Cover Image


Automotive Cybersecurity: Meeting the High-Stakes Challenge

出版商 VDC Research Group, Inc. 商品編碼 348571
出版日期 內容資訊 英文 28 Pages; 5 Exhibits
商品交期: 最快1-2個工作天內
Back to Top
汽車網路安全:應對高風險的課題 Automotive Cybersecurity: Meeting the High-Stakes Challenge
出版日期: 2015年12月30日 內容資訊: 英文 28 Pages; 5 Exhibits


本報告提供汽車用網路安全趨勢的相關調查,聯網汽車的普及情形,安全方面及資料隱私上的風險的安全必要條件,車載用硬體設備&軟體技術類型、功能和概要,汽車安全硬體設備、軟體、服務的市場規模 (收益規模) 的變化與預測,競爭環境與主要供應商簡介等彙整資料。






  • 表格:有網際網路連接的新車的比例:各連接類型


  • 表格:每台新車的汽車微處理器的平均數量
  • 在階層化供應鏈中的安全


  • CAN Bus的問題
  • 安全啟動
  • 硬體設備安全模組和SHE(Secure Hardware Extension)
  • 虛擬化和分離
  • 安全編碼
  • 開放原始碼編碼
  • 安全更新
  • IVI
  • 自動駕駛車

V2v & V2I的保護



  • 內建式安全軟體
  • 表格:車載用安全軟體:全球收益的變化與預測
  • 車載用安全硬體設備
  • 表格:導入了硬體設備安全的汽車系統搭載微處理器的比例的變化
  • 連接性&雲端服務用安全
  • 表格:汽車市場上IoT連接性&雲端服務的全球收益的變化與預測


  • 主要供應商簡介
  • Covisint
  • Elektrobit
  • Green Hills Software
  • Harman/Redbend/Symphony Teleca
  • QNX
  • Security Innovation

VDC 關於Research


Electronics continue to proliferate in automotive applications, such that the typical new car contains dozens of embedded systems. And a hacked car is among the nightmare scenarios for automakers and drivers alike. Security domains for hardware and software include: in-vehicle processors; local area and wide area communications; infotainment; remote software updating and management; and related applications.

What questions are addressed?

  • How fast is connectivity increasing in the automotive market, and how does it impact cybersecurity?
  • How do security requirements differ between safety-critical functions and information systems?
  • How does the automotive industry's tiered supply chain impact cybersecurity?
  • Which embedded hardware and software technologies will help secure automotive systems?
  • How large is the automotive market for embedded security software, hardware, and cloud services?
  • Which security vendors are poised for the greatest impact in this segment?

Who should read this report?

  • This report is for those making critical decisions regarding product, market, channel, and competitive strategy and tactics in the automotive electronics and embedded security markets. People who could benefit from reading this report include those with roles in: product management, marketing and strategy executives at OEMs, development tools suppliers, investment firms, and associated positions and organizations.

Vendors Mentioned in this Report

  • ARM
  • Athena Group
  • Covisint
  • Elektrobit
  • Freescale/NXP
  • Green Hills Software
  • Harman/Redbend/Symphony Teleca
  • Infineon
  • Intel
  • Mentor Graphics
  • Movimento
  • QNX
  • Renesas
  • Secunet
  • Security Innovation
  • Trillium

Executive Summary

As Internet connectivity and electronic features proliferate in motor vehicles, cybersecurity threats will increase risks to both occupant safety and data privacy. The tiered nature of the automotive supply chain complicates efforts to design and build secure vehicles. The CAN bus used in many safety-critical vehicle functions is particularly problematic to secure, as is the interface between infotainment and functional systems. Forthcoming vehicle-to-vehicle and vehicle-to-infrastructure communications technologies will introduce additional cybersecurity risks.

A range of automotive hardware and software security solutions is already available with more in development. However, automakers will exacerbate the challenges of data security and privacy through their desire to monetize vehicle data.

Key Findings

  • Nearly one-third of new vehicles sold in 2015 had Internet connectivity through embedded cellular modems and/or smartphone interface, and by 2020, more than three-quarters of new vehicles will have such connectivity.
  • The average new vehicle in 2015 contained XX microprocessors, a number which will continue to rise in coming years but be partially offset by consolidation of multiple functions into individual processors.
  • Fewer than XX% of in-vehicle microprocessors employed hardware security features in 2014, but VDC expects that portion to rise to XX% by 2020.
  • IoT cloud services for the automotive market will rise from $XX in 2014 to $XX in 2020, presenting strong opportunity for cloud vendors and technology suppliers with expertise in both security and the automotive market.

Table of Contents

Inside This Report

  • What questions are addressed?
  • Who should read this report?
  • Vendors Mentioned in this Report

Table of Contents

Executive Summary

  • Key Findings

Connected Cars: the Poster Child of Cybersecurity Risk

The Automotive Market & Internet Connectivity

  • Exhibit 1: Percent of New Vehicles with Internet Connectivity, by Connection Type

Automotive Security is Less Than the Sum of its Parts

  • Exhibit 2: Average Number of Embedded Microprocessors per New Vehicle
  • Security Implications of Tiered Supply Chain

Securing Functional Safety

  • The CAN Bus Problem
  • Secure Booting
  • Hardware Security Modules & Secure Hardware Extension
  • Virtualization & Separation
  • Secure Coding
  • Open Source Code
  • Secure Updates
  • The IVI
  • Autonomous Vehicles

Securing V2V & V2I

Securing Personal Data

Market Opportunities for Automotive Security Solutions

  • Embedded Security Software
  • Exhibit 3: Worldwide Revenues for Embedded Security Software in Automotive Market 2014 to 2020
  • Embedded Security Hardware
  • Exhibit 4: Percentage of Microprocessors Embedded in Automotive Systems that Employ Hardware Security, 2015 to 2020
  • Security for Connectivity & Cloud Services
  • Exhibit 5: Worldwide Revenues for IoT Connectivity & Cloud Services in the Automotive Market 2014 to 2020

Competitive Landscape

  • Selected Vendor Profiles
  • Covisint
  • Elektrobit
  • Green Hills Software
  • Harman/Redbend/Symphony Teleca
  • QNX
  • Security Innovation

VDC Research

  • About the Authors
  • About VDC Research
Back to Top