show episodes
 
As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
  continue reading
 
Artwork

1
Embedded Executive Podcast

Rich Nass, Embedded Computing Design

icon
Unsubscribe
icon
Unsubscribe
Weekly
 
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
  continue reading
 
Watch Nationally Syndicated Car Concerns USA Radio Show Every Week-day Morning Starting at 9:00 A.M. (EST). USA TOLL-FREE: 1-855-CAR-CONCERNS (855-227-2662) @ http://bit.ly/cwAyD7 Car Concerns Is The Fastest Growing Car Talk Radio Show In The USA! Car Concerns is Nationally Syndicated Radio Talk Show That is Heard In Great USA Radio Markets Like Boston, Chicago, Las Vegas, Pittsburgh, Winter Springs, Botell, Hagatna and Other Great Cities Around The Nation. Is Car Concerns Heard In Your Town ...
  continue reading
 
Loading …
show series
 
Functional safety is no longer a “nice to have” or “should have” in many applications, having moved to “must have” in spaces like automotive, industrial automation, medical devices, and aviation. Passing the functional safety testing process can be rigorous, especially if you’re going through it for the first time. But even the best experts take at…
  continue reading
 
In programming jargon, the term “real time” is not used in its literal sense, which can be confusing. The literal definition means that when something happens in real time, it happens instantaneously. But in practice, something that occurs very quickly is mistitled as being real-time. Why does the misconception continue to occur, and what problems …
  continue reading
 
With cyber attacks on trucks becoming more common and costly, fleet operators and OEMs must rethink how they protect their vehicle security and data privacy. Trucks are no longer isolated units, they're part of a larger, interconnected automotive ecosystem vulnerable to disruption. In this episode, we unpack the threats, explore real-world hacking …
  continue reading
 
If system developers had unlimited power for their designs, they’d likely find a way to take advantage of it. And the same goes for performance. However, neither of those features is available in infinite quantities. And in just about every case, one becomes a tradeoff for the other. So, how do you manage that tradeoff, and when you do, what other …
  continue reading
 
Low-power is the ultimate priority in some WiFi networks, especially when you’re designing a battery powered device. Cameras used in remote locations are prime targets for this discussion. In some cases, access to that camera is difficult, so the user needed want to charge or replace a battery on a regular basis. To understand what the current stat…
  continue reading
 
In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace. From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding ne…
  continue reading
 
Chip design has always been a complex process, and there is no end in sight. What has improved are the tools available to an IC designer. The chips are getting more specialized; hence, the tools must drill down further into the process than ever before. This sounds like a lot of black magic, but it becomes less cloudy when someone who understands t…
  continue reading
 
Just when you thought you’d done everything you could do with Bluetooth, along comes something new and unique. At a recent technical conference, I was witness to a very cool demo that was all based on Bluetooth. Rather than attempt to describe it myself, I asked Simon Ford, the Founder of Blecon, the company providing the demo, to explain what it i…
  continue reading
 
We often say that designing secure systems means thinking about security early on in the design process. That means really early on, well before any pen is put to paper, so to speak. To understand what that means, I spoke to Denis Noel, the Director of Strategy in the Secure Connected Edge business unit at NXP on this week’s Embedded Executives pod…
  continue reading
 
Don’t stop me if you’ve heard this before, because it needs to be repeated, again, and again. The embedded industry needs to take security more seriously. Hacks are continuing to occur and will continue until there is a “security by design” mentality in place in our space. It’s hard to believe we are still having this discussion, but we are. I also…
  continue reading
 
In this episode, we discuss the groundbreaking concept of Dynamic SBOM and its role in modern automotive software security. Hear how real-time monitoring of third-party library usage can lead to more precise vulnerability management. We explain the process behind intercepting dynamic calls and replacing them with breakpoints for live analysis. Disc…
  continue reading
 
Edge AI is one of the popular topics amongst the embedded community. It’s the place where decisions are made, data is analyzed, etc. It’s also a place where lots of confusion arises because of its complexity, especially from a development perspective. To get to the heart of where the challenges lie in this phase of design, I spoke with Jim Beneke, …
  continue reading
 
