Automotive Interiors World
  • News
    • A-C
      • ADAS
      • Aftermarket
      • Augmented Reality
      • Automotive Interiors Expo
      • Autonomous
      • Concepts
      • Connectivity
    • D-L
      • Dash
      • Displays
      • EV
      • Graphics & Printing
      • HMI
      • HVAC
      • Infotainment
      • Lighting
      • Luxury
    • M-S
      • Materials
      • NVH & BSR
      • Personal Assistants
      • Safety
      • Seating
      • Sensors
      • Simulation
      • Sound System
    • S-V
      • Sport
      • Surfaces & Decoration
      • Sustainability
      • Testing
      • Trim
      • Virtual Reality
  • Features
  • Online Magazines
    • May 2020
    • October 2019
    • May 2019
    • October 2018
    • May 2018
    • Subscribe Free!
  • Opinion
  • Videos
  • Supplier Spotlight
LinkedIn Facebook Twitter
  • Automotive Testing
  • Automotive Powertrain
  • Autonomous Vehicle
  • Professional Motorsport
  • Tire Technology
  • Media Pack
LinkedIn Facebook
Subscribe
Automotive Interiors World
  • News
      • 3D Printing
      • ADAS
      • Aftermarket
      • Augmented Reality
      • Automotive Interiors Expo
      • Autonomous
      • Computing
      • Concepts
      • Connectivity
      • Dash
      • Displays
      • EV
      • Graphics & Printing
      • Haptics
      • HMI
      • HVAC
      • Infotainment
      • Lighting
      • Luxury
      • Materials
      • Microprocessors
      • NVH & BSR
      • Personal Assistants
      • Safety
      • Seating
      • Sensors
      • Simulation
      • Sound System
      • Sport
      • Surfaces & Decoration
      • Sustainability
      • Testing
      • Trim
      • Virtual Reality
  • Features
  • Online Magazines
    1. May 2020
    2. October 2019
    3. May 2019
    4. October 2018
    5. May 2018
    6. Subscribe Free!
    Featured
    April 3, 2020

    In this Issue – May 2020

    By Helen NormanApril 3, 2020
    Recent

    In this Issue – May 2020

    April 3, 2020

    In this Issue – October 2019

    September 19, 2019

    In this Issue – May 2019

    April 30, 2019
  • Opinion
  • Videos
  • Supplier Spotlight
  • Events
Facebook Instagram
Subscribe
Automotive Interiors World
Opinion

Creating more secure and safer code in modern vehicle design

Jill Britton, director of compliance, Perforce SoftwareBy Jill Britton, director of compliance, Perforce SoftwareFebruary 2, 20235 Mins Read
Share LinkedIn Twitter Facebook Email

While the increasing dependency on software in modern vehicle design is a gateway to incredible innovation, it also brings risks, particularly as vehicles become more connected with traffic infrastructure and other systems. Therefore, more rigor is needed around creating secure and high-quality code, because most software vulnerabilities stem from the development stage, which an attacker could exploit at a future time.

For instance, a vulnerability could enable the attacker to control steering, disable brakes or access personal information on other connected devices through the vehicle’s operating systems. Examples of vulnerabilities include memory buffer problems, which can lead to the software being read from or written to locations outside the boundaries of the memory buffer, and code injections, which affect the interpreted environment and most typically impact infotainment and other in-vehicle systems.

In addition, there is an increased use of the Android Open Source Project (AOSP) for development, particularly for infotainment systems. This increased use has massive benefits, giving developers access to a rich set of resources, but can also introduce risks. The 25-30 million lines of code involved add complexity, especially across many communication interfaces, so the potential attack surface is vast. Furthermore, the open-source nature of AOSP means that vulnerabilities are public knowledge, and, as the code is contributed by different developers, not all of them will have considered security (as it has not been a major concern previously). Also, users need to be aware of and use the latest version of a piece of open-source software, which will include fixes of known vulnerabilities.

Other factors affecting security include the trend toward electronic control unit (ECU) consolidation, which, by reducing their number within a vehicle, makes it harder to isolate potential issues. Plus, there is the sheer pressure on software engineering teams to contribute to faster time-to-market, and hence the potential risk of cutting corners.

Taking action
Not that the industry is putting its head in the sand on security. As Perforce’s 2022 State of Automotive Software Development survey of over 600 automotive industry professionals worldwide found, security is one of their top three concerns (alongside safety and quality). Furthermore, the 2021 introduction of ISO 21434, intended to ensure consideration of cybersecurity throughout automotive product development, demonstrates the commitment to security risk mitigation.

Fortunately, well-trodden best practices, already well-established within the automotive sector or in other industries, can all help to mitigate these risks – in particular, the use of coding standards, which is on the rise within the automotive sector as it is a requirement for both ISO 26262 and ISO 21434 compliance.

