Ansys s'engage à préparer les étudiants d'aujourd'hui à la réussite, en leur fournissant gratuitement un logiciel de simulation.
Ansys s'engage à préparer les étudiants d'aujourd'hui à la réussite, en leur fournissant gratuitement un logiciel de simulation.
Ansys s'engage à préparer les étudiants d'aujourd'hui à la réussite, en leur fournissant gratuitement un logiciel de simulation.
Pour les États-Unis et le Canada
+1 844.462.6797
ANSYS BLOG
May 28, 2020
Smart, connected cars are loaded with digital systems and embedded software. This trend is only picking up speed as we continue in the race to autonomous vehicles.
Although the automotive industry has benefited from the new features and value electronics provide, the increased amount of software and connectivity has created numerous openings for cyberattack.
Between the recent headlines focusing on automotive hacking and a new industry standard for automotive cybersecurity, we need to get serious about mitigating digital attacks.
Vulnerabilities provide attackers with the opportunity to trigger a fault when they want to.
For example, in a well-publicized incident in 2015, a group of expert hackers were able to gain control of an SUV via its entertainment system.
This incident revealed a vulnerability causing the OEM to recall 1.4 million vehicles. Consumers around the world are now beginning to ask: “How safe is my vehicle from a remote attack?”
Automotive cybersecurity strategies need to be enacted to ensure public safety and to meet upcoming regulations.
With serious consequences on the line, who is responsible for designing electronic systems that are protected from these kinds of attacks?
That job falls to automotive electronics engineering teams. They work to securely integrate dozens of digital components, including:
These engineers must confirm that signals and controls are seamlessly combined in a way that optimizes and safeguards not only each component, but the entire electronics architecture.
The upcoming ISO 21434 standard (Road vehicles — Cybersecurity engineering) will force every OEM and electronics system provider to consider automotive cybersecurity as part of the product development process.
Engineers need a new process designed to meet growing cybercrime challenges.
This new ISO standard is being developed for system-level security to guarantee that automotive electronics engineers are doing an adequate job. ISO 21434 will ensure that engineers have arrived at a secure electronics architecture and have documented all their modeling and verification activities.
Recent headlines, as well as the new standard, are placing unprecedented pressures on electronics engineers in the auto industry. Additionally, traditional workflows are inadequate to meet these new demands. What’s needed is a new modeling solution and an associated set of best practices designed specifically to meet the growing cybercrime challenge.
The key to ensure automotive cybersecurity is to systematically perform threat analysis and risk assessment across the entire electronics architecture.
To that end, the safety experts at Ansys have designed a six-step, system-oriented cybersecurity analysis strategy to:
Ansys medini analyze helps engineers ensure the functional safety of automotive electronics. It includes new capabilities for verifying system-level security.
In conducting this analysis, engineers assess a wide range of attack scenarios, then determine potential risks that might occur in these scenarios. These steps include:
Early adoption of this process will improve the safety and security of in-vehicle systems as well as help companies assume a competitive edge in the industry.
To learn more about each step in the process, watch the recorded webinar: 6 Steps to a Smart Cybersecurity Strategy for In-Vehicle Systems.
To learn more about how to systematically perform threat analysis and risk assessment, read the white paper: Improving Cybersecurity for Automotive Electronics Systems via Ansys medini analyze.