Common knowledge says that if you want to create an ASIC, you’d better have at least $1M in your bank account. The folks at Efabless say that my common knowledge is inaccurate by a long shot. They claim to be able to get folks started for far less than $100k. I needed to understand how this is possible, so I invited Michael Wishart, the CEO and co-…
  continue reading
 
In the age of connected cars, software-driven systems, and global supply chains, cyber security challenges have become increasingly complex. This episode delves into the pitfalls of relying on disconnected solutions to guard modern vehicles. We’ll show how a platform-centric automotive security approach consolidates everything—from vulnerability sc…
  continue reading
 
From a developer’s perspective, Edge AI is anything but simple. Any tools, software, etc., that can simplify the process of integrating this technology into a system is very welcome. That’s where ClearBlade comes in, with its framework that developers “design to,” using hardware, software, and even terminology that the design community is accustome…
  continue reading
 
Industrial platforms come with a specific set of design criteria. And the term “industrial” can be quite ambiguous, running the gamut from power tools to manufacturing equipment. Obviously, there are different requirements within this range. When you’re choosing an MCU for this space, you had better understand what your specific requirements are. M…
  continue reading
 
As OEMs race to innovate with autonomous driving, V2X communication, and other cutting-edge tech, compliance with UNR 155 and ISO/SAE 21434 has never been more important. But what do these regulations really mean for your day-to-day operations? In this episode, we demystify the role of CSMS and how it supports continuous security through design, de…
  continue reading
 
At the LoRa Alliance, there’s a new sheriff in town. Alper Yegin is the group’s new CEO. LoRa, which stands for long range, allows transmissions to occur at very low power, sometimes lasting many years without changing batteries. Yegin believes the LoRa spec is quite solid, but there’s always room for it to evolve. He feels that one of his primary …
  continue reading
 
Touted as an off-the-shelf solution for key fob programming, a mysterious PSP-like Car Key Registration Device promises to sidestep traditional authorization channels. In this episode, we share how the PlaxidityX team simulated various car responses to test whether the device truly mirrored official protocols. They recount the odd mix of user-frien…
  continue reading
 
Open tools are becoming the norm in the embedded software development space. And that’s definitely the case for Analog Devices’ CodeFusion Studio tool. The IDE lets developers start with an SoC, and design their systems from there. The software development platform is based on Microsoft's Visual Studio Code (VS Code). On this week’s Embedded Execut…
  continue reading
 
Have you ever wondered how microcontrollers in vehicles manage memory access behind the scenes? This episode sheds light on the Memory Protection Unit, an essential yet sometimes overlooked hardware layer designed to stop unauthorized reads, writes, and execution. We revisit fundamental principles—like differentiating between the Core MPU (CMPU) an…
  continue reading
 
It’s been a very successful year for the Z-Wave Alliance. If you have any doubts about that statement, check out this week’s Embedded Executives podcast, where I spoke to Avi Rosenthal, the Chairman of the Alliance. Avi rattled off a long list of achievements for the organization, including a new spec, an unplug fest, and many new products. These e…
  continue reading
 
This episode explores AI’s transformative role in automotive cyber security. As vehicles become increasingly connected and autonomous, cyber threats have evolved, but AI provides the precision and speed needed to counter these challenges. Join us as we unpack the critical role of AI in protecting modern vehicles, from anomaly detection to sophistic…
  continue reading
 
Intrusion Detection System Managers (IdsM) play a vital role in modern automotive cybersecurity, addressing the challenges posed by complex security events and regulatory requirements. IdsM solutions filter and standardize event data from AUTOSAR and Linux ECUs, reducing inefficiencies in monitoring and analysis. In this episode, we will explore ho…
  continue reading
 
Tyson Tuttle left the helm of Silicon Labs a few years ago, took a little time to recharge the batteries, and now he’s back in the thick of things with a new company called Circuit. Given its name, you might think it’s a company designing ICs, but that’s not true. The company is building what some might call a productivity tool, but Tyson describes…
  continue reading
 
