[Cyber Security] 10. Common Security Requirements

Common Security Requirements Hardware security requirements Hardware security requirements are essential to enhance the physical security of electronic devices, especially controllers. These requirements must be thoroughly considered from the design stage to protect important information inside the controller and prevent potential risks through unauthorized access. Here we take a closer look at key hardware security … Read more

[Cyber Security] 9. Other application security

Other application security RUN-TIME TUNING PROTECTION (RTP) Run-time Tuning Protection (RTP) is a very important feature in a vehicle’s controller security system. Unlike Secure Boot, which performs integrity verification only once at system boot, RTP periodically verifies the integrity of firmware during runtime to ensure the ongoing security of a running system. This function prevents … Read more

[Cyber Security] 8. Secure Boot, Secure Debug, Secure Storage

In this post, we will learn about application security technologies, which are security defense measures applied to protect the controller from external intrusion. Secure Boot Secure Boot is a very important security mechanism in a vehicle’s controller. By ensuring the integrity of the initial software running during the controller’s boot sequence, it ensures that the … Read more

[Cyber Security] 7. Security Updates : Diagnostic Security Features

Security Updates Among the vehicle’s diagnostic security functions, ‘security updates’ plays an important role in updating the vehicle’s controller software (SW) and firmware. This feature allows only authorized software updates, ensuring the vehicle’s core systems are protected from external threats. Security updates are generally performed through the OBD (On-Board Diagnostics) port, and security control and … Read more

[Cyber Security] 6. Access Control : Diagnostic Security Features

Access Control In this post, we will take a closer look at ‘Access Control’, one of the vehicle diagnostic security functions. This feature requires external diagnostic equipment to undergo mandatory security verification before accessing the vehicle’s controls. Access control is especially important for diagnostics via the OBD (On-Board Diagnostics) port, and controls access to the … Read more

[Cyber Security] 5. Security Controls : Diagnostic Security Features

Security Controls From this post, we will take a closer look at car diagnostic security features. The diagnostic security function plays an important role when performing diagnostic tasks using the vehicle’s ‘Diagnostics CAN network’. This feature is broadly divided into three types: Among these, today I will focus on security control. Security controls ensure that … Read more

[Cyber Security] 4. External, internal communication security and GATEWAY security

External, internal communication security and GATEWAY security From this post, we will look at the technologies commonly used to strengthen automotive cybersecurity one by one. One of the essentials to achieve effective cybersecurity is the concept of ‘Defense-In-Depth’. Defense-in-Depth Defense-in-Depth (DiD) strategy is a comprehensive cybersecurity approach that protects an organization’s assets and networks through … Read more

[Cyber Security] 3. cyber security cryptography technology

In this post, we will cover information related to cryptography technology that you need to understand as a system engineer to carry out cybersecurity work. This post explains the concepts of symmetric and asymmetric key encryption, Hash, digital signature, MAC, and TRNG. Basic concepts of cyber security cryptography Encryption is a technology used to keep … Read more

[Cyber Security] 2. TARA

Section 15. Threat Analysis and Risk Assessment (TARA) This section describes how to assess the impact of threat scenarios that road users may experience and how to systematically manage the resulting risks. Threat Analysis and Risk Assessment (TARA) is carried out primarily from the road user perspective and includes methods such as: Main methods and … Read more