As cars become smarter and more connected, the demand for top-tier automotive cyber security has never been higher. With expert insights from PlaxidityX, a leading automotive cyber security company, we’ll guide you through the challenges and solutions protecting millions of vehicles worldwide. Whether you’re an industry expert or just curious about how cars are secured in the digital age, this podcast comprehensively looks at how cyber defenses are developed, tested, and deployed. We don’t j ...
…
continue reading
Each week, Embedded Computing Design’s EVP Rich Nass speaks to an executive in the embedded industry to understand what’s happening with the latest products, standards, and trends. The frank discussions reveal the real, behind the scenes issues, so the design community knows what’s coming down the pike. Topics covered in artificial intelligence, machine learning, embedded systems, internet of things, industrial automation, automotive applications, open source and more.
…
continue reading
Watch Nationally Syndicated Car Concerns USA Radio Show Every Week-day Morning Starting at 9:00 A.M. (EST). USA TOLL-FREE: 1-855-CAR-CONCERNS (855-227-2662) @ http://bit.ly/cwAyD7 Car Concerns Is The Fastest Growing Car Talk Radio Show In The USA! Car Concerns is Nationally Syndicated Radio Talk Show That is Heard In Great USA Radio Markets Like Boston, Chicago, Las Vegas, Pittsburgh, Winter Springs, Botell, Hagatna and Other Great Cities Around The Nation. Is Car Concerns Heard In Your Town ...
…
continue reading

1
Embedded Executive: Functional Safety Is a Must Have | PX5 RTOS
12:20
12:20
Play later
Play later
Lists
Like
Liked
12:20Functional safety is no longer a “nice to have” or “should have” in many applications, having moved to “must have” in spaces like automotive, industrial automation, medical devices, and aviation. Passing the functional safety testing process can be rigorous, especially if you’re going through it for the first time. But even the best experts take at…
…
continue reading

1
Embedded Executive: Real Time Is a Misnomer | McObject
12:54
12:54
Play later
Play later
Lists
Like
Liked
12:54In programming jargon, the term “real time” is not used in its literal sense, which can be confusing. The literal definition means that when something happens in real time, it happens instantaneously. But in practice, something that occurs very quickly is mistitled as being real-time. Why does the misconception continue to occur, and what problems …
…
continue reading

1
Inside the Truck Cyber Threat – PlaxidityX Ep 21
9:45
9:45
Play later
Play later
Lists
Like
Liked
9:45With cyber attacks on trucks becoming more common and costly, fleet operators and OEMs must rethink how they protect their vehicle security and data privacy. Trucks are no longer isolated units, they're part of a larger, interconnected automotive ecosystem vulnerable to disruption. In this episode, we unpack the threats, explore real-world hacking …
…
continue reading

1
Embedded Executive: You Can Have Lots of Power or Performance, But Not Both | Micron
11:17
11:17
Play later
Play later
Lists
Like
Liked
11:17If system developers had unlimited power for their designs, they’d likely find a way to take advantage of it. And the same goes for performance. However, neither of those features is available in infinite quantities. And in just about every case, one becomes a tradeoff for the other. So, how do you manage that tradeoff, and when you do, what other …
…
continue reading

1
Embedded Executive: Minimize the Power in Your WiFi Network | Infineon
9:03
9:03
Play later
Play later
Lists
Like
Liked
9:03Low-power is the ultimate priority in some WiFi networks, especially when you’re designing a battery powered device. Cameras used in remote locations are prime targets for this discussion. In some cases, access to that camera is difficult, so the user needed want to charge or replace a battery on a regular basis. To understand what the current stat…
…
continue reading

1
Digital Car Theft: How Hackers Steal in Seconds – PlaxidityX Ep 20
9:56
9:56
Play later
Play later
Lists
Like
Liked
9:56In this episode, we explore the shift from traditional theft to a new era of digital car theft. Instead of smashing windows, today’s criminals launch automotive cyber-attacks that bypass immobilizers, unlock doors, and hijack control systems, all without leaving a trace. From CAN bus vulnerabilities to cloned key fobs, cybercriminals are finding ne…
…
continue reading

