Anritsu and AUTOCRYPT Sign MOU at CES 2025 to Advance Automotive Security Testing(CSTP) through Simulated 5G Networks

LAS VEGAS, JANUARY 8, 2025. – AUTOCRYPT, an industry-leading vehicle cybersecurity provider, has signed a Memorandum of Understanding (MoU) with Anritsu, a pioneer in communications test and measurement solutions. The agreement, formally announced at CES 2025, underscores a shared commitment to advance security testing methodologies for vehicles worldwide.The collaboration will integrate AUTOCRYPT’s award-winning Cybersecurity Testing Platform (CSTP) with Anritsu’s Radio Communication Test Station MT8000A, which provides a simulated 5G network environment. The partnership aims to simplify and enhance cybersecurity testing, ensuring robust protection for evolving vehicle systems.

Anritsu and AUTOCRYPT Sign MOU at CES 2025

“By combining our decades-long expertise in cybersecurity with Anritsu’s network simulation capabilities, we’re setting a new standard for security testing in the 5G era,” said Daniel ES Kim, GCTO of AUTOCRYPT. “Testing can often be a cumbersome process, deterring type approval. But with AutoCrypt CSTP, OEMs gain access to a customized, efficient testing platform. Our partnership with Anritsu will further streamline testing, empowering OEMs to meet stringent cybersecurity requirements and provide more drivers with a secure driving experience.

“With the increasing concern over vehicle safety, cybersecurity testing has never been more vital,” said Yukiharu Ogawa, IoT Test Solution Division General Manager of Anritsu. “We’re thrilled to collaborate with AUTOCRYPT in delivering the tools necessary to test systems through our cellular network simulator. With this MOU formalized at CES, we believe it will highlight both our companies’ dedication to fostering a safer future.”

The MOU comes at a critical time, as governments and regulatory organizations worldwide implement stricter cybersecurity standards for connected and autonomous vehicles (CAVs). With frameworks such as the UNECE’s WP.29 UN R155, 156, India’s AIS-189, and China’s GB/T standards, automotive manufacturers and suppliers face mounting pressure to demonstrate compliance.

AUTOCRYPT and Anritsu’s collaboration will also enable comprehensive security testing for a variety of applications beyond vehicle communications systems. The collaboration will address the diverse security demands of modern day connected mobility, offering the industry an efficient solution to meet regulatory requirements, as well as enhancing resilience across a broad spectrum of technologies.

 

About Autocrypt Co., Ltd.

AUTOCRYPT is the leading player in automotive cybersecurity and smart mobility technologies. It specializes in the development and integration of security software and solutions for in-vehicle systems, V2X communications, Plug&Charge, and fleet management, paving the way towards a secure and reliable C-ITS ecosystem in the age of software-defined vehicles. Its comprehensive suite of automotive cybersecurity testing services and platforms includes the award-winning AutoCrypt CSTP, which supports automotive OEMs and suppliers in meeting regulatory standards ilke ISO/SAE 21434, UNECE WP.29 UN R155, as well as other emerging global standards.

About Anritsu Corporation

Anritsu is a provider of innovative communications test and measurement solutions. Anritsu engages customers as true partners to help develop wireless, optical, microwave/RF, and digital solutions for R&D, manufacturing, installation, and maintenance applications, as well as multidimensional service assurance solutions for network monitoring and optimization. Anritsu also provides precision microwave/RF components, optical devices, and high-speed electrical devices for communication products and systems. The company develops advanced solutions for emerging and legacy wireline and wireless technologies used in commercial, private, military/aerospace, government, and other markets.

AUTOCRYPT to Showcase Award-Winning Cybersecurity Solutions at CES 2025

AUTOCRYPT, a global leader in automotive cybersecurity and testing solutions, has announced its participation in the 2025 Consumer Electronics Show (CES) in Las Vegas from January 7-10, 2025.

At the upcoming CES, AUTOCRYPT will unveil its latest advancements in automotive cybersecurity, with a focus on:

  1. Award-Winning Cybersecurity Testing Platform (CSTP): Recognized as a top innovator in the digital category of the 2024 CLEPA Innovation Awards, CSTP streamlines the automotive regulatory compliance process by enabling diverse security tests to be executed and managed on a single platform. Visitors can experience a live demo of this cutting-edge solution.
  2. Comprehensive In-Vehicle Systems Cybersecurity Solutions: Ensuring the safety of in-vehicle systems, AUTOCRYPT’s suite of solutions protects critical vehicle components from evolving threats.
  3. Secure Vehicle-to-Everything (V2X) Communication Solutions: AUTOCRYPT’s V2X security technologies safeguard data transmission between vehicles and infrastructure, enabling secure and reliable communication for the future of smart mobility.

