Infotainment and TelematicsInfotainment and Telematics

Infotainment and Telematics

Automotive Cyber Security: 2019 Ecosystem Update



Available to Clients Only

This report is available to Strategy Analytics clients only. You can see the benefits of becoming a client here.

Already a client, login to download this report.
Login

To discuss pricing options please contact our sales representative.
Contact Us

Report Summary:

This report provides an overview of the automotive cyber security landscape, with topics ranging from attack types and mitigation strategies to the organizational issues companies must deal with. In addition, this report provides an overview of the solutions and market activities of a number of vendors offering automotive-specific cyber security solutions.


Table of Contents

1.     Executive Summary
2.     The State of the Industry
 2.1     The Problems
 2.2     Notable Cyber Attacks and Hacks

  2.2.1     FCA, Jeep 2015
  2.2.2     OnStar - 2015
  2.2.3     Tesla - 2016, 2017
  2.2.4     Mazda USB drive - 2017
  2.2.5     BMW i-Series, 7 Series, 5 Series, 3 Series – 2018
  2.2.6     Audi A3 Sportback  and VW Golf GTE - 2018
  2.2.7     Tesla Hack – 2018
  2.2.8     And More
 2.3     Vehicle and Related Vulnerabilities
  2.3.1     Vehicle Attack Surfaces
  2.3.2     Back-end Vulnerabilities
  2.3.3     Data Privacy
  2.3.4     In-car e-Commerce
 2.4     Attacker Motivations
 2.5     Cyber Attack Types
  2.5.1     Example Attack Types
  2.5.2     Types of Automotive-Specific Attacks
3.     The Solutions
 3.2     Hardware Security
 3.3     Hardware Security Examples

  3.3.1     Future Proofing via Hardware
  3.3.2     EVITA
  3.3.3     Trusted Platform Module
 3.4     Gateway ECU Forecast
 3.5     Cyber Security Mitigation Technique Examples

  3.5.1     In-vehicle Network Security
  3.5.2     Securing CAN?
  3.5.3     LIN
  3.5.4     FlexRay
  3.5.5     Ethernet
  3.5.6     HDBaseT
  3.5.7     General In-vehicle Networking Challenges
  3.5.8     Encryption
 3.6     Security Services
4.     Standards and Regulatory Activities
 4.1     Regulatory Efforts
 4.2     Standards and Best Practices

5.     Organizational Considerations
 5.1     Model Threats
 5.2     Organizational Activities
 5.3     The Talent Acquisition Problem
6.    Automotive Cyber Security Vendor and Organization Overviews
 6.1     AGL
  6.1.1      Overview
  6.1.2      Solutions
  6.1.3      Implications
 6.2     Argus Cyber Security
  6.2.1      Overview
  6.2.2      Solutions
  6.2.3      Implications
 6.3     ARM
  6.3.1      Overview
  6.3.2      Solutions
  6.3.3      Implications
 6.4     Blackberry
  6.4.1      Overview
  6.4.2      Solutions
  6.4.3      Implications
 6.5     Baidu/Apollo Project
  6.5.1      Overview
  6.5.2      Solutions
  6.5.3      Implications
 6.6     Bosch
  6.6.1      Overview
  6.6.2      Solutions
  6.6.3      Implications
 6.7     C2A Security
  6.7.1      Overview
  6.7.2      Solutions
  6.7.3      Implications
 6.8     Continental
  6.8.1      Overview
  6.8.2      Implications
 6.9     Elektrobit
  6.9.1      Overview
  6.9.2      Solutions
  6.9.3      Implications
 6.10     Green Hills and ISS
  6.10.1  Overview
  6.10.2  Solutions
  6.10.3  Implications
 6.11     GuardKnox
  6.11.1  Overview
  6.11.2  Solutions
  6.11.3  Implications
 6.12     Harman
  6.12.1  Overview
  6.12.2  Solutions
  6.12.3  Implications
 6.13     Intel
  6.13.1  Overview
  6.13.2  Solutions
  6.13.3  Implications
 6.14     Irdeto
  6.14.1  Overview
  6.14.2  Solutions
  6.14.3  Implications
 6.15     Infineon
  6.15.1  Overview
  6.15.2  Solutions
  6.15.3  Implications
 6.16     Karamba
  6.16.1  Overview
  6.16.2  Solutions
  6.16.3  Implications
 6.17     Microchip
  6.17.1  Overview
  6.17.2  Solutions
  6.17.3  Implications
 6.18     NNG/Arilou
  6.18.1  Overview
  6.18.2  Solutions
  6.18.3  Implications
 6.19     Qualcomm
  6.19.1  Overview
  6.19.2  Solutions
  6.19.3  Implications
 6.20     Renesas
  6.20.1  Overview
  6.20.2  Solutions
  6.20.3  Implications
 6.21     SafeRide Technologies
  6.21.1  Overview
  6.21.2  Solutions
  6.21.3  Implications
 6.22     ST Micro Electronics
  6.22.1  Overview
  6.22.2  Solutions
  6.22.3  Implications
 6.23     Texas Instruments
  6.23.1  Overview
  6.23.2  Solutions
  6.23.3  Implications
 6.24     Trillium Secure
  6.24.1  Overview
  6.24.2  Solutions
  6.24.3  Implications
 6.25     Upstream Security
  6.25.1  Overview
  6.25.2  Solutions
  6.25.3  Implications
7.     Conclusions
8.     How Can We Help You?

For more information about our services please contact us or email support@strategyanalytics.com

Service Subscription

  • Access this report as part of a service subscription
  • Benefits of a service subscription:
    • Access to industry leading analysts
    • Both current and historical repository of research
    • Timely updates to forecasts, market share, market sizing, and trendsEtc.

Let's talk

Now you know a little about us, get in touch and tell us what your business problem is.
Name:
Email:
Telephone:
Country:
Inquiry / Message:

please enter captcha from left