OnBoard Security InSights

The Future of Blockchain - A Lack of Authenticity and Privacy

Posted by Zhenfei Zhang on Jul 31, 2018 4:22:00 PM

Modern technology is all about buzz words. Unless you have been trapped in the phantom zone for the past few years, you must have heard of quantum computers and blockchains. Some say that quantum computers are the next generation of computers, and blockchains are the next generation of the Internet. What will the next generation look like when we have both quantum computers and blockchains in a same room? A quantum apocalypse.

Read More

Topics: NTRU, Cryptography, Quantum Computing, Blockchain

Top-Down and Bottom-Up Defenses to Secure IoT

Posted by Lee Wilson on May 24, 2018 12:14:38 PM
Many IoT device manufacturers understand the need for cyber security but aren’t sure where to begin. To add to the confusion, some security vendors will claim their firewall or password system or a “magic bullet” will protect your system from every type of attack. Don’t believe the hype.
Read More

Topics: TPM, TSS, Cyber Security, Embedded Security, Internet of Things, Cryptography

Trusted Computing Primary Use Cases

Posted by Lee Wilson on May 17, 2018 1:18:08 PM

There are four primary use cases for implementing trusted computing with a Trusted Platform Module (TPM), the cryptographic module standardized by the Trusted Computing Group. This blog will give a brief overview of those use cases, which can be combined to create more complex and powerful solutions.

Read More

Topics: TPM, Internet of Things, Embedded Security, Cyber Security, TSS, Trusted Computing

TPM - a Powerful, Inexpensive Security Building Block

Posted by Lee Wilson on Mar 22, 2018 1:51:50 PM

There are two worlds of computer security - high-end systems and then everything else. Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces. These are “software-only” security techniques.

Read More

Topics: TPM, Trusted Computing, TSS, Cyber Security, Embedded Security, Internet of Things, Cryptography

Connected Cars Security - Q&A

Posted by William Whyte on Feb 12, 2018 11:25:56 AM

OnBoard Security’s Chief Technology Officer, Dr. William Whyte, has been involved in Vehicle-to-Everything (V2X) communications security for nearly 20 years. He is the editor of the IEEE 1609.2 security standard and has consulted for numerous automaker, the US Dept. of Transportation (DOT) and transportation organizations around the world. He is frequently asked to explain V2X security and give insights on potential vulnerabilities in the system.

Read More

Topics: DSRC, Connected Vehicles, Research, SCMS, V2V, Regulation, Autonomous Vehicles, Automotive, V2X

What are Automated Vehicle Security Concerns?

Posted by Jonathan Petit on Jan 24, 2018 3:25:56 PM

At the Automated Vehicles Symposium (AVS) 2017, I addressed a plenary talk to the ~1,500 attendees, stating that even though it is unanimously considered as paramount, cybersecurity is still an after-thought. Or at least it still feels like it. Indeed, for the last two AVS editions, the cybersecurity breakout session reported similar open challenges, but no real changes have been seen since. In order to move the security needle, we took a different approach and didn't organize a cybersecurity breakout session. Instead, we identified that the missing components were the lack of inputs coming from the community of experts. To be able to build a more resilient system, cybersecurity experts should know about the limitations of each subsystem, and possible "nightmare scenarios".

Read More

Topics: Connected Vehicles, Research, Cyber Security, Automotive, Insider, Autonomous Vehicles, Embedded Security

The OnBoard Security Mission

Posted by Peter Samson on Jan 11, 2018 12:24:30 PM

I often get asked, what is the company’s mission?

Read More

Topics: DSRC, Connected Vehicles, Research, V2V, TPM, Trusted Computing, TSS, Cyber Security, Autonomous Vehicles, Embedded Security, Regulation, Automotive, V2X, Internet of Things, Privacy, Quantum Computing, Cryptography, NTRU, BCAM, SCMS

Secure Crypto Key Management for Automotive

Posted by Gene Carter on Nov 1, 2017 12:21:38 PM

Car makers use cryptographic keys for a variety of purposes, including Over-The-Air (OTA) software updates, security immobilizers, inter-module communications, and Vehicle-to-Everything (V2X) communication security. Key Management Systems (KMS) are very complex, as the manufacturer has to manage dozens of keys for each car model, both at production and when new components are introduced during repairs, and they must maintain these keys over the long lifetime of a car. Key Management is a daunting task.

Read More

Topics: Automotive, Autonomous Vehicles, Connected Vehicles, Cyber Security, Cryptography, Embedded Security, Research, Internet of Things

Learn About the Latest in IoT Security from Our Team of Experts

 

OnBoard Security's security experts share insights on the latest security topics in:

  • Connected Cars
  • Autonomous Vehicles
  • Internet of Things
  • Quantum Computing

Subscribe to Email Updates

Recent Posts