Karamba Security transfers honeypot principle to connected car

October 03, 2018 // By Christoph Hammerschmidt
As soon as cars are going online, cybersecurity measures become mandatory. Karamba Security is now breaking new ground in securing vehicle electronics: for the first time, the Israeli experts are transferring the "honeypot" principle to the car. With their new service "ThreatHive", automobile manufacturers and Tier 1 suppliers can gain insights into real online attacks on their ECUs already during the development process.

Karamba's service places a network of virtual ECUs online that behave like a real connected car. The images of these ECU’s software are permanently monitored to detect attack patterns and vulnerabilities in the operating system, the configuration and the code of the ECU. Real-world attacks on the ECU during the development process provide the automotive developer community with meaningful insight into security holes in the firmware and all components and libraries used.

"Knowing exactly which attack vectors can be used against ECUs has always been a challenge for vehicle manufacturers and Tier 1 suppliers”, explains Patrick Daly, analyst at 451 Research. “But they need to know how hackers can infiltrate a vehicle's system before the vehicle goes into series production. Karamba Security's offering provides exactly this knowledge to secure networked and autonomous vehicles.” If OEMs and Tier 1 suppliers can stay one step ahead of hackers, they increase the safety of drivers and passengers. This also reduces the need for over-the-air updates that would be required to address security gaps once the vehicles go into production.


The honeynet approach gives costomers real-time insights
on attacks, their origins and their methods. (C) Karamba 


Vous êtes certain ?

Si vous désactivez les cookies, vous ne pouvez plus naviguer sur le site.

Vous allez être rediriger vers Google.