1
Embedded Executive: Chip Design Is Not Getting Easier | Siemens
18:17
18:17
Play later
Play later
Lists
Like
Liked
18:17Chip design has always been a complex process, and there is no end in sight. What has improved are the tools available to an IC designer. The chips are getting more specialized; hence, the tools must drill down further into the process than ever before. This sounds like a lot of black magic, but it becomes less cloudy when someone who understands t…
…
continue reading

1
Embedded Executive: Yes, You Can This With Bluetooth | Blecon
13:06
13:06
Play later
Play later
Lists
Like
Liked
13:06Just when you thought you’d done everything you could do with Bluetooth, along comes something new and unique. At a recent technical conference, I was witness to a very cool demo that was all based on Bluetooth. Rather than attempt to describe it myself, I asked Simon Ford, the Founder of Blecon, the company providing the demo, to explain what it i…
…
continue reading

1
Embedded Executive: Consider Security Far Earlier Than You Think | NXP
15:07
15:07
Play later
Play later
Lists
Like
Liked
15:07We often say that designing secure systems means thinking about security early on in the design process. That means really early on, well before any pen is put to paper, so to speak. To understand what that means, I spoke to Denis Noel, the Director of Strategy in the Secure Connected Edge business unit at NXP on this week’s Embedded Executives pod…
…
continue reading

1
Embedded Executive: Hacks Are Still Happening | Digi
18:30
18:30
Play later
Play later
Lists
Like
Liked
18:30Don’t stop me if you’ve heard this before, because it needs to be repeated, again, and again. The embedded industry needs to take security more seriously. Hacks are continuing to occur and will continue until there is a “security by design” mentality in place in our space. It’s hard to believe we are still having this discussion, but we are. I also…
…
continue reading

1
Dynamic SBOM for Smarter Vehicle Security – PlaxidityX Ep 19
7:34
7:34
Play later
Play later
Lists
Like
Liked
7:34In this episode, we discuss the groundbreaking concept of Dynamic SBOM and its role in modern automotive software security. Hear how real-time monitoring of third-party library usage can lead to more precise vulnerability management. We explain the process behind intercepting dynamic calls and replacing them with breakpoints for live analysis. Disc…
…
continue reading

1
Embedded Executive: Simplify Edge AI | Tria
10:05
10:05
Play later
Play later
Lists
Like
Liked
10:05Edge AI is one of the popular topics amongst the embedded community. It’s the place where decisions are made, data is analyzed, etc. It’s also a place where lots of confusion arises because of its complexity, especially from a development perspective. To get to the heart of where the challenges lie in this phase of design, I spoke with Jim Beneke, …
…
continue reading

1
Embedded Executive: Develop an ASIC For Far Less Than $100K | Efabless
12:46
12:46
Play later
Play later
Lists
Like
Liked
12:46Common knowledge says that if you want to create an ASIC, you’d better have at least $1M in your bank account. The folks at Efabless say that my common knowledge is inaccurate by a long shot. They claim to be able to get folks started for far less than $100k. I needed to understand how this is possible, so I invited Michael Wishart, the CEO and co-…
…
continue reading

1
Platform-Based Automotive Cybersecurity – PlaxidityX Ep 18
9:35
9:35
Play later
Play later
Lists
Like
Liked
9:35In the age of connected cars, software-driven systems, and global supply chains, cyber security challenges have become increasingly complex. This episode delves into the pitfalls of relying on disconnected solutions to guard modern vehicles. We’ll show how a platform-centric automotive security approach consolidates everything—from vulnerability sc…
…
continue reading

1
Embedded Executive: Simplify Designing Edge-Based AI | ClearBlade
13:55
13:55
Play later
Play later
Lists
Like
Liked
13:55From a developer’s perspective, Edge AI is anything but simple. Any tools, software, etc., that can simplify the process of integrating this technology into a system is very welcome. That’s where ClearBlade comes in, with its framework that developers “design to,” using hardware, software, and even terminology that the design community is accustome…
…
continue reading