Coding standards are sets of guidelines or rules to help software developers create safe and secure code. In the same survey, 86% of respondents used at least one coding standard in their software development. Organizations may use a combination of coding standards (including those built in-house) to cover different programming languages and compliance requirements. Widely used coding standards include MISRA C/C++, well-known by and created within the automotive industry, and CERT, developed by the Software Engineering Institute at Carnegie Mellon University.

Compliance with a coding standard requires both time and effort, so static analysis tools are increasingly applied as a way to automate the process of enforcement. These tools inspect all categories of code and binaries without the need to execute them. The aim is to detect vulnerabilities and coding standards violations as early as possible in the development lifecycle, to reduce costs and prevent additional workload downstream. Trends such as ‘Shift Left’ testing, whereby testing takes place earlier (and throughout) the software development lifecycle, is part of this general movement.

Security-first mindset
Consideration of security in all phases of the software development lifecycle represents a significant change in the traditional software development environment. A ‘security-first’ mindset is encouraged throughout the organization, whereby everyone has a better understanding not just of security risks but their role in managing them.

Part of the security process must be to continually consider known and new vulnerabilities which may affect the software. There is a wide array of publicly available resources providing updates, including Common Weakness Enumeration (CWE), maintained by Mitre, which covers vulnerabilities in both software (for various languages and systems) and hardware. Similarly, the Open Web Application Security Project (OWASP) lists the 10 most critical security concerns for web application security. Another helpful resource is the National Vulnerability Database (NVD) from NIST, which lists recently reported open-source software (OSS) vulnerabilities together with a severity and a cross reference to CWE vulnerability types.

For example, the well-publicized Heartbleed bug from 2014 was a serious vulnerability in the popular OpenSSL cryptographic software library. This weakness allows an attacker to read the memory of the systems ‘protected’ by the vulnerable versions of the OpenSSL software, which is widely used for encrypted communication; including between connected embedded systems (found widely in modern and future-facing cars). The Heartbleed bug made it possible for attackers to compromise the secret codes used to identify the service providers, and to encrypt the information being passed. Consequently, attackers had access to the names and passwords of the users which enable them to eavesdrop on communications.

As a result, the Heartbleed bug was registered as CVE-2014-0160 by Mitre and associated with the ‘CWE-126: Buffer Over-read’ vulnerability type. Development of code that is resistant to — or checked for instances of potential buffer overreads — will obviously mitigate this type of risk.

So, while security remains a significant challenge for the automotive industry, there are multiple techniques, cultural steps and freely available resources on which to draw. And, while security is not just the responsibility of developers, doing as much as possible to improve software as it is being created is a sound starting point.

Share. LinkedIn Twitter Facebook Email
Previous ArticleSerial production vehicle headliner manufactured using organic waste
Next Article Updated cabin components for latest Mercedes-Benz GLE and GLE Coupé

Read Similar Stories

Opinion

Reengineering mobility: The SDV revolution beyond CASE

June 12, 20258 Mins Read
Opinion

How digital touchpoints can put automotive brands back in the driving seat

September 26, 20227 Mins Read
Opinion

BMW’s M8 and iDrive – an ode to buttons

June 3, 20214 Mins Read
Latest News

NXP and Rimac collaborate on vehicle control architecture

June 13, 2025

Reengineering mobility: The SDV revolution beyond CASE

June 12, 2025

UltraSense Systems launches CapForce Edge capacitive sensing controller

June 11, 2025

Receive breaking stories and features in your inbox each week, for free


Enter your email address:


Supplier Spotlights
  • JUMBO-Textil
Getting in Touch
  • Contact Us / Advertise
  • Meet the Editors
  • Download Media Pack
  • Free Weekly E-Newsletter
Our Social Channels
  • LinkedIn
  • Facebook
UKi Media & Events
Related UKi Topics
  • Automotive Testing
  • Automotive Powertrain
  • Autonomous Vehicle
  • Professional Motorsport
  • Tire Technology
  • Media Pack
© 2025 UKi Media & Events a division of UKIP Media & Events Ltd
  • Terms and Conditions
  • Privacy Policy
  • Cookie Policy
  • Notice and Takedown Policy

Type above and press Enter to search. Press Esc to cancel.

We use cookies on our website to give you the most relevant experience by remembering your preferences and repeat visits. By clicking “ACCEPT ALL”, you consent to the use of ALL the cookies. However, you may visit "Cookie Settings" to provide a controlled consent.
Cookie settingsREJECTACCEPT
Manage consent

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled

Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.

Functional

Functional cookies help to perform certain functionalities like sharing the content of the website on social media platforms, collect feedbacks, and other third-party features.

Performance

Performance cookies are used to understand and analyze the key performance indexes of the website which helps in delivering a better user experience for the visitors.

Analytics

Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.

Advertisement

Advertisement cookies are used to provide visitors with relevant ads and marketing campaigns. These cookies track visitors across websites and collect information to provide customized ads.

Others

Other uncategorized cookies are those that are being analyzed and have not been classified into a category as yet.

SAVE & ACCEPT
Powered by