Henning Harbs

Cybersecurity for Software Defined Vehicles

How do you secure 100 million lines of code in a car that's always online?

Cybersecurity for Software Defined Vehicles
#1about 2 minutes

The automotive industry's shift to software-defined vehicles

The transition from hardware-centric cars to complex, connected software-defined vehicles introduces new capabilities and challenges.

#2about 3 minutes

Understanding the UNECE R155 cybersecurity regulation

The UNECE R155 regulation mandates a certified cybersecurity management system (CSMS) for all new vehicles, impacting the entire supply chain.

#3about 3 minutes

Managing security over the entire vehicle lifecycle

Vehicle cybersecurity must be maintained for over a decade, requiring continuous monitoring, incident response, and robust over-the-air update capabilities.

#4about 3 minutes

Volkswagen's approach to in-vehicle network security

Volkswagen's security technology kit uses a secure service-oriented architecture (SOA) with TLS to protect in-vehicle communication between ECUs.

#5about 2 minutes

The OBD port as a physical attack vector

The standardized On-Board Diagnostics (OBD) port creates a significant physical vulnerability, comparable to an unsecured USB port on a laptop.

#6about 4 minutes

Real-world examples of modern car hacking techniques

Several real-world examples, including CAN injection, key fob brute-forcing, and relay attacks, demonstrate common vehicle vulnerabilities.

#7about 1 minute

Defending against attacks and the future of automotive security

Ultra-wideband (UWB) technology prevents relay attacks by measuring signal time-of-flight, representing a paradigm shift towards proactive, long-term cybersecurity management.

#8about 3 minutes

Q&A on securing CAN bus and future architectures

The discussion covers securing legacy systems like CAN bus, the role of open standards like AUTOSAR, and the importance of domain separation in future vehicle architectures.

Related jobs
Jobs that call for the skills explored in this talk.

Featured Partners

Related Articles

View all articles
DC
Daniel Cranney
How software is steering vehicle technology
The automotive industry is entering a transformative era, and developers have a unique opportunity to be part of it. Cars are no longer just mechanical machines; they’re sophisticated tech platforms with software at their core. This shift, defined by...
How software is steering vehicle technology
CH
Chris Heilmann
Dev Digest 138 - Are you secure about this?
Hello there! This is the 2nd "out of the can" edition of 3 as I am on vacation in Greece eating lovely things on the beach. So, fewer news, but lots of great resources. Many around the topic of security. Enjoy! News and ArticlesGoogle Pixel phones t...
Dev Digest 138 - Are you secure about this?
DC
Daniel Cranney
Understanding and Mitigating Common Web Vulnerabilities
Vulnerabilities exist in many forms on the web, and attackers continue to find creative ways to exploit them. Technological advances like the proliferation of AI are of course exciting nd filled with opportunities, they equally present opportunities ...
Understanding and Mitigating Common Web Vulnerabilities

From learning to earning

Jobs that call for the skills explored in this talk.