Automotive Interiors World
  • News
    • A-C
      • ADAS
      • Aftermarket
      • Augmented Reality
      • Automotive Interiors Expo
      • Autonomous
      • Concepts
      • Connectivity
    • D-L
      • Dash
      • Displays
      • EV
      • Graphics & Printing
      • HMI
      • HVAC
      • Infotainment
      • Lighting
      • Luxury
    • M-S
      • Materials
      • NVH & BSR
      • Personal Assistants
      • Safety
      • Seating
      • Sensors
      • Simulation
      • Sound System
    • S-V
      • Sport
      • Surfaces & Decoration
      • Sustainability
      • Testing
      • Trim
      • Virtual Reality
  • Features
  • Online Magazines
    • May 2020
    • October 2019
    • May 2019
    • October 2018
    • May 2018
    • Subscribe Free!
  • Opinion
  • Videos
  • Supplier Spotlight
LinkedIn Facebook Twitter
  • Sign-up for Free Weekly E-Newsletter
  • Meet the Editors
  • Contact Us
  • Media Pack
LinkedIn Facebook
Subscribe
Automotive Interiors World
  • News
      • 3D Printing
      • ADAS
      • Aftermarket
      • Augmented Reality
      • Automotive Interiors Expo
      • Autonomous
      • Computing
      • Concepts
      • Connectivity
      • Dash
      • Displays
      • EV
      • Graphics & Printing
      • Haptics
      • HMI
      • HVAC
      • Infotainment
      • Lighting
      • Luxury
      • Materials
      • Microprocessors
      • NVH & BSR
      • Personal Assistants
      • Safety
      • Seating
      • Sensors
      • Simulation
      • Sound System
      • Sport
      • Surfaces & Decoration
      • Sustainability
      • Testing
      • Trim
      • Virtual Reality
  • Features
  • Online Magazines
    1. May 2020
    2. October 2019
    3. May 2019
    4. October 2018
    5. May 2018
    6. Subscribe Free!
    Featured
    April 3, 2020

    In this Issue – May 2020

    By Helen NormanApril 3, 2020
    Recent

    In this Issue – May 2020

    April 3, 2020

    In this Issue – October 2019

    September 19, 2019

    In this Issue – May 2019

    April 30, 2019
  • Opinion
  • Videos
  • Supplier Spotlight
  • Events
Facebook Instagram
Subscribe
Automotive Interiors World
Features

EXCLUSIVE FEATURE: No free rides

James GordonBy James GordonJuly 17, 20258 Mins Read
Share LinkedIn Twitter Facebook Email
Cybersecurity strategies.

SDVs have led to a surge in software dependencies. How can automotive manufacturers ensure resiliency? 

It is nearly a decade since the infamous Jeep Cherokee cyber hack, in which two security researchers, Charlie Miller and Chris Valasek, remotely breached the vehicle’s infotainment system and disabled the accelerator pedal. The hack made global headlines and led to Fiat Chrysler recalling 1.4 million vehicles. Fast-forward to the current day, and a huge increase in connected and automated vehicles – each containing hundreds of millions of lines of code – may be leading the world into a gilded age of e-mobility. However, industry technologists say that the data-driven vehicles of today have introduced new vulnerabilities, leading to an escalating cybersecurity shortfall.

Dr Mathias Dehm, Continental’s chief product security and privacy officer, says the biggest hurdle for him and his team is the overwhelming complexity of next-gen vehicles. He notes, “There are 650 million lines of code in a modern autonomous vehicle. While that translates into fewer components, each one is a high-performance computer. That means there is an increasing number of suppliers, each one producing an individual part, which adds to the challenge.”

Dehm notes that German law “has placed restrictions on penetration testing”, and that there are also “legal challenges around IT protection”.

Dehm continues, “Paragraph 202 of German criminal law requires us to seek permission from every node of the supply chain before we can carry out such testing. In order to proceed, a lot of contractual and alignment work must be completed. For example, we have to seek active resource permission, explain what kinds of tests can be done, and disclose and define any red flags when we think that tests should be stopped.”

