Mensch tippt auf der Laptop-Tastatur

Enforcing security on a technical level

Cyber security affects all industries that work with embedded systems. Learn more about specific technical security aspects that we typically work on and tailor to the technical as well as non-technical objectives of our customers.

Icon Risk Analysis Tooling

RISK ANALYSIS TOOLING

Risk analysis is crucial to identifying the security mechanisms that are actually worth investing in. There are many risk assessment methods on the market that are structured around a trade-off between the effort that is required to model the system and the accuracy of results.

Icon Secure Boot

SECURE BOOT

Attacks that survive a reboot of a control system can be used by attackers for a variety of purposes, including tuning and exploration of whether additional system components can be attacked.

Icon Secure Update

SECURE UPDATE

A system update feature is a double-edged sword. On the one hand, an update functionality is crucial to be able to patch newly identified vulnerabilities in a connected world.

Icon Lupe

SECURE DIAGNOSTICS

Diagnostic capabilities are an essential feature of any ECU, no matter if in the development or out in the field.

Icon Organigramm

SECURE COMMUNICATION

“Defense-in-Depth” is an important paradigm of modern security architectures. In simple words it means “Security mechanisms can fail, so do not trust single mechanisms.”

Icon Sendegerät

CUSTOMIZED CRYPTOGRAPHIC PROTOCOLS

Cryptographic communication protocols are omnipresent in the connected world of today. Examples include pairing of smart devices, over-the-air updates and diagnostic access.

Icon Schlüssel

KEY MANAGEMENT

Key management is the foundation of most security concepts. Regardless of whether a Secure Boot concept has to be established or updates have to be secured, cryptographically strong keys are necessary and have to be managed.

Icon Hardware Security Modul

HARDWARE SECURITY MODULES

Hardware Security Modules (HSMs), ARM Trustzone and Trusted Platform Modules (TPMs) are hardware enclaves that are separated from the much more complex and potentially vulnerable main system.

Icon Virtualitätswolke

VIRTUALIZATION

A common goal is to reduce the physical complexity of, for example, a car network and all its attached systems. In order to achieve that goal, fewer but more powerful processors must be utilized that, in turn, handle many different tasks at once.

Icon Alarmglocke

INTRUSION DETECTION SYSTEMS

Intrusion detection systems (IDS) are the “immune system” of products that enable companies to detect and be able to react to attacks that are in progress.

Icon Fälschungsschutz

COUNTERFEIT PROTECTION

Theft of intellectual property and product counterfeiting has continuously increased in recent years. As product counterfeits have a direct impact on revenue and constitutes a risk to return-on-investment calculations, preventing it is one of the top priorities with most of our customers.

Icon Cloud Integration

CLOUD INTEGRATION

In the Internet-of-Things, embedded systems are often connected with a backend that is hosted in the cloud. This leads to a system that includes embedded devices as well as a communication channel and an IT backend.

Vernetzte Stadt, die sicher ist

AUTOSAR SECURITY

AUTOSAR is a standard for modern vehicle E/E architectures that can be applied to embedded control units (classic AUTOSAR) and vehicle computers (adaptive AUTOSAR). AUTOSAR can be applied in the Automotive domain, to off-highway machines and sometimes even to medical equipment.