
Synopsys Blog » Automotive Cyber Security
59 FOLLOWERS
Today's connected vehicles serve as mobile access points to sensitive personal data, and manufacturers can't afford to let automotive cyber security take a back seat in the vehicle software development life cycle. Explore articles on the latest regulations and best practices in automotive security. We help our customers innovate from silicon to software so they can bring amazing new..
Synopsys Blog » Automotive Cyber Security
2y ago
The previous blog post in this series presented an introduction to secure software development for modern vehicles. In this blog post, we will do a deep dive on connected and autonomous vehicles (AVs) and focus on fuzz testing. Identifying high-risk interfaces and determining the level of fuzzing There are two important topics to consider when doing fuzz testing. First, the tester needs to identify high-risk interfaces to target. Second, they have to determine the level of fuzzing to perform. Threat analysis and risk assessment (TARA) is one approach that can be used to identify the high ..read more
Synopsys Blog » Automotive Cyber Security
2y ago
Targeted software security practices can help overcome challenges in satisfying emerging cybersecurity standards in the automotive industry ..read more
Synopsys Blog » Automotive Cyber Security
3y ago
Get practical steps for MISRA and AUTOSAR compliance to improve code quality, safety, and security in automotive software.
The post How to achieve MISRA and AUTOSAR coding compliance appeared first on Application Security Blog ..read more
Synopsys Blog » Automotive Cyber Security
3y ago
With challenging cybersecurity requirements on the horizon for automotive companies in 2022, security teams can look to BSIMM12 for guidance.
The post Navigating the road ahead for automotive cybersecurity appeared first on Application Security Blog ..read more
Synopsys Blog » Automotive Cyber Security
3y ago
During this National Truck Driver Appreciation Week, we review how to ensure security on the road with ELD cyber security considerations.
The post Drive down the risks of security threats with secure ELDs appeared first on Application Security Blog ..read more
Synopsys Blog » Automotive Cyber Security
3y ago
The TARA method provides risk evaluation, assessment, treatment, and planning for identified risks. Learn how to apply this method to the ISO SAE 21434 standard.
The post Automotive threat analysis and risk assessment method appeared first on Application Security Blog ..read more
Synopsys Blog » Automotive Cyber Security
3y ago
Learn what cyber security activities are critical to building secure automotive software systems using ISO/SAE 21434 as guidance.
The post Practical solutions for a secure automotive software development process following ISO/SAE 21434 appeared first on Application Security Blog ..read more
Synopsys Blog » Automotive Cyber Security
3y ago
The convenience of keyless entry systems can come at a price: your security. Learn how key fob hacks happen and why proactive security measures are a vital part of stopping them.
The post Analysis of an attack on automotive keyless entry systems appeared first on Application Security Blog ..read more
Synopsys Blog » Automotive Cyber Security
3y ago
The future of secure autonomous vehicles starts today. But the auto industry has to overcome some challenges, like shifting left and building security in.
The post It’s not just autonomous cars of the future that need security appeared first on Application Security Blog ..read more
Synopsys Blog » Automotive Cyber Security
3y ago
With the ISO SAE 21434 standard for road vehicles coming soon, learn the role cyber security assurance levels play in your road vehicle safety program.
The post Cyber security assurance levels in the automotive supply chain appeared first on Application Security Blog ..read more