1
Embedded Executive: Your Industrial Application Needs an Industrial MCU, Infineon
15:09
15:09
Play later
Play later
Lists
Like
Liked
15:09Industrial platforms come with a specific set of design criteria. And the term “industrial” can be quite ambiguous, running the gamut from power tools to manufacturing equipment. Obviously, there are different requirements within this range. When you’re choosing an MCU for this space, you had better understand what your specific requirements are. M…
…
continue reading

1
ISO 21434 Compliance in Automotive Cybersecurity – PlaxidityX Ep 17
17:16
17:16
Play later
Play later
Lists
Like
Liked
17:16As OEMs race to innovate with autonomous driving, V2X communication, and other cutting-edge tech, compliance with UNR 155 and ISO/SAE 21434 has never been more important. But what do these regulations really mean for your day-to-day operations? In this episode, we demystify the role of CSMS and how it supports continuous security through design, de…
…
continue reading

1
Embedded Executive: The Evolution of a Wireless Standard, LoRa Alliance
12:26
12:26
Play later
Play later
Lists
Like
Liked
12:26At the LoRa Alliance, there’s a new sheriff in town. Alper Yegin is the group’s new CEO. LoRa, which stands for long range, allows transmissions to occur at very low power, sometimes lasting many years without changing batteries. Yegin believes the LoRa spec is quite solid, but there’s always room for it to evolve. He feels that one of his primary …
…
continue reading

1
Hacking A PSP-like Car Key Registration Device – PlaxidityX Ep 16
11:25
11:25
Play later
Play later
Lists
Like
Liked
11:25Touted as an off-the-shelf solution for key fob programming, a mysterious PSP-like Car Key Registration Device promises to sidestep traditional authorization channels. In this episode, we share how the PlaxidityX team simulated various car responses to test whether the device truly mirrored official protocols. They recount the odd mix of user-frien…
…
continue reading

1
Embedded Executive: Develop Your Embedded Code on an Open Platform, Analog Devices
13:13
13:13
Play later
Play later
Lists
Like
Liked
13:13Open tools are becoming the norm in the embedded software development space. And that’s definitely the case for Analog Devices’ CodeFusion Studio tool. The IDE lets developers start with an SoC, and design their systems from there. The software development platform is based on Microsoft's Visual Studio Code (VS Code). On this week’s Embedded Execut…
…
continue reading

1
Memory Protection Unit: Is It Secure Enough? – PlaxidityX Ep 15
30:07
30:07
Play later
Play later
Lists
Like
Liked
30:07Have you ever wondered how microcontrollers in vehicles manage memory access behind the scenes? This episode sheds light on the Memory Protection Unit, an essential yet sometimes overlooked hardware layer designed to stop unauthorized reads, writes, and execution. We revisit fundamental principles—like differentiating between the Core MPU (CMPU) an…
…
continue reading

1
Embedded Executive: A Banner Year for Z-Wave, Z-Wave Alliance
11:47
11:47
Play later
Play later
Lists
Like
Liked
11:47It’s been a very successful year for the Z-Wave Alliance. If you have any doubts about that statement, check out this week’s Embedded Executives podcast, where I spoke to Avi Rosenthal, the Chairman of the Alliance. Avi rattled off a long list of achievements for the organization, including a new spec, an unplug fest, and many new products. These e…
…
continue reading

1
AI's Role in Automotive Cyber Security – PlaxidityX Ep 4
11:41
11:41
Play later
Play later
Lists
Like
Liked
11:41This episode explores AI’s transformative role in automotive cyber security. As vehicles become increasingly connected and autonomous, cyber threats have evolved, but AI provides the precision and speed needed to counter these challenges. Join us as we unpack the critical role of AI in protecting modern vehicles, from anomaly detection to sophistic…
…
continue reading

