
Smart Car Information Security (Cybersecurity and Data Security) Research Report, 2025
Description
Research on Automotive Information Security: AI Fusion Intelligent Protection and Ecological Collaboration Ensure Cybersecurity and Data Security
At present, what are the security risks faced by intelligent connected vehicles? Automotive information security covers two aspects: cybersecurity and data security. Cybersecurity measures and data security technologies are embedded in the information security framework to form multi-layer protection.
intelligent connected vehicles have become integrated mobile smart terminals. The EEAs continue to evolve, but automotive information security attacks are increasing, including autonomous driving safety attacks (sensor failure and deception, software vulnerabilities and network attacks, decision algorithm defects, data privacy and security), vehicle-road-cloud integrated network attacks (Internet of Vehicles platform attacks, roadside infrastructure tools, satellite Internet attacks), and attacks on charging networks (new energy vehicle battery system attacks, charging station network attacks). For example, Toyota's network was reportedly hacked in August 2024, and Qualcomm identified a zero-day vulnerability, CVE-2024-43047 in October 2024, affecting its chipsets. Jaguar Land Rover was hacked in March 2025, resulting in the leakage of 700 internal documents. According to the 3 million+ vehicles monitored by Vecentek VSOC, security incidents in 2024 increased by 31% year-on-year compared with 2023.
In terms of policy, OEMs and specific models for both export and domestic markets must meet established standards and specifications (the European General Data Protection Regulation (GDPR), UN ECE WP.29 R155/R156, ISO/SAE 21434 ""Road Vehicles-Cybersecurity Engineering"", GB44495-2024 ""Technical Requirements for Vehicle Information Security"", GB/T 44464-2024 ""General Requirements for Automotive Data"", etc.). Only after meeting the information security specifications can vehicles be qualified to be launched on the market.
1. The trend of flattening the supply chain requires ecological collaboration and protection, and the shortened SDV iteration cycle increases the pressure of security testing
Software-defined vehicles (SDV) separate software and hardware. OEMs are currently adopting an iterative R&D model to shorten the new function release cycle to 3-6 months, so that the pressure of automotive software security testing is prominent. Faced with the threat of cybersecurity and data security, OEMs are increasingly integrating security practices into all phases of the vehicle lifecycle development within their agile DevOps for development and operation. They are gradually embracing the integrated development of DevSecOps.
With the trend of flattening the supply chain, OEMs now have to face more suppliers, and it is difficult for them to obtain device source code, and there is a lack of efficient firmware security testing tools. In view of this, OEMs are gradually increasing vulnerability management efforts and continuously strengthening software supply chain security efforts. Effective response measures include software bill of materials (SBOM) management, software composition analysis (SCA), code review, SAST, IAST, DAST, fuzz testing and other technologies. Among them, the software bill of materials (SBOM) includes not only component names, version numbers, suppliers, etc., but also license information, copyright statements, vulnerability data and other information. As one of the important tools for open source software governance and software supply chain security management, SCA generates SBOM as one of its important core functions, providing essential basic information for security in subsequent stages.
It is also worth noting that DAST has a collaborative value with IAST and SAST. DAST (dynamic application security testing) is a black box security testing technology that simulates external attacks (such as malicious request injection) when the application is running, and detects its dynamic response to detect security vulnerabilities. Collaboration between DAST and IAST: With Interactive Application Security Testing (IAST) accurate vulnerability positioning (such as code line level) is realized, the DAST false alarm rate reduces (from 30% to <5%). DAST and SAST are combined to form a ""double inspection mechanism"" (SAST for early repair of code defects + DAST for later verification of runtime security) to offer the protection in the full life cycle.
