Cybersecurity

We offer expertise in integrating cybersecurity solutions into automotive software systems, ensuring compliance with ISO 21434 and OEM-specific security requirements. Our focus lies in tailoring third-party tools and technologies to align with the functional and security needs of OEMs and Tier-1 suppliers.
From the integration of hardware and software cryptographic stacks to implementing secure boot, secure communication, and secure flashing, we specialize in delivering robust and scalable cybersecurity solutions.
How We Can Help
Cybersecurity Development and Integration
End-to-End Development as per ISO 21434
▹ Comprehensive V-cycle development: TARA, item definition, cybersecurity goals, and penetration testing.
▹ Development and validation of cybersecurity requirements tailored to OEM standards.
Cryptographic Stack Integration
▹ Integration of AUTOSAR Crypto Stack modules: SecOC, CSM, CryIF, and CryDrv.
▹ Integration of customer-specific complex device drivers (CDDs), including crypto libraries and fault vector management (FVM).
▹ Tailoring of Vector vHSM or EB Zenthur to enhance OEM-specific bootloader functionalities.
Secure System Implementation
▹ Design and implementation of secure boot, seed/key management, and secure flashing mechanisms.
▹ Validation and integration of cryptographic functionalities: signature verification, certificate validation, and CMAC.
Penetration Testing and Validation
▹ Grey-box penetration testing to identify vulnerabilities and ensure system robustness.
▹ Validation of secure diagnostics, logging, and memory access control.

Capabilities
Secure System Features
Secure Flashing
▹ Ensuring reliable and authenticated firmware updates.
Secure Boot and Runtime
▹ Preventing unauthorized system modifications.
Secure Diagnostics
▹ Protected access to system diagnostics.
Secure Communication
▹ Implementation of SecOC and other protocols to safeguard data transmission.
HSM Integration
▹ Expertise in Vector vHSM and EB Zenthur for secure key storage and cryptographic operations.
End-to-End ISO 21434 V-Cycle
▹ Comprehensive development process covering TARA, cybersecurity goals, and penetration testing.
Cybersecurity Functionality
▹ Secure logging and memory management.
▹ Secure JTAG and hardware access control.
▹ Advanced cryptographic operations: certificate validation, signature verification, and secure communication protocols.
Toolchain Expertise
DaVinci Configurator
▹ AUTOSAR module configuration.
HighTec Compiler
▹ Optimized for safety-critical automotive applications.
WinIdea Debugger
▹ For debugging and validation.
Vector CANoe
▹ Network simulation and testing.
Experience
Notable Projects
Battery Management System (BMS)
▹ Implemented secure boot, secure flash, and secure diagnostics.
▹ Integrated cryptographic functionalities like CMAC and signature verification.
▹ Integrated vHSM for secure onboard communication and secure flashing.
▹ Developed solutions for secure boot and cryptographic validation.
Domain Controller
▹ Secure onboard communication implementation using AUTOSAR SecOC.
HVAC System for VW Bootloader
▹ Developed fault detection systems (FDS) and integrated secure diagnostics.
Inverter Systems
▹ Delivered vHSM integration, secure flashing, boot diagnostics, and secure logging.
Hardware Platform Expertise
▹ Infineon TC23x, TC37x
▹ NXP S32G
▹ Renesas RH850
How We Do It
Focused Integration Approach
▹ Leveraging third-party tools to enhance OEM-specific cybersecurity requirements.
▹ Customizing solutions to ensure compatibility with existing architectures and platforms.
Security-First Development
▹ Embedding cybersecurity features across the development lifecycle for robust protection.
▹ Tailoring cryptographic solutions for both hardware and software stacks.
Standards Compliance
▹ Adhering to ISO 21434 guidelines and aligning with OEM-specific security frameworks.
The Advantages We Offer
Integration Expertise
▹ Skilled in integrating and customizing third-party cybersecurity solutions.
Standards Compliance
▹ Development aligned with ISO 21434 and industry best practices.
Secure Operations
▹ Advanced cryptographic capabilities tailored to OEM-specific needs.
Scalable Solutions
▹ Designed for current and future automotive cybersecurity challenges.
Proven Experience
▹ Successful execution of complex projects across diverse domains.

