Read More TThreat modelling Mileage tampering: odometer fraudsters remain a concern for the automotive industrybyJames Tyrrell23 February, 2021 The temptation for bad actors to manipulate mileage data hasn’t gone away despite vehicle passports and information sharing…
Read More TThreat modelling Card play: the intriguing world of threat modelling gamesbyJames Tyrrell19 January, 2021 Elevation of Privilege is a card game that turns threat hunting into an engaging competition complete with actionable…
Read More AAutomotive networks What makes CAN-Bus so popular?byJames Tyrrell1 September, 2020 James Tyrrell, a Threat Modelling Analyst at Secure-CAV consortium member Copper Horse, takes a closer look at controller…
Read More AAutomotive networks I spy CAN: a long list of controller area network applicationsbyJames Tyrrell25 August, 2020 Controller area networks can be found in a variety of systems and devices from cars to coffee machines,…
Read More TThreat modelling Trends in ECU vulnerabilities highlighted at DEF CON 2020byJames Tyrrell20 August, 2020 James Tyrrell, a Threat Modelling Analyst at Secure-CAV consortium member Copper Horse, takes a virtual seat at this…
Read More TThreat modelling Automotive threat modelling: off-the-shelf solutionsbyJames Tyrrell9 July, 2020 In this article, James Tyrrell looks at the rise of ready-made tools, highlighting the growth in threat modelling…
Read More TThreat modelling Threat modelling connected and autonomous vehicle cybersecurity: an overview of available toolsbyJames Tyrrell9 July, 2020 Automotive industry standards recommend threat modelling as a key element in strengthening the cybersecurity of road vehicles. Modern…
Read More AAutomotive networks Computers on wheels and networks in the fast lanebyJames Tyrrell9 July, 2020 CAN bus, LIN, MOST, FlexRay and automotive Ethernet – what are the sweet spots for in-vehicle communications and…
Read More TThreat modelling Understanding car networks and evaluating automotive threatsbyJames Tyrrell1 May, 2020 Modern vehicles are 'computers on wheels'. James Tyrrell, of Copper Horse, looks at some techniques used for evaluating automotive cybersecurity threats