Advanced science.  Applied technology.

Search

Automotive Cyber Security

Southwest Research Institute helps the automotive industry develop the latest cybersecurity solutions for passenger vehicles. We work with clients to help improve the automotive cybersecurity of their systems.

Standards Compliance Consulting & Testing

As an independent, not-for-profit company, SwRI can provide guidance to align with key automotive standards. Services include:

  • Standards Application
  • Standards Compliance Assessment
  • Threat Analysis and Risk Assessment (TARA)
    • ISO/SAE 21434
    • ISO 26262
    • ISO 15118
    • UNECE WP.29 R155
    • NIST SP 800-30
    • SAE J1772

Vehicle Security

Blue electric car being charged, next to table with laptop. SwRI performs cybersecurity analysis of direct-current, fast-charging for electric vehicles.

SwRI performs cybersecurity analysis of direct-current, fast-charging for electric vehicles. Engineers set up tools to monitor and inject commands over communications compatible with ISO 15118.

SwRI guides clients to taking a risk-based approach to vehicle security. With focus on emerging and leading-edge technologies, SwRI’s expertise includes:

ECU Penetration Testing

Wires attached to a gray pick up truck with the hood popped up. Wires connect to computer lap station. Engineers identify vulnerabilities on vehicles and in electronics modules.

Engineers identify vulnerabilities on vehicles and in electronics modules. SwRI provides detailed, step-by-step, test procedures and offers hands-on training for clients.

Current vehicle models may contain from tens to hundreds of embedded computing units. SwRI provides penetration of individual ECUs, suites of ECUs, and/or the interconnecting network appliances.

  • Threat Analysis and Risk Assessment (TARA) Reverse Engineering
  • Secure Sensor Security
  • Actuator Security
  • Intra-vehicle network security

Independent Evaluation of Security Services

Not all security solutions are equal. As an independent, not for profit SwRI can evaluate effectiveness of security solutions on your networks and provide an apples-to-apples comparison of results for commercial solutions.