3. Sniffing out bad behaviors to secure AVs
Recent hacks of connected vehicles can teach AV developers how to design cybersecurity measures that are cued by anomalies in vehicle behavior, writes Yossi Vardi, CEO of cybersecurity startup SafeRide.
Why it matters: Today's connected vehicles lack adequate security systems, and AVs will have far more vulnerabilities, raising the stakes even higher.
AV systems are more multifaceted, creating new vulnerabilities, particularly with vehicle-to-everything connectivity in place. They also have more sensors, and when sensor data is uploaded to servers, that creates another point of vulnerability.
What’s needed: So far, manufacturers have responded by issuing security updates for vehicles — but a proactive system that can anticipate and prevent attacks will be imperative for AV safety. One strategy — being explored by companies like SafeRide Technologies, Vectra, PerimeterX, and ExtraHop — is to examine malware behavior.
- A behavior-based security system could be triggered by anomalies that result from malware, rather than detecting malware itself. Triggers could include an upload to a sensor server with fewer or more bytes than typically expected or superfluous computer activity registered by the engine control unit.
What to watch: Behavior-based security systems must have the capability to learn vehicle behavior independently, without dependency on every software or hardware vendor, and regardless of data formats.
- Since that would require computing power that only advanced, high-end vehicles have onboard, most cars would need to rely on network bandwidth to run the detection program on the cloud.