Author: Greg Basich


Publication Date: Jul 01 2019


Pages: 81


Report Type: Report, Word



 Infotainment and Telematics

Automotive Cyber Security: 2019 Ecosystem Update




Download Report

Report Summary:

This report provides an overview of the automotive cyber security landscape, with topics ranging from attack types and mitigation strategies to the organizational issues companies must deal with. In addition, this report provides an overview of the solutions and market activities of a number of vendors offering automotive-specific cyber security solutions.



Table of Contents

1.     Executive Summary
2.     The State of the Industry
 2.1     The Problems
 2.2     Notable Cyber Attacks and Hacks

  2.2.1     FCA, Jeep 2015
  2.2.2     OnStar - 2015
  2.2.3     Tesla - 2016, 2017
  2.2.4     Mazda USB drive - 2017
  2.2.5     BMW i-Series, 7 Series, 5 Series, 3 Series – 2018
  2.2.6     Audi A3 Sportback  and VW Golf GTE - 2018
  2.2.7     Tesla Hack – 2018
  2.2.8     And More
 2.3     Vehicle and Related Vulnerabilities
  2.3.1     Vehicle Attack Surfaces
  2.3.2     Back-end Vulnerabilities
  2.3.3     Data Privacy
  2.3.4     In-car e-Commerce
 2.4     Attacker Motivations
 2.5     Cyber Attack Types
  2.5.1     Example Attack Types
  2.5.2     Types of Automotive-Specific Attacks
3.     The Solutions
 3.2     Hardware Security
 3.3     Hardware Security Examples

  3.3.1     Future Proofing via Hardware
  3.3.2     EVITA
  3.3.3     Trusted Platform Module
 3.4     Gateway ECU Forecast
 3.5     Cyber Security Mitigation Technique Examples

  3.5.1     In-vehicle Network Security
  3.5.2     Securing CAN?
  3.5.3     LIN
  3.5.4     FlexRay
  3.5.5     Ethernet
  3.5.6     HDBaseT
  3.5.7     General In-vehicle Networking Challenges
  3.5.8     Encryption
 3.6     Security Services
4.     Standards and Regulatory Activities
 4.1     Regulatory Efforts
 4.2     Standards and Best Practices

5.     Organizational Considerations
 5.1     Model Threats
 5.2     Organizational Activities
 5.3     The Talent Acquisition Problem
6.    Automotive Cyber Security Vendor and Organization Overviews
 6.1     AGL
  6.1.1      Overview
  6.1.2      Solutions
  6.1.3      Implications
 6.2     Argus Cyber Security
  6.2.1      Overview
  6.2.2      Solutions
  6.2.3      Implications
 6.3     ARM
  6.3.1      Overview
  6.3.2      Solutions
  6.3.3      Implications
 6.4     Blackberry
  6.4.1      Overview
  6.4.2      Solutions
  6.4.3      Implications
 6.5     Baidu/Apollo Project
  6.5.1      Overview
  6.5.2      Solutions
  6.5.3      Implications
 6.6     Bosch
  6.6.1      Overview
  6.6.2      Solutions
  6.6.3      Implications
 6.7     C2A Security
  6.7.1      Overview
  6.7.2      Solutions
  6.7.3      Implications
 6.8     Continental
  6.8.1      Overview
  6.8.2      Implications
 6.9     Elektrobit
  6.9.1      Overview
  6.9.2      Solutions
  6.9.3      Implications
 6.10     Green Hills and ISS
  6.10.1  Overview
  6.10.2  Solutions
  6.10.3  Implications
 6.11     GuardKnox
  6.11.1  Overview
  6.11.2  Solutions
  6.11.3  Implications
 6.12     Harman
  6.12.1  Overview
  6.12.2  Solutions
  6.12.3  Implications
 6.13     Intel
  6.13.1  Overview
  6.13.2  Solutions
  6.13.3  Implications
 6.14     Irdeto
  6.14.1  Overview
  6.14.2  Solutions
  6.14.3  Implications
 6.15     Infineon
  6.15.1  Overview
  6.15.2  Solutions
  6.15.3  Implications
 6.16     Karamba
  6.16.1  Overview
  6.16.2  Solutions
  6.16.3  Implications
 6.17     Microchip
  6.17.1  Overview
  6.17.2  Solutions
  6.17.3  Implications
 6.18     NNG/Arilou
  6.18.1  Overview
  6.18.2  Solutions
  6.18.3  Implications
 6.19     Qualcomm
  6.19.1  Overview
  6.19.2  Solutions
  6.19.3  Implications
 6.20     Renesas
  6.20.1  Overview
  6.20.2  Solutions
  6.20.3  Implications
 6.21     SafeRide Technologies
  6.21.1  Overview
  6.21.2  Solutions
  6.21.3  Implications
 6.22     ST Micro Electronics
  6.22.1  Overview
  6.22.2  Solutions
  6.22.3  Implications
 6.23     Texas Instruments
  6.23.1  Overview
  6.23.2  Solutions
  6.23.3  Implications
 6.24     Trillium Secure
  6.24.1  Overview
  6.24.2  Solutions
  6.24.3  Implications
 6.25     Upstream Security
  6.25.1  Overview
  6.25.2  Solutions
  6.25.3  Implications
7.     Conclusions
8.     How Can We Help You?

For more information about our services please contact us or email support@strategyanalytics.com