“Kicking off 2025, AUTOCRYPT is excited to bring our award-winning Cybersecurity Testing Platform to the global stage at CES,” said Duksoo Kim, CEO of AUTOCRYPT. “As the automotive industry continues to embrace software, electrification, connectivity, and autonomous driving, our mission is to ensure that every aspect of the process is secure.”

This will be AUTOCRYPT’s second year exhibiting at the internationally acclaimed CES; the company’s presence underlines its commitment to innovation and leadership in securing the future of connected and autonomous mobility. Attendees are encouraged to stop by AUTOCRYPT’s booth (#3674) at Las Vegas Convention Center’s West Hall for live demonstrations and in-depth discussions with AUTOCRYPT’s team of security experts.

About Autocrypt Co., Ltd.

AUTOCRYPT is the industry leader in automotive cybersecurity and connected mobility technologies. The company specializes in the development and integration of security software and solutions for in-vehicle systems, V2X communications, Plug&Charge, and mobility platforms, paving the way towards a secure and reliable C-ITS ecosystem in the age of software-defined vehicles. AUTOCRYPT also provides consulting and testing services along with custom solutions for UN R155/156 and ISO/SAE 21434 compliance.

Infographic: 2024 Year in Review

This year has been a remarkable journey for AUTOCRYPT, filled with innovation, meaningful collaborations, and impactful achievements. We are incredibly grateful to our investors, partners, clients, readers, and visitors for your unwavering support in 2024!

As we prepare to step into 2025, we’re excited about the opportunities and challenges that lie ahead. Here’s to another year of growth, innovation, and success—together!

Merry Christmas and Happy New Year!

Below is a recap of AUTOCRYPT’s key milestones and accomplishments in 2024.

Infographic 2024 Year in Review Autocrypt

Download PDF

(Accessibility version below)

New solutions

2024 has been the year of innovation and growth for AUTOCRYPT. We introduced 4 new groundbreaking solutions designed to address critical challenges in the automotive cybersecurity sector.

AutoCryptⓇ CSTP – Automotive cybersecurity testing platform for regulatory compliance

AutoCryptⓇ CLS – C-ITS local station for V2I communication

AutoCryptⓇ ASL – Adaptive security library for AUTOSAR platforms

AutoCryptⓇ RODAS – Remote driving assistance system for autonomous vehicles

Awards and certifications

This year, our efforts were recognized with several prestigious certifications and awards:

Designated as a Vehicle Type Approval Technical Service Provider for UN R155/156

Received Top Innovator Award at the 2024 CLEPA Innovation Awards

Partnerships

Collaboration fuels innovation, and this year, we forged impactful partnerships that strengthen our solutions and expand our reach:

VinCSS

Cohda Wireless

MicroNova

Bayanat

Emobi

Events

We participated in several impactful events, connecting with industry leaders and showcasing our innovations:

  1. CES 2024
  2. ITF Summit 2024
  3. VDI ELIV
  4. AutoTech Detroit 2024
  5. Automotive Testing Expo Europe
  6. International VDI Conference
  7. ITS World Congress Dubai
  8. Car Connectivity Consortium

and more…

Resources

This year, we published a range of resources to guide and inform our industry peers:

The Rise of Chinese Software-Defined Vehicles

UNECE Regulation 155: Key Vehicle Components to Focus on for Regulatory Compliance

Public Key Infrastructure: Use Cases in the Automotive Industry

Robotaxis in the Spotlight: Market Trends, Technology, and Disengagement Analysis

Security Validation and Vulnerability Testing for Automotive Software

As vehicles continue to evolve into sophisticated, software-driven machines, automotive cybersecurity has become as critical as a car’s physical safety. Modern vehicles rely on millions of lines of code that must not only work seamlessly but also remain resilient to potential cyberattacks. Regulations and industry standards mandate manufacturers to safeguard their systems against these threats. Two fundamental processes in achieving this are security validation and vulnerability testing. While both aim to ensure software security, they take distinct approaches to achieve it. Let’s dive into their roles, differences, and why they’re indispensable for automotive cybersecurity.

Security Validation

At its core, security validation is about ensuring that a system meets predefined security requirements and functions as expected under normal conditions. Think of it as a quality assurance process that confirms security measures are implemented correctly and comply with industry standards like UN R155/156 or ISO/SAE 21434.

