Automotive Security

Build security into cars and trucks, leveraging the world’s most comprehensive portfolio of vehicle cyber security technologies.

Making Vehicles “Secure by Design”

Automotive security threats have gone from theory to reality. Tech-savvy thieves have stolen cars throughout Europe and North America. Mainstream videos show hackers remotely hijacking cars and potentially endangering occupants. Comprehensive protection requires hardening critical modules and authentication in addition to deploying “Over The Air” (OTA) updates and security monitoring mechanisms. We’re here to make that easier than it sounds.

Making Vehicles “Secure by Design”
Blueprint for Security “Built-In”

Blueprint for Security “Built-In”

Protecting cars against threats has to be done in a context that works both within the car and at scale for carmakers. The responsibility doesn’t stop at the assembly line; it extends all the way from car makers to the full breadth, depth, and complexity of auto supplier relationships. Security is a concern at each tier of the supply chain, and attackers seek the weakest links.

  • Authenticate all communications
  • Protect sensors, actuators, and microcontrollers (ECU & BCM)
  • Safely & effectively manage entire vehicle “OTA”
  • Design monitoring that can mitigate the most advanced threats

Secure Boot Code Signing for All Chips

Never run unsigned code

Ensure the code running on every car’s chip is authorized to run and protected by a strong Root of Trust. Code Signing Certificates can be used with most chipsets, including Secure Boot on some chipsets. Many chipsets have proprietary code signing tool chains that require cryptographic algorithms supported by Symantec Code Signing Certificates. Symantec Code Signing Certificates can also be used for application level code signing and verification through popular open-source cryptographic libraries such as OpenSSL and Micro-ECC.

  • ECC is 10x better than RSA in extremely resource constrained chips
  • Hardware acceleration enables sub-second secure boot
  • Can sign both boot/firmware images and application layer code
Secure Boot Code Signing for All Chips
 IoT Device Certificates for Authentication

IoT Device Certificates for Authentication

Simplify key management for authentication & encryption

Leverage authentication to prevent unauthorized remote access, while also safely and effectively restricting access. Never trust unauthenticated connections or unauthenticated data. Leverage proven techniques to manage billions of keys. Leverage Security Hardware Extensions (SHE) via proven key exchange techniques, adding fine grain cryptographic authorization to CAN without sacrificing speed or standards.

Manage Code Signing for Entire Supply Chains

Control all code in cars you make

Secure Application Service helps manage signing permissions for entire ecosystems of software authors/developers and publishers/approvers, including both internal and external partner/supplier teams. Ensure that all code running on your cars is authorized to run. Ensure that all code updated “Over The Air” (OTA) is properly signed. Ensure that you have the ability to revoke signing capabilities even as employees and partners come and go. Symantec Secure Application Service currently supports signing of code in Java and standard Executable and Linkable File (ELF) formats common on real-time operating systems (RTOS). We will continue expanding this list per customer request.

Manage Code Signing for Entire Supply Chains
Security for Manufacturing Equipment

Security for Manufacturing Equipment

As Industry 4.0 and the Industrial Internet drive manufacturing to increasingly connected factories, threats targeting these systems are on the rise. Symantec helps you protect your Industrial Control Systems (ICS) with solutions that include Programmable Logic Controllers (PLC), automation equipment, and factory robotics.

We have updated our Privacy Policy which can be found here.