Threat neutralized

In terms of testing methods, Continental applies both static and dynamic code analysis, using the gamut of tools available, including network traffic analyzers, vulnerability scanners for hardware and software, laboratories for advanced chip attacks and simulation of diverse wireless systems such as mobile networks.

“The problem is that organizations can’t secure what they don’t know exists, so it’s a visibility issue.”

Chris Darvill, Kong

According to Dehm, the most common vulnerabilities from an OEM’s perspective are found in the back end – the part of the system not accessible to the user. “Increasingly we see weaknesses in the security authentication protocols, which allow cybercriminals to manipulate the odometer value. At a Tier 1 level, typical hacks might be buffer overflow attacks where cybercriminals flood a memory block with data, allowing them to overwrite the information and disable key security features.”

To find buffer overflow up front, Dehm says that one solution is to employ instrumented fuzzing during development. “This means injecting the system with random data,” he explains. “This technique helps us decipher whether or not the system has reached the point where memory can be overridden. Another method to protect against the severe consequences of a buffer overflow is scrambling the software, making it much more difficult for bad actors to identify which part of the system they can supersede to disable security functions.”

Dehm notes that if a buffer overflow attack reaches an advanced stage, Continental’s cybersecurity product line – developed by PlaxidityX, a cybersecurity company it acquired several years ago – “blocks the attack before exploitation and sends a report to a back-end system, where security analysts then pick it up”.

With cyberattacks becoming more sophisticated, OEMs must remain several steps ahead, which is far easier said than done.

“While vehicle development times are getting shorter, a vehicle often stays on the market for 15-20 years, using technology – such as chips – that was designed many years earlier,” points out Dehm. “With AI driving rapid technological advances, new attack methods have come to the fore that researchers couldn’t have predicted when the chips were originally developed.”

Cybersecurity strategies.

He believes that coverage-guided fuzzing could make a profound difference to cybersecurity testing because it identifies weaknesses or quality issues early, enhances security and prevents cyberattacks across the entire security architecture.

“Unlike interface fuzzing, coverage-guided fuzzing is able to detect system crashes caused by randomized input data across the whole system functions. By doing so, it can identify weaknesses deep into the system, while interface fuzzing is typically only able to do this on the direct functions of the interface itself.”

Code locked

Preproduction cybersecurity testing requires a holistic and systematic approach, as outlined in the European Union’s UN R155 and UN R156 regulations.

US company Integrity Security Services (ISS) develops a system called Device Lifecycle Management, which supports security infrastructure across complex supply chains. David Sequino, the company’s co-founder and CEO, believes that the core challenge OEMs face is that they bear the ultimate responsibility – liability rests with them. Yet modern manufacturers act more as system integrators than software developers.

“Over 90% [of the software] is written by Tier 1 suppliers. The question is, if you are an OEM and you haven’t written the code, how do you ensure that every line of software is safe from cyberattack? That is impossible without end-to-end embedded security.”

Sequino reports that ISS works hand in hand with its automotive partners to “ensure the bar is raised across the board”.

Its Device Lifecycle Management platform achieves end-to-end security by providing ISS partners with low-level code that they can run on the engine control units. It also includes a back-end system called DLM Trust, which enables secure OTA updates to OEMs, gateways and all engine control units within the vehicles. A Flex Embedded software line enables OEMs to separate themselves from the various hardware components, providing an added layer of consistency and security.

“If you are an OEM and you haven’t written the code, how do you ensure that every line of software is safe from cyberattack?”

David Sequino, Integrity Security Services

ISS’s product range complies with UN R155 and UN R156 – regulations that set stipulations for hardware and software products sold in the EU – and it is preparing to launch DLM Cumulus to provide more support to auto makers and suppliers in meeting these standards.

“This product enables OEMs to design and maintain a device architecture, ensuring with Tier 1 suppliers that an electronic control unit meets cybersecurity requirements,” Sequino explains. “For example, it has a secure central processing unit and a secure boot. Most importantly, DLM Cumulus ensures that OEMs can securely sign all software, guaranteeing that every layer of software in an ECU is authentic.”

