This curriculum spans the technical and organisational complexity of multi-workshop threat modeling, secure architecture design, and incident response planning seen in global OEM cybersecurity programs, reflecting the depth of work conducted during vehicle development sprints, supplier integration cycles, and regulatory compliance assessments.
Threat Modeling and Attack Surface Analysis in Vehicle Systems
- Conducting component-level attack surface mapping across CAN, LIN, Ethernet, and wireless interfaces to identify unintended entry points.
- Selecting between STRIDE and PASTA methodologies based on OEM development lifecycle and regulatory alignment requirements.
- Integrating threat modeling outputs into system architecture reviews with ECU suppliers to enforce design-level mitigations.
- Documenting trust boundaries between domain controllers and zonal ECUs to clarify responsibility for security controls.
- Managing scope creep in threat modeling by scoping to vehicle lifecycle phases (production, OTA, end-of-life).
- Reconciling conflicting threat model findings between Tier 1 suppliers and OEM integration teams during vehicle integration sprints.
Secure Communication Protocols and In-Vehicle Network Protection
- Implementing CAN FD with selective message authentication using MACs while managing bandwidth constraints on high-load networks.
- Configuring secure gateways to enforce payload-level filtering between IVN domains based on message criticality and source authenticity.
- Deploying TLS 1.3 on automotive Ethernet segments with hardware-accelerated cryptography to meet real-time latency requirements.
- Handling key rotation for secured CAN messages in environments where ECU flash memory endurance is limited.
- Designing fallback modes for safety-critical systems when cryptographic verification fails due to transient faults.
- Evaluating trade-offs between centralized vs. distributed firewall policies in zone-based E/E architectures.
Over-the-Air (OTA) Update Security and Integrity Management
- Implementing dual-signed update packages with OEM and supplier keys to enforce joint authorization for ECU firmware changes.
- Designing rollback protection mechanisms that prevent downgrade attacks without blocking legitimate recovery procedures.
- Allocating persistent storage for secure boot logs on ECUs with constrained non-volatile memory.
- Coordinating update sequencing across interdependent ECUs to avoid vehicle immobilization during partial updates.
- Enforcing time-bound update windows for security patches while respecting regional driving patterns and connectivity limitations.
- Integrating OTA security telemetry into SIEM systems for correlation with intrusion detection events.
Penetration Testing and Red Team Operations for Connected Vehicles
- Executing physical access testing on diagnostic ports using CAN injectors while avoiding unintended ECU resets.
- Simulating relay attacks on keyless entry systems using software-defined radio with precise timing control.
- Developing vehicle-specific fuzzing frameworks for UDS services that account for ECU response timing behaviors.
- Documenting exploit reproducibility across vehicle variants to prioritize vulnerabilities for patching.
- Coordinating red team activities with safety engineering teams to prevent triggering unintended airbag deployments.
- Reporting findings in formats compatible with ISO/SAE 21434 STRIDE-D integration workflows.
Cybersecurity Governance and Compliance Across Supply Chains
- Mapping ISO/SAE 21434 requirements to supplier contracts with measurable deliverables and audit rights.
- Establishing cybersecurity baseline requirements for Tier 2 and Tier 3 component suppliers with limited security maturity.
- Managing conflicting cybersecurity standards (e.g., UNECE R155 vs. NHTSA guidelines) in global vehicle programs.
- Conducting cybersecurity readiness assessments during supplier onboarding with technical validation artifacts.
- Resolving version control conflicts in security requirements between OEM and supplier change management systems.
- Implementing secure artifact exchange protocols for sharing threat models and penetration test results under NDAs.
Intrusion Detection and Anomaly Monitoring in Automotive Systems
- Deploying lightweight IDS agents on resource-constrained ECUs using static signature matching to reduce CPU overhead.
- Calibrating anomaly detection thresholds for CAN message frequency to minimize false positives during engine cold starts.
- Routing security alerts from vehicle IDS to backend SOC via secure telematics channels with message deduplication.
- Integrating ECU-level event logs with centralized vehicle security operations platforms using standardized schemas.
- Handling IDS sensor failures by implementing fail-open policies that maintain vehicle operability without disabling monitoring.
- Updating detection rules over-the-air while ensuring backward compatibility with legacy ECU firmware versions.
Hardware Security Modules and Root of Trust Implementation
- Selecting HSMs with sufficient cryptographic throughput to support concurrent secure boot, OTA, and secure communication.
- Integrating physical unclonable functions (PUFs) for key generation in ECUs where secure key injection is logistically challenging.
- Designing secure key provisioning processes for high-volume production lines with zero-trust principles.
- Implementing secure debug interfaces with time-limited access tokens to support field diagnostics without permanent backdoors.
- Validating HSM resistance to side-channel attacks during component qualification testing.
- Managing HSM firmware updates through isolated secure channels separate from standard ECU update mechanisms.
Incident Response and Forensic Readiness in Automotive Environments
- Defining data preservation policies for volatile ECU memory during post-incident vehicle triage.
- Establishing chain-of-custody procedures for vehicle ECUs seized during cybersecurity investigations.
- Designing forensic data collection triggers based on IDS alerts while minimizing storage impact on vehicle systems.
- Coordinating with legal teams to handle data privacy requirements when extracting telematics logs for incident analysis.
- Creating standardized playbooks for responding to ransomware attacks targeting infotainment systems.
- Conducting tabletop exercises with cross-functional teams to validate response timelines under regulatory deadlines.