Auto cybersecurity is on national agendas because automobiles are increasingly connected to the Internet and other systems and bad actors can commandeer a vehicle and render it dangerous, amongst other undesirable outcomes. The problem is complex and the point-solutions that exist today are fragmented leaving a very porous and “hackable” system. BlackBerry provides a 7-Pillar recommendation to harden automobile electronics from attack. The solution is intended to make it significantly harder for an attacker to create mischief. This paper describes the 7-pillars and how BlackBerry can help.
- Dev Tools & OS
- Machine Learning
- Reference Designs
- System Block Diagrams
- Dev Kit Selector
- White Papers
- Webcasts & Events
- Product Search
- Embedded World
Previous White Paper
Implementing Secured Software Updates for IoT Devices
This paper provides a comprehensive summary of theoretical approaches and recipes for practical implementat...
Most Recent Flipbooks
18th Century Technology for Modern Medical IoT
Find out what accidentally discovered ancient technology powers a modern medical IoT design in this white paper.
What They Didn’t Teach You in Engineering School About Pressure Drop
A guide to understanding how to solve even complex pressure related design issues.
Practical Guide to Maximizing DC Measurement Performance
The various methods covered in this guide can help you achieve greater accuracy in your applications requiring DC measurements.
4 Game-Changing Underlying Technologies for Advanced Radar
The underlying technologies that enable complex ISR systems are evolving. NI believes these four recent innovations will have the biggest enabling impact on radar technology over the next several year
Bare-Metal High Performance Computing in the Cloud
This whitepaper introduces different types of cloud computing, presents benefits and disadvantages and shows how “bare metal cloud” mitigates the disadvantages, and describes SkyScale’s Accelerated...
Accelerated Genomic Analysis – Applying Massive Parallel Computing to Genomics Secondary Analysis
This whitepaper presents results from a new method developed by Parabricks run on a SkyScale Accelerated Cloud system with up to 16 NVIDIA Tesla V100 GPUs that greatly reduces that time...
Use Intel® SSF to Remove Bottlenecks to AI
Machine learning and AI push the limits of processing, data transport, and storage. To achieve performance and scalability while containing cost, desi...
"Zero Touch" IoT Security Is Key to Continued Growth
By now it’s clear that the IoT will miss the much-touted target of 50B connected devices by 2020. The problem? IT managers are so worried about secu...
IoT Security (Finally) Delivers ROI
To protect sensitive device data and networks as a whole, developers should consider both hardware and software. Hardware security modules can enable...
Connected Railways Bring New Efficiencies and Amenities
A secure, unified communications system boosts railway efficiency, lowers costs, and improves the passenger experience. Collecting data leads to new i...
Securing the IIoT with Flexible Firewalls
Traditional IT firewalls don’t translate well to the factory floor, necessitating a new class of industrial firewall appliances. Industrial firewall...
Building a Smart City? Start with Smart Streetlights
Smart streetlights are an efficient and easy way to modernize your city while also providing a return on investment.
Machine Vision Makes Industrial Robots See and Improve
How emerging technologies like CV and real-time 3D video capture can help improve productivity and efficiency in robotics applications
A 4-Step Guide to Security Assurance for IoT Devices
Teams need to rethink how they deliver software quickly – with security, safety, and quality in mind from design to deployment. But “rethinking” should not be “restarting.”
Finding Concurrency Errors with GrammaTech Static Analysis
Multithreading adds entirely new classes of potential bugs to those that must be considered by developers.
Making Safety-Critical Software Development Affordable with Static Analysis
Safety-critical software is becoming exceedingly expensive to develop and manufacturers are looking for solutions that increase developer productivity. Static analysis tools are indispensable for safe
Protecting Against Tainted Data in Embedded Apps with Static Analysis
This paper describes a static analysis technique – taint analysis – that can be used to find how potentially hazardous inputs can flow through a program to reach sensitive parts of code, empowering...
Containerized Linux: The Secret to IoT Security
A desire in the development community to use Linux is often at odds with the security requirements of an organization, leaving a gap between a company’s goals and the skill sets of its engineers.
Designing a system-on-chip (SoC) with an Arm Cortex-M processor
Are you integrating an Arm Cortex-M processor for the very first time? This comprehensive whitepaper will take you through the process of including a Cortex-M processor into your SoC design
RFSoC for Radar and Electronic Warfare