The Top Five Takeaways from the Cybersecurity Panel at the Autonomous Tech Forum 2024
Being a panelist at the recent EETimes Autonomous Tech Forum was a privilege. The panel titled “How to Make AVs Trustworthy and Safe From Cybersecurity Threats” touched on the three critical themes of system-level approaches to AV security, hardware-based security as a foundation, and the criticality of security in supply chains.
First, Securing AVs requires considering the entire system, including hardware, software, and interactions. As a result, security must be built in from the ground up, not added as an afterthought. Attackers will exploit the weakest links, so every component matters. Second, the foundation of such a holistic approach is strong hardware security, as software security measures can never fix fundamental weaknesses in the underlying hardware. We discussed techniques like physical unclonable functions (PUFs), secure enclaves, and hardware root of trust. The third but certainly not least theme was supply chains. Given the complexity of the supply chain required for building AVs, securing the integrity and provenance of hardware components and software is critical. Therefore, critical challenges the industry must address head-on include traceability, trust verification, software bills of materials (SBOMs), and countering threats like counterfeiting and malicious insertions.
To read the full article, click here
Related Semiconductor IP
- USB 20Gbps Device Controller
- Fault Tolerant DDR2/DDR3/DDR4 Memory controller
- 25MHz to 4.0GHz Fractional-N RC PLL Synthesizer on TSMC 3nm N3P
- AGILEX 7 R-Tile Gen5 NVMe Host IP
- 100G PAM4 Serdes PHY - 14nm
Related Blogs
- Unleashing the Potential of RISC-V: A Recap of the SiFive Tech Forum
- Rambus Wins Automotive Cybersecurity Innovation of the Year at 2024 AutoTech Breakthrough Awards
- Autonomous Vehicle Trends and Technology Evolution
- Linley Tech Mobile Conference
Latest Blogs
- Cadence Powers AI Infra Summit '25: Memory, Interconnect, and Interface Focus
- Integrating TDD Into the Product Development Lifecycle
- The Hidden Threat in Analog IC Migration: Why Electromigration rules can make or break your next tapeout
- MIPI CCI over I3C: Faster Camera Control for SoC Architects
- aTENNuate: Real-Time Audio Denoising