IPA Approaches for Vehicle Information Security
Status: Final Published Date: August 2013 Region: Japan Document: Link Background The Japanese IPA is a governmental agency tasked with monitoring and analyzing shifting IT trends and [...]
ISO 14229-1:2013 Road Vehicles – Unified Diagnostic Services (UDS) – Part 1: Specification and Requirements
Status: Published Date: 2013 (second edition) Region: Global Document: Link Background ISO 14229 defines common requirements for diagnostic systems, whatever the serial data link is. The idea is [...]
Auto-ISAC Series of Automotive Cybersecurity Best Practices
Status: Final Published Date: Since July 2019 Region: United States Document: Link Background The Auto-ISAC stems from Presidential Decision Directive 63 (PDD-63) in 1998 on the creation of [...]
NHTSA Cybersecurity Best Practices for Modern Vehicles
Status: Final Published Date: October 2016, Version 1 Region: United States Document: Link Background The U.S. DOT’s NHTSA is behind the Cybersecurity Best Practices for Modern Vehicles (Report [...]
Trusted Execution Environment (TEE)
Status: Final Published (maintained by GlobalPlatform) Date: Public Release, November 2018 (most recent system architecture release) Region: Global Document: Link Background The Trusted Execution [...]
SP 800-153 Guidelines for Securing Wireless Local Area Networks (WLANs)
Status: Final Published Date: February 2012 Region: United States Document: Link Background The NIST SP 800-153 document was developed to provide security guidance for WLAN connections based on [...]
Green Hills Software Welcomes Argus Cyber Security into Its Rich EcoSystem of Automotive Partners
The partnership follows a successful customer collaboration in which Argus Control Flow Integrity, in combination with the Green Hills Optimizing C/C++ Compiler, will start protecting vehicles on [...]
Automotive Software Development with Cyber Security in Mind
Introduction By 2025, forecasts predict that there will be hundreds of millions of connected vehicles on the road. The decision-making process in the car is gradually handed over to machine [...]
ISO/IEC 30111:2013 Information Technology – Security Techniques – Vulnerability Handling Processes
Status: Final Published Date: November 2013, Version 1 Region: Global Document: Link Background ISO 30111 is to be used in conjunction with ISO 29147. It has been developed by the ISO and IEC’s [...]