Upstream’s Centralized Connected Car Cybersecurity Platform

DAN SAHAR

VP of Products

[Transcript]

When we looked at the problem of how to secure a connected car, we had three goals in mind in building our solution. The first goal was that the solution had to be able to protect against remote attacks that are generated over the internet. The second goal was that we wanted to protect both the single vehicle as well as the entire vehicle fleet, expanding across multiple make models at the same time. And the third and final goal was that we wanted to be able to protect vehicles that are on the road today, not vehicles that are gonna leave the factory in two to five years’ time. So how do we go about solving this problem?

What we realized was that the only way to address all three of these requirements is by using the cloud. In the cloud, what we’re doing is we’re leveraging data that is already being collected by the OEMs and connected vehicles. The cloud also allows us to rapidly upgrade our software and make sure that we’re always two steps ahead of the hackers without having to rely on the upgrade cycles of the existing vehicles. Once installed, our platform collects data from all three of these sources. We start with data coming off of the TCU from the connected vehicles. We add typically the telematics server that’s hosted in the automotive cloud. And finally, we introduce the data coming off of the mobile application server.

This is the point where the Upstream cloud platform actually goes to work. What we do with all this data is we analyze it using advanced machine learning and big data analytics capabilities, and we model the entire connected car service. The platform understands what’s the normal behavior of both the application servers, mobile, telematics, any additional service, as well as the behavior of any given car within the connected car service. Once we understand what the normal behavior is, we’re now able to detect any violations, anything that’s outside of the norm. We define what normal is starting from the protocols that the automotive cloud uses, all the way up to the behavior of the app servers and the vehicles themselves.

Once we define what the norm is, we’re able to detect what is outside of the norm and use that information to create incidents. The incidents are then being consumed by the security operations center and the various security analysts that operate that. At the end of the day, our product is being used by the SOC team, the various security analysts. It gives them a new visibility that they never had before and the ability to detect incidents in real time and perform triage and root cause analysis, and actually get to the bottom of things that are happening in the connected car service.

Newsletter Icon

Subscribe
to our newsletter

Stay up-to-date on the latest trends, emerging risks, and updates

Sécuriser et renforcer l’avenir de la mobilité et de l’IoT

Upstream libère le potentiel des véhicules connectés, de l’IoT et des données de la mobilité intelligente. 
 Sa plateforme de gestion des données est spécialement…

More Details

Études de cas : Comment l’IA permet de détecter plus tôt les problèmes de qualité véhicule

La détection proactive de la qualité (PQD) d’Upstream en action, accélérant l’analyse des causes premières (RCA), l’évaluation de la gravité et la priorisation des problèmes…

More Details

Beyond the Cyber Resilience Act: Building
Cyber Resilience for the EV Charging Ecosystem

The CRA places broad obligations on manufacturers, including those who design, develop, or brand charge points, backend systems, and embedded communication software used throughout the…

More Details

Beyond the Cyber Resilience Act: Building Holistic Cyber Resilience

A decade ago, the value of connected vehicle data was associated with new revenue streams for OEMs. Fast forward to today, a more effective and…

More Details

Tech Talk: Securing the Commercial Fleet Ecosystem with IVECO’s CISO

The commercial vehicle industry is undergoing a seismic shift. The convergence of connectivity, electrification, and software-defined vehicles is unlocking unprecedented efficiency but also exposing f

More Details

Unmasking the Blind Spot: Why API Security Is the Weak Link in Automotive Cybersecurity

In this session, recorded during the Auto ISAC Partners Week, Upstream's Dr. Matthias Lenk and Fabian Stahl explain why API security remains a critical yet…

More Details
Skip to content