Software Stack

This is part 1 of a four-part series on autonomous vehicle cybersecurity. This part explains the autonomous vehicle software stack, part 2 and part 3 review the various attack vectors and security gaps. Finally, part 4 explains why you need…

Autonomous Vehicle Firmware

,
Autonomous vehicle engineers must take a proactive approach to the security of firmware from the beginning of the development process and support it with ongoing risk mitigation to ensure the safety and security of their products. As a result,…