The annual Consumer Electronics (CES) conference has become a major show for automakers and suppliers to highlight the latest and greatest technological advances in cars. The past few years, there have been many announcements and demonstrations of Vehicle-to-Everything (V2X) communications, primarily using a Wi-Fi-based technology called Dedicated Short Range Communications (DSRC). The year marked a turning point, as a majority of the V2X announcements were based on Cellular V2X (C-V2X).
2018 has been an eventful year for OnBoard Security® and the markets we serve. The year started with a bang when OnBoard Security was spun off from Security Innovation®, becoming an independent company with the mission to help Automotive and IoT manufacturers stay ahead of the curve in cyber security. As an independent company, we are better positioned to focus on filling critical cyber security gaps in our target markets.
Topics: V2I, Blockchain, DSRC, Connected Vehicles, Research, SCMS, V2V, TPM, Trusted Computing, TSS, Cyber Security, Autonomous Vehicles, Embedded Security, Automotive, V2X, Internet of Things, Privacy, Cryptography
To get a clear view of your security goals and requirements it is very useful to categorize your project into one of four target environments.
Every day, thousands of new devices are given internet connectivity - called the Internet of Things (IoT). Figure 1 displays IoT devices attacked worldwide in 2015. Most of the internet connected devices are inherently insecure and hackers realize this as an easy opportunity. Even though home routers were the most targeted devices, others weren’t spared.
Topics: Internet of Things
This whitepaper provides a framework on system security design and the security software needed to achieve a system’s security goal. Four software models are examined and critiqued, with recommended strategies for choosing vendors within those differing models.
There are four primary use cases for implementing trusted computing with a Trusted Platform Module (TPM), the cryptographic module standardized by the Trusted Computing Group. This blog will give a brief overview of those use cases, which can be combined to create more complex and powerful solutions.
There are two worlds of computer security - high-end systems and then everything else. Both high- and low-end systems typically employ “top-down” defenses to harden their attack surfaces. These are “software-only” security techniques.