Auto cybersecurity is on national agendas because automobiles are increasingly connected to the Internet and other systems and bad actors can commandeer a vehicle and render it dangerous, amongst other undesirable outcomes. The problem is complex and the point-solutions that exist today are fragmented leaving a very porous and “hackable” system. BlackBerry provides a 7-Pillar recommendation to harden automobile electronics from attack. The solution is intended to make it significantly harder for an attacker to create mischief. This paper describes the 7-pillars and how BlackBerry can help.
- Embedded World
- Machine Learning
- Power Electronics
- Dev Tools & OS
- Product Search
- Reference Designs
- Dev Kit Selector
- White Papers
- Webcasts & Events
Previous White Paper
Implementing Secured Software Updates for IoT Devices
This paper provides a comprehensive summary of theoretical approaches and recipes for practical implementat...
We also recommend:
Qualified Code Generation Greatly Reduces Cost of Safety-Critical Automotive Software
ANSYS SCADE Suite code generator for developing ISO 26262 compliant applications up to ASIL D, the highest safety requirement for automotive applications, substantially reduces the embedded software
Enabling Embedded Devices for Industrial Internet of Things (IIoT)
This paper seeks to outline a few of the key architectural considerations required for the successful operation of smart devices within an IIoT infrastructure with a focus on the software that runs on
18th Century Technology for Modern Medical IoT
Find out what accidentally discovered ancient technology powers a modern medical IoT design in this white paper.
What They Didn’t Teach You in Engineering School About Pressure Drop
A guide to understanding how to solve even complex pressure related design issues.
Practical Guide to Maximizing DC Measurement Performance
The various methods covered in this guide can help you achieve greater accuracy in your applications requiring DC measurements.
Use Intel® SSF to Remove Bottlenecks to AI
Machine learning and AI push the limits of processing, data transport, and storage. To achieve performance and scalability while containing cost, desi...
"Zero Touch" IoT Security Is Key to Continued Growth
By now it’s clear that the IoT will miss the much-touted target of 50B connected devices by 2020. The problem? IT managers are so worried about secu...
IoT Security (Finally) Delivers ROI
To protect sensitive device data and networks as a whole, developers should consider both hardware and software. Hardware security modules can enable...
Connected Railways Bring New Efficiencies and Amenities
A secure, unified communications system boosts railway efficiency, lowers costs, and improves the passenger experience. Collecting data leads to new i...
Securing the IIoT with Flexible Firewalls
Traditional IT firewalls don’t translate well to the factory floor, necessitating a new class of industrial firewall appliances. Industrial firewall...
Building a Smart City? Start with Smart Streetlights
Smart streetlights are an efficient and easy way to modernize your city while also providing a return on investment.
A 4-Step Guide to Security Assurance for IoT Devices
Teams need to rethink how they deliver software quickly – with security, safety, and quality in mind from design to deployment. But “rethinking” should not be “restarting.”
Finding Concurrency Errors with GrammaTech Static Analysis
Multithreading adds entirely new classes of potential bugs to those that must be considered by developers.
Making Safety-Critical Software Development Affordable with Static Analysis
Safety-critical software is becoming exceedingly expensive to develop and manufacturers are looking for solutions that increase developer productivity. Static analysis tools are indispensable for safe
Protecting Against Tainted Data in Embedded Apps with Static Analysis
This paper describes a static analysis technique – taint analysis – that can be used to find how potentially hazardous inputs can flow through a program to reach sensitive parts of code, empowering...
Containerized Linux: The Secret to IoT Security
A desire in the development community to use Linux is often at odds with the security requirements of an organization, leaving a gap between a company’s goals and the skill sets of its engineers.
Designing a system-on-chip (SoC) with an Arm Cortex-M processor
Are you integrating an Arm Cortex-M processor for the very first time? This comprehensive whitepaper will take you through the process of including a Cortex-M processor into your SoC design
Critical Techniques for High-Speed A/D Converters in Real-Time Systems
An A/D (Analog-to-Digital) converter, frequently abbreviated as ADC, accepts an analog voltage at the input and produces a digital representation of that voltage at the output that’s called a “sample”
Strategies for Deploying Xilinx's Zynq UltraScale+ RFSoC
On February 21st, 2017, Xilinx® announced the introduction of a new technology called RFSoC with the rather dramatic headline “Xilinx Unveils Disruptive Integration and Architectural Breakthrough for
Putting VPX and Open VPX to Work