With DLM Cumulus, automotive producers can achieve a higher level of robustness and visibility. Sequino believes that this will be something of a game-changer for cybersecurity as auto makers have to do more with less, and cyber teams are shrinking.

Auto armor

Instead of trying to secure everything, one approach might be to focus on protecting the most critical systems and interfaces – much like a navy safeguards key trade routes rather than the entire ocean.

Is the internet too vast to secure? Connected vehicles have given hackers more opportunities to wreak havoc, as a group of independent security researchers demonstrated last year when they discovered a flaw in the Kia web portal, which enabled them to transfer control of the internet-connected features from the owner’s phone to the hacker’s.

Cybersecurity strategies.Tomas Bodeklint, research and business developer at RISE, highlights that electrification will greatly increase the number of attack vectors in a vehicle, as “It brings together connected vehicles and new interfaces like smart public and home charging point infrastructure.”

To tackle the threat head-on, David Sequino, CEO and founder at ISS says, a change of mentality is needed. “The industry must flip the script. For those who say that the internet is too vast to secure, I offer a navy analogy. ‘What is the navy’s charter?’ I ask. After a pause, they reply, ‘To protect the ocean.’

“But like the internet, the ocean is too big to protect. You have to select your critical ports, trade lanes, your people and the goods that navigate the globe using those trade lanes. We need to adopt exactly the same approach to secure the automotive space.”

Guard the grid

Chris Darvill, Kong’s VP of EMEA solutions engineering, says that without robust security, application programming interface (API) vulnerability “could open the door for unauthorized access or even breaches that disrupt vehicle safety or performance”.

This is a big deal. Car data APIs “are the nervous system of a vehicle as they enable all the communication between components, external systems and services, like OTA updates, navigation or telematics”.

Darvill says that shadow APIs – in other words, those that are undocumented or unmanaged – pose a major cyber threat to modern vehicles.

“They are a serious risk because they often operate outside the scope of formal security processes. In the context of vehicles, that means they could inadvertently expose critical systems, like over-the-air updates or diagnostics, to exploits. The problem is that organizations can’t secure what they don’t know exists, so it’s a visibility issue,” he emphasizes.

Darvill advises that to mitigate attacks on API infrastructure, whether it is a rogue, shadow or zombie API, companies should “adopt a zero-trust architecture, implement regular penetration testing and sanction red-team exercises to simulate attacks”.

This article was originally published in the Automotive Testing Technology International June 2025 edition. Read the original publication here

Share. LinkedIn Twitter Facebook Email
Previous ArticleSustainable sound insulation for vehicles

Read Similar Stories

Features

From concept to cockpit: Harman’s path to the future of automotive technology

May 28, 20257 Mins Read
Features

The ‘golden ears’ that fine-tune Nissan audio systems

May 2, 20253 Mins Read
ADAS

EXPO NEWS: Show highlights from Automotive Testing Expo India 2025

April 10, 20254 Mins Read
Latest News

EXCLUSIVE FEATURE: No free rides

July 17, 2025

Sustainable sound insulation for vehicles

July 16, 2025

First electric Mercedes-Benz: the CLA Shooting Brake

July 15, 2025

Receive breaking stories and features in your inbox each week, for free


Enter your email address:


Supplier Spotlights
  • JUMBO-Textil
Getting in Touch
  • Contact Us / Advertise
  • Meet the Editors
  • Download Media Pack
  • Free Weekly E-Newsletter
Our Social Channels
  • LinkedIn
  • Facebook
UKi Media & Events
Related UKi Topics
  • Automotive Testing
  • Automotive Powertrain
  • Autonomous Vehicle
  • Professional Motorsport
  • Tire Technology
  • Media Pack
© 2025 UKi Media & Events a division of UKIP Media & Events Ltd
  • Terms and Conditions
  • Privacy Policy
  • Cookie Policy
  • Notice and Takedown Policy

Type above and press Enter to search. Press Esc to cancel.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “ACCEPT ALL”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie settingsREJECTACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Functional

Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.

Performance

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Analytics

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

Advertisement

Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.

Others

Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.

SAVE & ACCEPT
Powered by