Resources for Empowering Tomorrow’s Automotive Software

We deliver a comprehensive, end-to-end software-defined vehicle portfolio, comprising the required in-vehicle software stack, holistic cybersecurity, and cloud-based operations services – enabling fast and data-driven development, efficient deployment and management, as well as safe and secure operation of vehicle software at scale.

AUTOSAR Security – A Holistic Approach

The automotive industry is facing a dramatic transformation that brings fundamental changes to vehicle E/E architectures in the connected and automated driving environment. Designs are shifting from many application-specific ECUs to a few high-performance domain controllers with bundled functionalities. This technical engineering trend imposes a consolidation of automotive cybersecurity and a change of the AUTOSAR architecture.

Read More ...

New Container-Build Toolbox for Simulink, a handy addition to ETAS EHANDBOOK

The efficient calibration of automotive functions requires a comprehensive understanding of the logical structure and mutual dependencies of the embedded software components.  Because of that, having ECU software documentation that is easy to understand and to handle is essential in modern vehicle projects.

ETAS’ award-winning EHANDBOOK is a smarter approach to handling and extracting relevant information from the usually extensive ECU documentation. EHANDBOOK helps calibrators to better understand the ECU functions, perform calibration tasks faster and debug issues more efficiently.

Read More ...

Test Automation to conduct Design of Experiments (DOE)

ETAS INCA-FLOW (version 4.7) has new test bench methods which link test scripting to data-based modeling and optimization via ETAS ASCMO (Advanced Simulation for Calibration Modeling and Optimization).  This enables calibration engineers to improve accuracy and efficiency during the development of optimized powertrain systems

Read More ...

Ethical Automotive Hacking Simplified (Part 2 of 2)

Maybe you want to learn about car communication, participate in automotive capture-the-flag (CTF) events, or you’re worried about the overall security protection of the car. Where do you start? We’ll cover five phases of hacking a car – ethically – and what to consider in each phase. This is part two of a two-part blog post.

Read More ...
Anomaly Detection

Anomaly Detection for Enhanced Vehicle Security

As vehicle cyber-security advances, and as more cyber-security measures are implemented in the vehicle, it will become increasingly difficult for an attacker to penetrate the vehicle network. The need for Network based Intrusion Detection will therefore decrease, however, the benefits of Anomaly Detection will not.

Read More ...
Back to Top