Sign up to get full access to all our latest automotive content, reports, webinars, and online events.

Top 10 Automotive Security Vulnerabilities of 2015

Add bookmark
Automotive IQ
Automotive IQ
12/21/2015

Trying to build connected automotive software that’s both bulletproof and secure is a big task; knowing where to focus time and energy can be half the challenge. According to research conducted by CX3 Marketing on behalf of Rogue Wave Software, nearly 90 percent of all detected security holes can be traced back to just ten types of vulnerabilities.

The statistics in this paper on the frequency of vulnerability problems is from the National Vulnerability Database and Mitre. This paper simplifies that vast repository of vulnerability information into the tips that best help embedded developers.

This paper focuses on finding problems that affect software that could be used within an automotive telematics or infotainment system. This paper doesn’t include information on web, server, scripting, CRM, or anything else that isn’t embedded; however, the types of problems in this paper are common to a large number of varying types of embedded systems, not just automotive.

This paper focuses on finding problems that affect software that could be used within an automotive telematics or infotainment system. This paper doesn’t include information on web, server, scripting, CRM, or anything else that isn’t embedded; however, the types of problems in this paper are common to a large number ofIn this paper we’ll explore the top ten most common vulnerabilities for 2015, with examples from actual source code, and look at what changes can be made to coding style or processes to avoid them. varying types of embedded systems, not just automotive.


RECOMMENDED