For instance, security validation could involve verifying that Over-the-Air (OTA) update mechanisms comply with UN R156 requirements or ensuring that each ECU component is secure under different real-world conditions.

Manufacturers employ various testing methods to perform security validation, including but not limited to:

  • Functional Testing, which ensures key features like encryption and authentication work correctly under normal use cases.
  • Fuzz Testing, which introduces random or unexpected inputs to assess system stability and expose hidden vulnerabilities.
  • Penetration Testing, which simulates attack scenarios to test the system’s ability to defend against real-world threats.

The primary goal of security validation is to provide confidence and documented proof that all cybersecurity measures are not only in place but also operating effectively according to regulatory standards.

Vulnerability Testing

While security validation checks compliance, vulnerability testing takes a broader approach, exploring potential weaknesses or flaws that attackers might exploit. This process identifies vulnerabilities—both known and unforeseen—through rigorous probing and stress testing. Given that vehicle software is constantly evolving, vulnerability testing must be an ongoing process to mitigate risks proactively.

Common techniques include:

  • Fuzz Testing for Vulnerability Detection, which detects weaknesses by feeding unexpected or malformed data into the system.
  • Network and Protocol Testing, which analyzes communication protocols such as CAN, LIN, and Ethernet for exploitable flaws like injection vulnerabilities.
  • Hardware Security Testing, which examines hardware-software interactions, such as the extraction of firmware from electronic control units (ECUs), for potential vulnerabilities.

Unlike security validation, which confirms what is known, vulnerability testing ventures into the unknown, uncovering potential attack vectors that may not have been anticipated during the development process.

Key Differences Between Security Validation and Vulnerability Testing

Security Validation and Vulnerability Testing Differences

By combining these two processes, manufacturers can build automotive systems that are not only compliant but also resilient to cyber threats.

As the automotive industry moves toward greater connectivity, the stakes for cybersecurity are higher than ever. Security validation ensures that systems meet regulatory standards, while vulnerability testing helps uncover hidden risks before malicious actors can exploit them. Together, they form a comprehensive approach to protecting vehicle systems from cyber threats.

For instance, validating the proper encryption of V2X communication provides compliance, but only through vulnerability testing can potential flaws in cryptographic implementation be identified. By integrating both practices into the development lifecycle, manufacturers can ensure their systems are secure and future-ready.


Cybersecurity in modern vehicles is no longer an optional feature—it’s a foundational requirement. Security validation and vulnerability testing are two sides of the same coin, each addressing distinct yet complementary aspects of the security landscape. When combined, they provide the robust framework needed to protect vehicles from both known and emerging cyber threats.

For manufacturers, embracing these processes is not just about meeting regulatory requirements—it’s about staying ahead in an industry where safety, innovation, and trust go hand in hand.

Securing Vehicles with Automotive Intrusion Detection Systems (IDS)

It has long been established that cybersecurity is becoming more important in the automotive industry. The mass adoption of cybersecurity practices in the industry is in line with the development of vehicle technology. Nowadays vehicles have more complex internal structures and are more exposed to external communication channels, meaning that there are more endpoints that need protection from cyber threats. Automakers are turning to various cybersecurity approaches to secure their vehicles, one of the most common ones being automotive intrusion detection systems (IDS).

What is an Automotive IDS?

An automotive IDS is an intrusion detection system adapted specifically for the automotive industry. These solutions monitor network traffic entering and traversing the vehicle, as well as the activities within the vehicle’s components, to detect traffic anomalies or potentially malicious activity. IDS compares the monitored traffic and behaviors against a database of known cyber threats and attack patterns. If a match is found, it raises an alert to the relevant administrators or security personnel to address.

Automotive IDSs typically employ two main detection methods:

1. Signature-based detection: Matches observed activity against a database of known malicious patterns or signatures.

2. Anomaly-based detection: Identifies deviations from established normal network behavior or activity baselines, flagging any unusual activities that might indicate a potential intrusion.

It’s important to note that an intrusion detection system is a monitoring tool, meaning it detects threats but does not actively prevent or mitigate them. Upon detecting anomalous behavior or a potential threat, the IDS sends an alert, allowing administrators to investigate and take appropriate action.

Types of Automotive IDS

IDSs are categorized based on their deployment location and the scope of activity they monitor. In the automotive context, we will discuss two main types:

1. Network-based IDS (N-IDS)

A network-based IDS monitors the entire vehicle network for anomalous activity, checking all incoming and outgoing traffic. This provides a broad, network-level view of potential threats and can detect attacks targeting the vehicle’s communication channels or network infrastructure.

