No. | Video | Title・Author (Affiliation) |
---|---|---|
1 | ◯ |
Assessing automotive cybersecurity vulnerabilities with generative adversarial networks Miguel Martinez (IDIADA Automotive Technology SA) In an era where the cybersecurity is a key point for the protection of our daily life. Artificial intelligence has emerged as a solution to improve threat detection, risk assessment and response mechanisms. This paper is focused on the evaluation of vulnerabilities in automotive systems by using deep learning networks to generate attacks and discover vulnerabilities that could not be detected by traditional methods, it is proposed the development of a generative adversarial network (GAN) to reproduce synthetic cybersecurity attacks in the vehicular environment. |
2 | ◯ |
Securitization of an automotive FOTA process in compliance with UNECE R155 & R156 Sergi Arjona (Applus+ IDIADA) The automotive industry is transitioning to Software-Defined Vehicles (SDVs), where software drives functionalities like ADAS and infotainment. This evolution demands secure and scalable firmware-over-the-air (FOTA) systems compliant with UNECE R155 and R156. This project presents a tailored FOTA solution integrating secure boot, RSA signature verification, TLS-encrypted communication, and anti-rollback mechanisms to mitigate threats such as spoofing and tampering. Scalable and efficient, the system ensures update integrity, authenticity, and confidentiality while supporting large fleets. Real-time monitoring and modularity enhance regulatory compliance, positioning secure FOTA systems as vital to SDV development in connected vehicles. |
3 | ◯ |
WPA3 technology in Automotive: Enhancing security for connected vehicles. Ismael Vera (Applus+ IDIADA) WPA3 has landed to our internet connections, promising new capabilities and improvements from its previous version WPA2. Recently, this protocol has begun to be implemented in connected vehicles. In Applus+ IDIADA, we must stay updated about new emerging technologies in the automotive industry in order to continue being leaders in security testing. The purpose of this paper is to provide knowledge about what can we expect from WPA3, which improvements it brings in terms of security and how is our company preparing to test all its vulnerabilities, aiming to protect the final users and give them the safest vehicle possible. |
4 | ◯ |
End-to-End Secure Automotive IoT Applications Dennis Kengo Oka (TBD) The automotive world is merging with the IoT world with emergence of Automotive IoT applications where traditional embedded software architectures and development methodologies blend with modern cloud architectures and development. Automotive IoT encompasses vehicles, cloud and mobile devices thus increasing the overall attack surface and potential impact on safety, operation, privacy and finance. As such, it is imperative to consider relevant security solutions for embedded as well as for cloud and mobile. This article presents Automotive IoT use cases, discusses vehicle and cloud architectures, and reviews development processes and security frameworks to enable end-to-end secure development of Automotive IoT applications. |