The rise of CAN injection car theft has introduced a new level of sophistication to vehicle hacking, allowing thieves to access the CAN bus. In this episode, we discuss how this technique allows hackers to tap into the CAN bus through exposed wiring, sending fake messages that bypass security measures and immobilizers. The impact of these attacks e…
  continue reading
 
The industry revolves around two types of AI, namely research AI versus production AI. I wasn’t sure what these terms meant and their differences, so I asked an expert to join me on this week’s Embedded Executives podcast. John Weil is the Vice president and General Manager of Synaptics’ IoT Business Unit. After setting me straight, John talks abou…
  continue reading
 
Keyless entry systems, once considered the pinnacle of vehicle convenience, are now a major target for hackers and car thieves. In today’s episode, we’ll explore the vulnerabilities in Remote and Passive Keyless Entry (RKE/PKE) systems, focusing on how replay, relay, and roll jam attacks exploit their weaknesses. We break down these attack methods,…
  continue reading
 
What is the real definition of a software-defined vehicle (SDV)? It depends, mostly on who you are asking that question of. I asked John Heinlein, the Chief Marketing Officer at Sonatus and he had a great response on this week’s Embedded Executives podcast. We discussed the differences between various tiers of vehicles, how they are upgraded, and w…
  continue reading
 
Is documentation an issue for your embedded project? Wouldn’t it be great if you didn’t have to create that documentation yourself, yet have it be as good (or better) than you could do yourself? That’s what the tool from Driver does. In full disclosure, I didn’t understand how the company’s technology worked, so I had a great discussion with Driver…
  continue reading
 
Automotive cybersecurity is becoming increasingly important as electric vehicles face new vulnerabilities. In this episode, we explore a major flaw discovered in the EVerest open-source charging firmware, which could allow attackers to take control of charging stations and potentially compromise vehicles themselves. This vulnerability serves as a s…
  continue reading
 
The amount of NAND memory that exists today is staggering. There are many different kinds of NAND, and the needed type is based on the intended application. Sometimes you need high-speed memory, sometimes very dense memory, and sometimes you need the memory to go into an environment that’s less than favorable. But the memory itself is just one piec…
  continue reading
 
Automotive networks face an alarming threat: Man-in-the-Middle (MITM) attacks exploiting the SOME/IP protocol. This episode explores how attackers intercept and manipulate communications between ECUs using in-vehicle Ethernet networks, enabling them to falsify data, disrupt services, and compromise safety. We outline the attack setup, flow, and the…
  continue reading
 
With all the focus on AI and machine learning these days, we sometimes take other facets of design for granted, some of which are vital, like the wireless component. Synaptics’ Veros architecture fits the bill for state-of-the-art wireless communications with high throughput, low power consumption, and top-notch security. If you’re designing an AI-…
  continue reading
 
In this episode, we explore how industry leaders PlaxidityX, CyberArk, Device Authority, and Microsoft have joined forces to pioneer the next generation of automotive and mobility security solutions. With new regulatory mandates like UNECE WP.29 and ISO 21434 on the horizon, the automotive industry requires a holistic approach to securing vehicles …
  continue reading
 
We are being bombarded with data; it’s coming at us from so many avenues, particularly as we move into the world of AI and the analytics that it brings. The key to a proper edge-to-cloud strategy is being able to make sense of that plethora of data. That statement sounds obvious and simple, but it’s quite the opposite. If you don’t have the proper …
  continue reading
 
The motorcycle industry is facing a new challenge: automotive cybersecurity. This episode explores how UNR 155, initially designed for passenger vehicles, now includes motorcycles, scooters, and high-speed e-bikes. We’ll discuss what this regulation means, why it’s happening, and how it could reshape the two-wheeler market as manufacturers scramble…
  continue reading
 