2. Host-based IDS (H-IDS)

A host-based IDS is a security software designed to monitor the activities of an individual host or vehicle component, such as an Electronic Control Unit (ECU). It focuses on detecting threats targeting specific systems or components within the vehicle, providing a more granular level of cybersecurity monitoring.

While implementing either one of these intrusion detection system types will help protect an automobile from cyber attacks, most contemporary vehicles will benefit from a mix of both host-based and network-based IDS. For instance, Autocrypt’s IDS combines both network-based and host-based IDS to ensure maximum threat monitoring coverage across the vehicle’s network and individual components.

Comprehensive Vehicle Protection

To ensure comprehensive vehicle protection, automakers are highly advised to implement multiple cybersecurity solutions simultaneously. Since an IDS is a monitoring-only device, pairing it with an Intrusion Prevention System (IPS) would ensure that malicious activities are not only detected but also mitigated.

Additionally, implementing diverse cybersecurity measures will help automakers better address the requirements of vehicle cybersecurity regulations like UN R155 and R156, which mandate cybersecurity throughout the entire vehicle lifecycle.

By adopting a multi-layered approach with complementary cybersecurity solutions like IDS, IPS, and others, automakers can significantly enhance the overall security posture of their vehicles, safeguarding them against a wide range of cyber threats in today’s connected automotive landscape.


Visit our in-vehicle security solutions page to find the solution that best fits your cybersecurity needs.

Follow AUTOCRYPT on LinkedIn to stay informed about our latest news and blogs.

Compliance with UN R156: Securing Vehicle Software Updates

In the past, vehicles were purchased with a fixed set of functionalities that remained unchanged until the owner acquired a new vehicle. However, modern cars have evolved into customizable platforms with software that can be continuously updated and enhanced.

To meet the growing demand for personalization and remain competitive, manufacturers now offer advanced features that can be subscribed to and downloaded onto vehicles at any time after purchase. These functionalities, such as entertainment applications, driver assistance systems, self-driving capabilities, and others, are constantly being improved and updated.

Maintaining this kind of flexible software structure requires vehicle manufacturers to implement periodic update procedures. However, since these updates essentially alter the vehicle’s software and carry a fair amount of potential risks, it is crucial that they are implemented in the most secure way possible. This is where the UNECE Regulation 156 (UN R156) comes into play, establishing a much-needed framework for secure vehicle software updates.

UN R156 Requirements

UNECE Regulation 156 establishes the minimum cybersecurity and Software Update Management System (SUMS) requirements for vehicle manufacturers. According to the regulation, manufacturers must implement the SUMS and demonstrate that they have the necessary processes in place to comply with all secure software update requirements. The requirements can be divided into two main categories:

  1. Software Update Management System Requirements: These include securing communication channels for updates, validating software integrity, implementing access control mechanisms, and maintaining update logs for auditing purposes.
  2. Vehicle Type Requirements: Specific rules and standards that vehicles must meet to ensure secure software updates.

As vehicles become increasingly software-defined, the ability to update their software securely and efficiently is paramount as unsecured software updates can leave vehicles vulnerable to cyber threats, such as malware infections, data breaches, or even remote control of vehicle systems. These risks can compromise vehicle safety, privacy, and security, making it essential to implement robust cybersecurity measures for software updates.

Securing Updates for UN R156 compliance

UNECE Regulation 156 requires manufacturers to implement appropriate cybersecurity measures to mitigate potential risks from software updates. These measures include:

  • Implementing a software update management system
  • Securing communication channels for update processes
  • Validating software integrity to prevent tampering
  • Implementing access control mechanisms to protect against unauthorized access
  • Maintaining update logs for auditing purposes

AUTOCRYPT offers a suite of in-vehicle cybersecurity products and solutions that implement the necessary security processes in line with UN R156 requirements for secure software updates. Apart from cybersecurity implementation, we also offer UN R155/156 compliance consulting services. Visit our UNECE WP.29 Consulting page to learn more and download the WP.29 regulation checklist outlining the steps for UNECE regulation compliance.


As the automotive industry continues to embrace software-defined vehicles, UN R156 plays a crucial role in ensuring the safe and secure updating of vehicle software. By establishing baseline requirements for cybersecurity and software update management systems, this regulation helps protect vehicles, their occupants, and the broader transportation ecosystem from potential cyber threats. Compliance with UNECE Regulation 156 is a critical step towards building a safer and more secure future for the automotive industry.