1
Vehicle (IDS) Intrusion Detection System Manager – PlaxidityX Ep 14
8:30
8:30
Play later
Play later
Lists
Like
Liked
8:30Intrusion Detection System Managers (IdsM) play a vital role in modern automotive cybersecurity, addressing the challenges posed by complex security events and regulatory requirements. IdsM solutions filter and standardize event data from AUTOSAR and Linux ECUs, reducing inefficiencies in monitoring and analysis. In this episode, we will explore ho…
…
continue reading

1
Embedded Executive: A Productivity Tool From a Name You Likely Recognize, Circuit
21:36
21:36
Play later
Play later
Lists
Like
Liked
21:36Tyson Tuttle left the helm of Silicon Labs a few years ago, took a little time to recharge the batteries, and now he’s back in the thick of things with a new company called Circuit. Given its name, you might think it’s a company designing ICs, but that’s not true. The company is building what some might call a productivity tool, but Tyson describes…
…
continue reading

1
Preventing CAN Injection Car Theft – PlaxidityX Ep 13
8:56
8:56
Play later
Play later
Lists
Like
Liked
8:56The rise of CAN injection car theft has introduced a new level of sophistication to vehicle hacking, allowing thieves to access the CAN bus. In this episode, we discuss how this technique allows hackers to tap into the CAN bus through exposed wiring, sending fake messages that bypass security measures and immobilizers. The impact of these attacks e…
…
continue reading

1
Embedded Executive: Deploying Production AI, Synaptics
13:48
13:48
Play later
Play later
Lists
Like
Liked
13:48The industry revolves around two types of AI, namely research AI versus production AI. I wasn’t sure what these terms meant and their differences, so I asked an expert to join me on this week’s Embedded Executives podcast. John Weil is the Vice president and General Manager of Synaptics’ IoT Business Unit. After setting me straight, John talks abou…
…
continue reading

1
Keyless Entry Systems Security – PlaxidityX Ep 12
12:11
12:11
Play later
Play later
Lists
Like
Liked
12:11Keyless entry systems, once considered the pinnacle of vehicle convenience, are now a major target for hackers and car thieves. In today’s episode, we’ll explore the vulnerabilities in Remote and Passive Keyless Entry (RKE/PKE) systems, focusing on how replay, relay, and roll jam attacks exploit their weaknesses. We break down these attack methods,…
…
continue reading

1
Embedded Executive: The Latest in SDVs, Sonatus
14:54
14:54
Play later
Play later
Lists
Like
Liked
14:54What is the real definition of a software-defined vehicle (SDV)? It depends, mostly on who you are asking that question of. I asked John Heinlein, the Chief Marketing Officer at Sonatus and he had a great response on this week’s Embedded Executives podcast. We discussed the differences between various tiers of vehicles, how they are upgraded, and w…
…
continue reading

1
Embedded Executive: Tools Create All Your Documentation, Driver
14:59
14:59
Play later
Play later
Lists
Like
Liked
14:59Is documentation an issue for your embedded project? Wouldn’t it be great if you didn’t have to create that documentation yourself, yet have it be as good (or better) than you could do yourself? That’s what the tool from Driver does. In full disclosure, I didn’t understand how the company’s technology worked, so I had a great discussion with Driver…
…
continue reading

1
EV Charging Security Vulnerability – PlaxidityX Ep 11
8:21
8:21
Play later
Play later
Lists
Like
Liked
8:21Automotive cybersecurity is becoming increasingly important as electric vehicles face new vulnerabilities. In this episode, we explore a major flaw discovered in the EVerest open-source charging firmware, which could allow attackers to take control of charging stations and potentially compromise vehicles themselves. This vulnerability serves as a s…
…
continue reading

1
Embedded Executive: Memory Controllers Are More Complex Than You Think, Silicon Motion
11:49
11:49
Play later
Play later
Lists
Like
Liked
11:49The amount of NAND memory that exists today is staggering. There are many different kinds of NAND, and the needed type is based on the intended application. Sometimes you need high-speed memory, sometimes very dense memory, and sometimes you need the memory to go into an environment that’s less than favorable. But the memory itself is just one piec…
…
continue reading

