In-Vehicle Systems Security

Securing vehicles from development to consumption
ivs security featured

The comprehensive cybersecurity solution for vehicle production.

An intrusion of in-vehicle systems can be silent yet catastrophic. By gaining entry into the in-vehicle infotainment (IVI) or the telematics control unit (TCU), hackers could make their way into critical CAN buses and ECUs and tamper with communications within and beyond the vehicle. A successful attack could lead to data theft, location exposure, vehicle theft, and even vehicle hijacking.

AUTOCRYPT’s comprehensive In-Vehicle Systems Security solution (branded as AutoCrypt® IVS) uses proprietary cybersecurity technologies and intelligence to protect vehicles at all three stages: development, production, and post-production. Built for both AUTOSAR and legacy environments, and designed in compliance with ISO/SAE 21434 and the UNECE WP.29 regulations, AUTOCRYPT ensures its clients are ready for type approvals and its end-users are safely protected.

AUTOCRYPT’s In-Vehicle Systems Security solution covers the following:

TARA (Threat Analysis and Risk Assessment)
Software composition analysis and licence management
Smart fuzzing (applicable in HIL simulations)
Penetrating testing (by award winning Red Team)
Embedded security software (IDS, HSM, ASL, TEE)


All you need to know about in-vehicle systems security

and stay prepared with AUTOCRYPT

In-Vehicle System Structure

A vehicle’s internal system consists of over 100 ECUs (electronic control units), which control a number of electrical subsystems responsible for all functionalities of the vehicle, from handling to connectivity.

page image
page image

The CAN (Controller Area Network) and MOST (Media Oriented System Transport) are two primarily used network protocols that enable communications between the ECUs. The CAN buses facilitate a vehicle’s internal communications for controlling power, direction, braking, etc., while MOST enables the systems for transmitting in-vehicle audio, video, and data via fiber-optic cables.

Other network protocols like FlexRay and Ethernet govern high-capacity onboard computing.

Need for Security

The CAN (Control Area Network) bus is designed to allow microcontrollers and in-vehicle systems to communicate without a host computer.

However, they are not built with the intention of tracking where the communicated messages come from, making the systems vulnerable to external threat actors.

page image
page image

If an attacker were to take over an ECU by exploiting vulnerabilities in the network, they would be able to control certain parts of the vehicle using forged data or injecting malicious code, as well as gain access to sensitive information.

Hackers may attempt to establish a foothold in the vehicle’s various embedded systems by executing attacks that make changes to the memory disk, damage the ECU functions, or infiltrate the core data storage units of the vehicle.

Ensuring the security of a vehicle’s internal structure is of utmost importance.
If the security of the network is compromised, it becomes the ideal environment for hackers to seize control of the vehicle’s core functions like steering, braking, data collection, and network communication.
Network Infiltration Attack Cases
2010. 08    |   Message fabrication from tire-pressure monitoring system (TPMS) resulting in false activation of warning lights and announcing false system failure in ECU systems
2013. 10    |   Demonstration of potential attack on a vehicle’s CAN bus by sending random malicious CAN packets, resulting in the yield of complete control of the vehicle’s display, acceleration, and brake settings. 
2015. 02    |    Allegemeiner Deutscher Automobil-Club (ADAC) confirmed the vulnerability of BMW’s ConnectedDrive by demonstrating that it is possible to open and close vehicle doors by sending a simple SMS text.
2015. 07    |   Vehicles with GM’s OnStar system were found vulnerable regarding security of door locks and jumpstarting
2019. 03    |   Toyota had a security breach that leaked sensitive information. More than 3.1 million people were affected. Additionally, unauthorized attempts to enter the systems of Toyota’s subsidiaries were detected. 
2023. 01    |   An API flaw was found in nearly 20 vehicle manufacturers. When exploited, it could have allowed hackers to unlock, start, and track cars.

AUTOCRYPT's In-Vehicle Systems Security Solution

AUTOCRYPT’s In-Vehicle System Security solution provides complete protection for the embedded systems of a vehicle through a three-step process from 1) TARA, 2) Security Testing, and 3) Mitigation and Monitoring.

AutoCrypt® IDS monitors communications within the vehicle, responding to any abnormal or malicious activities using its proprietary Security Sensor.

page image
page image

In-Vehicle System Security Products

autocrypt ids featured

AutoCrypt IDS

A vehicular intrusion detection solution that detects, filters, and prevents cyberattacks against in-vehicle systems. It consists of an N-IDPS and an H-IDPS, complemented by event reporting, automated policy generation and simulation.

wp.29 background

AutoCrypt HSM

A software module that seamlessly integrated the hardware security module (HSM) into the AUTOSAR environment, ensuring the secure access of ECUs and acting as a trust anchor for in-vehicle communications.

security analyzer

AutoCrypt Security Analyzer

A software vulnerability analysis platform that generates the software bill of materials (SBOM) through function-level analysis, allowing for continuous vulnerability management and patching throughout the entire software development lifecycle (SDLC). 

autocrypt fuzzer featured image

AutoCrypt Security Fuzzer

A smart fuzzing tool that accurately and effectively detects software coding flaws by repeatedly feeding AI-generated random inputs.

autocrypt asl featured

AutoCrypt ASL

An adaptive security library designed for the AUTOSAR Adaptive Platform, ensuring security for high-performance ECUs, such as in-vehicle application servers, infotainment systems, and ADAS.

ive tee featured image

AutoCrypt TEE

An ASPICE CL2-certified in-vehicle systems security solution that utilizes a trusted execution environment (TEE) to protect SoC platforms like ADAS, IVI, and CCU.