Download Center

Visit our Download Center if you are looking for brochures, manuals, publications, etc.

RSS feed: latest Download Center updates of your filtered view

loading

Your download files are being prepared.
Please wait a few seconds.

Product Family / Category

Product Family / Category

Product / Topic

Product / Topic

Type

Type

Title

Date

ESCRYPT, ETAS downloadsSecurityRealTimes ArticleAutomotive security from the inside out

Electronic control units (ECUs) are the backbone of in-vehicle communication and function control – and that means they need reliable protection against unauthorized access. Hardware security modules (HSMs) meet this challenge by embedding security functions within the ECU’s main processor. Combined with security software stacks, they are the key pillar of any eff ective vehicle security system.

05/30/2019
ESCRYPTSecurityRealTimes ArticleDashboard demand for ransom payment

In the wake of the WannaCry cyber attack in May 2017, If ransomware successfully hijacks the system, it proves extremely diffi cult to free the car, a digital hostage, from the hands of the cyber criminals the automotive industry became even more painfully aware of the very real threat posed by crypto-ransomware. Smart mobility and functional digitalization open up new territory for cyber criminals to prey on, and vehicles are no …

05/30/2019
ESCRYPTSecurityRealTimes ArticleESCRYPT honored as “Innovator 2018“

Renowned German business publishing house brand eins recently released its annual ranking of the most innovative German companies – and ESCRYPT was one of the top performers. The company took a leading position among SMEs in the Technology and Telecommunication category, earning the accolade “Innovator of the
year 2018“.

05/30/2019
ESCRYPT, ETAS downloadsSecurityRealTimes ArticleHomogenous security for hybrid V2X communication

Connected driving is one of the most promising concepts in the future of mobility. Achieving it requires a Cooperative Intelligent Transport System (C-ITS) – a solution that enables the real-time exchange of data in bothvehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication. In the future, experts expect this vehicle-to-everything communication to work on the basis of multiple technological standards simultaneously. Yet …

05/30/2019
ESCRYPT, ETAS downloadsSecurityRealTimes ArticleProtection for smart factories

These days, everyone is talking about the advantages of fully connected, automated, and self-regulating processes in Industry 4.0. When production facilities become accessible via industrial Ethernet and internet protocol (IP), however, they become vulnerable to new risks and targets – but these have proved to be a less popular topic of conversation. To prevent intrusion and extortion by cyber attackers, holistic IT security solutions are …

05/30/2019
ESCRYPTSecurityRealTimes Article“Harmonious interplay”

The automotive industry is in a state of flux, and automotive security is emerging as a key success factor. Dr. Thomas Wollinger, Managing Director of ESCRYPT GmbH, explains how mindsets and actions are changing
direction – and why this calls for a conductor.

05/30/2019
ESCRYPT, LABCAR Software / SystemISOLAR-EVE, LABCAR-RTPC, SecurityRealTimes ArticleEmbedded Security Testing in Virtual Vehicles Embedded Security Testing in Virtual Vehicles Extensive hacking simulations with the help of a XiL testing environment

Modern software-controlled vehicle systems no longer only need to be functionally secure; they also require protection against attacks by cyber criminals. To test whether hacked ECUs remain secure in the context of the entire vehicle, ETAS and ESCRYPT rely on virtualization. This enables the advantages of XiL* technology to …

05/25/2019
ESCRYPT, ETAS downloadsSecurity, multiple productsRealTimes ArticleEthernet Security Ethernet Security

Secure Ethernet – an opportunity for vehicle IT

For over 40 years, the Ethernet has been an established IT standard widely used in data centers and in the consumer sector. Now it is conquering the world of modern vehicles. Following initial applications in systems without cross-domain communication, the E/E architecture is now expanding across domain boundaries. This raises questions about …

05/25/2019
ESCRYPTSecurityRealTimes ArticleImmune System for the Connected Vehicle Immune System for the Connected Vehicle Intrusion detection and prevention system (IDPS)

Increased safety and comfort. Optimized service and more enjoyable driving experiences. There is a long list of advantages to connected vehicles. However, integration into the Internet of Things also involves risks. It increases the danger of cyber attacks, and attackers are forever finding new weaknesses to exploit. Therefore, connected vehicles need …

05/25/2019
ASCET, StandardsASCET-DEVELOPER, IEC 61508, ISO 26262, SecurityRealTimes ArticleSafety and Security in Code Safety and Security in Code ESDL as a basis for more secure software

In the field of embedded software, the C programming language still reigns supreme. Making sure that C code is safe and secure however, is not so easy. Increased vehicle autonomy will require an even greater reliance on vehicle software integrity than today. To meet this challenge, ETAS has developed the Embedded Software Development Language (ESDL). ESDL helps software …

05/25/2019
ESCRYPTSecurityRealTimes ArticleThoroughly Tested From A to Z Thoroughly Tested From A to Z Security testing for the entire vehicle life cycle

Effective information security requires security testing throughout the entire vehicle life cycle. This is because in contrast to conventional testing for driving safety, in which the boundary conditions are mostly determined by physical laws and subsequently do not change, the assumptions and boundary conditions for security testing are subject to the eternal …

05/25/2019