1
MitM Attacks on SOME/IP Protocol - PlaxidityX Ep 10
8:26
8:26
Play later
Play later
Lists
Like
Liked
8:26Automotive networks face an alarming threat: Man-in-the-Middle (MITM) attacks exploiting the SOME/IP protocol. This episode explores how attackers intercept and manipulate communications between ECUs using in-vehicle Ethernet networks, enabling them to falsify data, disrupt services, and compromise safety. We outline the attack setup, flow, and the…
…
continue reading

1
Embedded Executive: Your AI Platform Needs Wireless, Synaptics
5:05
5:05
Play later
Play later
Lists
Like
Liked
5:05With all the focus on AI and machine learning these days, we sometimes take other facets of design for granted, some of which are vital, like the wireless component. Synaptics’ Veros architecture fits the bill for state-of-the-art wireless communications with high throughput, low power consumption, and top-notch security. If you’re designing an AI-…
…
continue reading

1
Industry Leaders Reimagine Vehicle Security – PlaxidityX Ep 9
8:39
8:39
Play later
Play later
Lists
Like
Liked
8:39In this episode, we explore how industry leaders PlaxidityX, CyberArk, Device Authority, and Microsoft have joined forces to pioneer the next generation of automotive and mobility security solutions. With new regulatory mandates like UNECE WP.29 and ISO 21434 on the horizon, the automotive industry requires a holistic approach to securing vehicles …
…
continue reading

1
Embedded Executive: Developing a Strategy To Manage Edge-to-Cloud Data, aicas
11:24
11:24
Play later
Play later
Lists
Like
Liked
11:24We are being bombarded with data; it’s coming at us from so many avenues, particularly as we move into the world of AI and the analytics that it brings. The key to a proper edge-to-cloud strategy is being able to make sense of that plethora of data. That statement sounds obvious and simple, but it’s quite the opposite. If you don’t have the proper …
…
continue reading

1
Motorcycle UNR 155 Security Regulations – PlaxidityX Ep 8
8:09
8:09
Play later
Play later
Lists
Like
Liked
8:09The motorcycle industry is facing a new challenge: automotive cybersecurity. This episode explores how UNR 155, initially designed for passenger vehicles, now includes motorcycles, scooters, and high-speed e-bikes. We’ll discuss what this regulation means, why it’s happening, and how it could reshape the two-wheeler market as manufacturers scramble…
…
continue reading

1
Embedded Executive: Choosing Your Programming Language, AdaCore
11:48
11:48
Play later
Play later
Lists
Like
Liked
11:48When designing systems with high integrity, say for automotive applications, what is the programming language of choice? I believe that’s referred to as a loaded question, because there are so many variables involved, and it’s a question that’s almost impossible to answer. Unfortunately, many developers make a decision for the wrong reasons. To get…
…
continue reading

1
Eviden & PlaxidityX Partner on MDR Service – PlaxidityX Ep 7
8:39
8:39
Play later
Play later
Lists
Like
Liked
8:39Learn how PlaxidityX’s automotive expertise and Eviden’s MDR capabilities combine to create an end-to-end solution for vehicle security. This episode covers the benefits of establishing a dedicated Vehicle SOC (VSOC), an emerging necessity in the industry to monitor, detect, and respond to cyber-attacks in real time. We'll discuss the importance of…
…
continue reading

1
Embedded Executive: When, Where, and Why Use Rad-Hard Memory, Infineon
17:31
17:31
Play later
Play later
Lists
Like
Liked
17:31What is rad-hard memory, and when and where should it be used? And what makes it different from conventional memory? The answers may seem obvious, but that’s not the case. That’s exactly why I spoke to Helmut Puchner, Vice President and Fellow in the Aerospace and Defense division of Infineon Technologies in this week’s Embedded Executives podcast.…
…
continue reading

1
Smart Homes and Connected Cars – PlaxidityX Ep 6
10:07
10:07
Play later
Play later
Lists
Like
Liked
10:07The connected car and smart home ecosystems are on a collision course, bringing convenience and innovation, but also creating serious cybersecurity concerns. This episode delves into what happens when cars and homes start talking to each other, thanks to new collaborations like Samsung and Hyundai's initiative. We’ll look at the benefits, like vehi…
…
continue reading