When designing systems with high integrity, say for automotive applications, what is the programming language of choice? I believe that’s referred to as a loaded question, because there are so many variables involved, and it’s a question that’s almost impossible to answer. Unfortunately, many developers make a decision for the wrong reasons. To get…
  continue reading
 
Learn how PlaxidityX’s automotive expertise and Eviden’s MDR capabilities combine to create an end-to-end solution for vehicle security. This episode covers the benefits of establishing a dedicated Vehicle SOC (VSOC), an emerging necessity in the industry to monitor, detect, and respond to cyber-attacks in real time. We'll discuss the importance of…
  continue reading
 
What is rad-hard memory, and when and where should it be used? And what makes it different from conventional memory? The answers may seem obvious, but that’s not the case. That’s exactly why I spoke to Helmut Puchner, Vice President and Fellow in the Aerospace and Defense division of Infineon Technologies in this week’s Embedded Executives podcast.…
  continue reading
 
The connected car and smart home ecosystems are on a collision course, bringing convenience and innovation, but also creating serious cybersecurity concerns. This episode delves into what happens when cars and homes start talking to each other, thanks to new collaborations like Samsung and Hyundai's initiative. We’ll look at the benefits, like vehi…
  continue reading
 
The automobile's in-cabin user experience (UX) is undergoing some serious changes. We’re nearing the point where the automobile can be viewed as an office or entertainment center that also transports you from point A to point B. With all those changes, it’s important to ensure that these non-mission-critical functions communicate with the mission-c…
  continue reading
 
As vehicles become more connected, cyber security risks grow, making effective risk management a priority in the automotive sector. In this episode, we explore Threat Analysis and Risk Assessment (TARA) in automotive cyber security, and why automating this process is essential to keep pace with evolving threats and regulatory requirements. We’ll al…
  continue reading
 
The Zero Trust Architecture (ZTA) provides a new approach to cybersecurity, and outlines a great model for developers to follow. Like the name implies, you should trust no one, at least initially, and assume that all networks and traffic are potential threats. We know that no network is ever 100% secure, but beginning with this assumption gives you…
  continue reading
 
Testing high-power batteries, like those used in EVs, can be a tricky endeavor. It’s more complicated and, frankly, more dangerous than testing smaller, lower-voltage batteries. It makes sense that the testing of these packs could and should be left to recognized test experts, Tektronix in this case. In a discussion with Russ Gaubatz, a senior appl…
  continue reading
 
As the automotive industry moves toward software-defined vehicles, ensuring the security of ECUs is paramount. ECUs handle critical vehicle functions, and with their increasing connectivity, they are more vulnerable to cyber attacks. SELinux is a trusted solution for managing access control in Linux-based systems, including ECUs, but on its own, it…
  continue reading
 
We’ve talked a lot about the software-defined vehicle. This week, we are talking about the electrification of that same automobile on the Embedded Executives podcast. As you might expect, it means removing some of the car's mechanical components and replacing them with electrical components. The benefits of doing that are great, as Sayeed Ahmed, a …
  continue reading
 
Automotive cyber security is becoming a critical concern as software-defined vehicles (SDVs) increasingly dominate the market. In this episode, we explore how DevSecOps ensures that cyber security is integrated at every stage of the automotive software development process. By adopting a security-by-design approach, automakers can accelerate product…
  continue reading
 
TSN is a standard that originated for video-streaming applications. But today, it’s finding a home in industrial applications, and it’s is now becoming irreplaceable. Hear why in this week’s Embedded Executives podcast, where I spoke to Tom Burke, who is the Global Director of Industry Standards for Mitsubishi, as well as the Global Strategic Advis…
  continue reading
 
In this episode of the Plaxidity X automotive cybersecurity podcast, Cars, Hackers, & Cybersecurity, we explore the groundbreaking transition from Software Defined Vehicles (SDVs) to User Defined Vehicles (UDVs) and what it means for the automotive industry. Modern vehicles are no longer just machines—they are customizable digital platforms, allowi…
  continue reading
 
Loading …

Quick Reference Guide

Listen to this show while you explore
Play