Mandatory-access control that uses utilizes automotive-specific techniques to protect system data and code on the ECU.
Protects automotive environments by preventing execution and usage of unverified code and data on the ECU at boot and during runtime.
Detects known and unknown cyber threats and attacks by continually monitoring the ECU and alerting of suspicious behavior.
Prevents attacks from spreading to the in-vehicle network by blocking malicious communications using Deep Packet Inspection.
Logs, securely stores, and protects data integrity . Sends the data in a secure manner to other entities in or outside the vehicle for future analysis.
Prevents exploitation of vulnerabilities in ROP (Return Oriented Programming), by ensuring that the ECU program does not deviate from its expected execution flow.
Secure logger aligned with the IdsM standard.