1
Embedded Executive: The In-Cabin User Experience, indie Semiconductor
10:03
10:03
Play later
Play later
Lists
Like
Liked
10:03The automobile's in-cabin user experience (UX) is undergoing some serious changes. We’re nearing the point where the automobile can be viewed as an office or entertainment center that also transports you from point A to point B. With all those changes, it’s important to ensure that these non-mission-critical functions communicate with the mission-c…
…
continue reading

1
Automating Cyber Security Risk Assessment – PlaxidityX Ep 5
9:10
9:10
Play later
Play later
Lists
Like
Liked
9:10As vehicles become more connected, cyber security risks grow, making effective risk management a priority in the automotive sector. In this episode, we explore Threat Analysis and Risk Assessment (TARA) in automotive cyber security, and why automating this process is essential to keep pace with evolving threats and regulatory requirements. We’ll al…
…
continue reading

1
Embedded Executive: Zero-Trust Architecture, Infineon
14:12
14:12
Play later
Play later
Lists
Like
Liked
14:12The Zero Trust Architecture (ZTA) provides a new approach to cybersecurity, and outlines a great model for developers to follow. Like the name implies, you should trust no one, at least initially, and assume that all networks and traffic are potential threats. We know that no network is ever 100% secure, but beginning with this assumption gives you…
…
continue reading

1
Embedded Executive: The Future of Battery Testing, Tektronix
14:58
14:58
Play later
Play later
Lists
Like
Liked
14:58Testing high-power batteries, like those used in EVs, can be a tricky endeavor. It’s more complicated and, frankly, more dangerous than testing smaller, lower-voltage batteries. It makes sense that the testing of these packs could and should be left to recognized test experts, Tektronix in this case. In a discussion with Russ Gaubatz, a senior appl…
…
continue reading

1
ECU Cyber Security: SELinux & Host Protection – PlaxidityX Ep 3
10:48
10:48
Play later
Play later
Lists
Like
Liked
10:48As the automotive industry moves toward software-defined vehicles, ensuring the security of ECUs is paramount. ECUs handle critical vehicle functions, and with their increasing connectivity, they are more vulnerable to cyber attacks. SELinux is a trusted solution for managing access control in Linux-based systems, including ECUs, but on its own, it…
…
continue reading

1
Embedded Executive: Electrification of the Automobile, Infineon
12:27
12:27
Play later
Play later
Lists
Like
Liked
12:27We’ve talked a lot about the software-defined vehicle. This week, we are talking about the electrification of that same automobile on the Embedded Executives podcast. As you might expect, it means removing some of the car's mechanical components and replacing them with electrical components. The benefits of doing that are great, as Sayeed Ahmed, a …
…
continue reading
Automotive cyber security is becoming a critical concern as software-defined vehicles (SDVs) increasingly dominate the market. In this episode, we explore how DevSecOps ensures that cyber security is integrated at every stage of the automotive software development process. By adopting a security-by-design approach, automakers can accelerate product…
…
continue reading

1
Embedded Executive: Deploying TSN, Mitsubishi
13:05
13:05
Play later
Play later
Lists
Like
Liked
13:05TSN is a standard that originated for video-streaming applications. But today, it’s finding a home in industrial applications, and it’s is now becoming irreplaceable. Hear why in this week’s Embedded Executives podcast, where I spoke to Tom Burke, who is the Global Director of Industry Standards for Mitsubishi, as well as the Global Strategic Advis…
…
continue reading

1
Customizing Your Car with UDVs – PlaxidityX Ep 1
7:33
7:33
Play later
Play later
Lists
Like
Liked
7:33In this episode of the Plaxidity X automotive cybersecurity podcast, Cars, Hackers, & Cybersecurity, we explore the groundbreaking transition from Software Defined Vehicles (SDVs) to User Defined Vehicles (UDVs) and what it means for the automotive industry. Modern vehicles are no longer just machines—they are customizable digital platforms, allowi…
…
continue reading