Cyber Security Technology To Protect Autonomous Vehicles

Vehicle automation aims to enhance people’s lives, by improving road capacity and simply freeing up time that would have been previously spent on driving. However, safety remains a challenging problem, and several incidents have proven just how important cyber security is to ensure physical safety, as vulnerabilities have previously allowed malefactors to take control of a car.

The communications infrastructure used in cars today (known as a Controller Area Network, or CAN) was mostluy designed  the 1980s and developed for exchanging information between different microcontrollers. Essentially, this comprises and out of date peer-to-peer network.

These networks weren’t built with security in mind, as it wasn’t then a key concern then but over time new functionality has been layered on top of existing functions, all connected to the CAN. This offers no access control or security features but instead leaves vehicle access potentially open to criminals.

In most known cases, bad actors have  exploited code mistakes, unintentionally left by developers. This can happen because modern vehicles are complex systems, making it hard to manage the security of all the components. Moreover, these systems are regularly updated, and it is important to ensure that changes in one component will not affect how a vehicle operates.

Solutions and services for securing vehicles with advanced driver-assistance system (ADAS) functionalities have been developed by Kaspersky, in collaboration with AVL SFR.

Kaspersky has announced the first successful integration of its new automotive KasperskyOS into an electronic control unit (ECU) of an ADAS, developed by AVL SFR. The holistic security solution is located at the level of the operating system and the controller is an open and customisable development platform for both prototype and series development. The secure operating system is designed to protect communications between ADAS components and to safeguard all the autonomous vehicle functions.   

Collaboration between smart car manufacturers and cybersecurity experts is essential to establish standards in this emerging discipline.

KasperskyOS provides strong separation between components, so any unwanted interference is not possible by default.
The interaction between all electronic components is controlled by the Kaspersky Security System, the security policy engine within KasperskyOS. It monitors the launch of processes, as well as communications between each component and with the operating system.

Kaspersky:        I-HLS:     Autonomoud Vehicle International

You Might Also Read: 

5G Will Reduce Car Accidents:

 

« Fake News & Democracy In The Philippines
US Companies Hit With A New Ransomware Campaign »

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

WEBINAR: How to achieve security visibility at scale in the AWS Cloud

WEBINAR: How to achieve security visibility at scale in the AWS Cloud

Thursday August 27, 2020: Join SANS and AWS Marketplace to learn how you can leverage solutions to create visibility at scale and allow you to do more with your data and improve your security posture.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

WEBINAR: How to improve threat detection and hunting in the AWS Cloud

Thursday, August 20, 2020 - Join SANS and AWS Marketplace to learn the exercise of applying MITRE’s ATT&CK Matrix to the AWS Cloud and how to enhance threat detection and hunting in an AWS environment

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Versasec

Versasec

Versasec is a leader in identity and access management, providing customers with security solutions for managing digital identities.

Intland Software

Intland Software

Intland offer an integrated Application Lifecycle Management platform that offers all-round Requirements, Development, and Testing & Quality Assurance functionality.

Secure Edge Networks

Secure Edge Networks

Secure Edge specializes in the design and deployment of enterprise wireless networks. Our mission is to be the best in the world at secure mobility.

Flexential

Flexential

Flexential helps organizations optimize their journey of IT transformation while simultaneously balancing cost, scalability, compliance and security.

CSIRT-CY

CSIRT-CY

CSIRT-CY is the National Computer Security Incident Response Team for Cyprus.

Coalition

Coalition

Coalition combines comprehensive insurance and proprietary security tools to help businesses manage and mitigate cyber risk.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

Conference Index

Conference Index

Conference Index provides an indexed listing of upcoming meetings, seminars, congresses, workshops, summits and symposiums across a wide range of subjects including Cybersecurity.

CloudSecOps

CloudSecOps

CloudSecOps provide cutting edge security professional services in web applications, networks, and cloud specializing in modern infrastructures on AWS.