The Top Five Takeaways from the Cybersecurity Panel at the Autonomous Tech Forum 2024
Being a panelist at the recent EETimes Autonomous Tech Forum was a privilege. The panel titled “How to Make AVs Trustworthy and Safe From Cybersecurity Threats” touched on the three critical themes of system-level approaches to AV security, hardware-based security as a foundation, and the criticality of security in supply chains.
First, Securing AVs requires considering the entire system, including hardware, software, and interactions. As a result, security must be built in from the ground up, not added as an afterthought. Attackers will exploit the weakest links, so every component matters. Second, the foundation of such a holistic approach is strong hardware security, as software security measures can never fix fundamental weaknesses in the underlying hardware. We discussed techniques like physical unclonable functions (PUFs), secure enclaves, and hardware root of trust. The third but certainly not least theme was supply chains. Given the complexity of the supply chain required for building AVs, securing the integrity and provenance of hardware components and software is critical. Therefore, critical challenges the industry must address head-on include traceability, trust verification, software bills of materials (SBOMs), and countering threats like counterfeiting and malicious insertions.
To read the full article, click here
Related Semiconductor IP
- LPDDR6/5X/5 PHY V2 - Intel 18A-P
- MIPI SoundWire I3S Peripheral IP
- LPDDR6/5X/5 Controller IP
- Post-Quantum ML-KEM IP Core
- MIPI SoundWire I3S Manager IP
Related Blogs
- Unleashing the Potential of RISC-V: A Recap of the SiFive Tech Forum
- Rambus Wins Automotive Cybersecurity Innovation of the Year at 2024 AutoTech Breakthrough Awards
- Autonomous Vehicle Trends and Technology Evolution
- Linley Tech Mobile Conference
Latest Blogs
- ML-DSA explained: Quantum-Safe digital Signatures for secure embedded Systems
- Efficiency Defines The Future Of Data Movement
- Why Standard-Cell Architecture Matters for Adaptable ASIC Designs
- ML-KEM explained: Quantum-safe Key Exchange for secure embedded Hardware
- Rivos Collaborates to Complete Secure Provisioning of Integrated OpenTitan Root of Trust During SoC Production