2. The application of AI in the field of automotive information security is evolving from single-point defense to intelligence and systematization
AI is reshaping the paradigm of automotive information security, shifting from passive protection to a closed loop of ""prediction-defense-response"". The application of AI in the field of automotive information security is evolving from single-point defense to intelligence and systematization. The main trends are reflected in two aspects: technology application and industrial ecology. The technology application trends include the following:
Cloud-edge-vehicle linkage: For example, NavInfo and Alibaba Cloud jointly build an intelligent cloud base to support the closed loop of autonomous driving R&D data and security strategy collaboration.
Deep collaboration between OEMs and technology companies (such as vertical foundation models and zero-trust architecture) will become mainstream, such as FAW Toyota × Tencent Cloud and NavInfo × Alibaba Cloud for joint research and development, focusing on the construction of ""AI+security” platforms. Compliance requirements and global deployment will further drive scenario-based innovation of AI technology in line with regulations such as UN R155 and GB 44495-2024, and promote the application of AI in cross-border data and privacy protection (such as Vecentek's compliance solution for the EU).
In addition, VSOC (Vehicle Safety Operation Center) is developing towards intelligence and cloud computing to reduce the global deployment cost (Chery VSOC supports real-time translation in multiple languages).
Callisto S3-VSOC: Based on the AI-native automotive cybersecurity platform, Callisto S3 relies on the self-developed foundation model platform “Butterfly AI 2.0” (Automotive Safety Agent Cluster) to build an automotive safety agent cluster that integrates compliance, cognition and operation, enabling the process from vehicle abnormal reporting to cloud AI alarm analysis, automatically generating ""Security Incident Investigation Report"" in one sentence, and assisting compliance engineers in natural language interactive investigation, reducing the time spent on daily security operations by 65%.
Cognitive evolution (from experience to reasoning): Butterfly AI understands the semantics of CAN signals, diagnostic signals, remote control signals, etc. through foundation models, establishes attack maps and signal sequence behavior reasoning mechanisms, and truly transforms ""data from traffic to attacks"".
Ecological collaboration (from closed to linkage): TSP, remote diagnosis, OTA and intelligent driving platforms are connected to achieve natural language-driven collaboration between systems and support integrated automatic response processes.
Risk governance (from static defense to dynamic closed loop): Users can build and adjust security policies using natural language, and agents can continuously learn and evolve monitoring strategies based on feedback.
Inchtek’s inVSOC Automotive Security Operation Platform: inVSOC V3 uses a self-developed high-performance DAG execution engine to support multiple analysis operators such as sequence, parallel, extreme value, and difference, and conduct real-time processing and correlation analysis of massive vehicle logs.
Dynamic strategy adjustment: Based on AI's adaptive learning, it continuously optimizes threat detection rules to respond to novel attacks (such as 0-day vulnerability);
Generative AI-driven investigation response (GenAI) includes:
Alarm analysis assistant: Automatically associate the CVE/NVD vulnerability library, Auto-ISAC threat intelligence, generate alarm summary and disposal suggestions (for example: automatically match √CVSS score and recommend patch strategy).
Data insight assistant: Support natural language interaction (such as ""show high-frequency attack sources in the past 7 days""), automatically generate visual charts, and accelerate operational decision-making.
Knowledge base Q&A: Integrate automotive safety knowledge base to answer operational questions such as compliance processes and incident handling specifications, and reduce personnel training costs.
Baidu's Vehicle Security Operations Center (VSOC)
AI risk assessment: When the VSOC receives events reported by IDPS, it only means that an event has occurred. Whether this event really poses a security risk can be automatically assessed by a foundation model, and a recommended solution can be given.
Alarm noise reduction: Based on the AI foundation model, the alarms can be whitened, deduplicated, aggregated, and automatically ignored to reduce noise.
Operation robot - Copilot: The VSOC integrates a natural language interactive robot dubbed Copilot based on a foundation model, which can guide the VSOC to perform automated statistics, report generation, risk interpretation, work order creation, security response, etc. through natural language.
With the continuous evolution of AI technology, the application of agents in security operation has moved from concept verification to actual implementation. In the existing intelligent operation system (such as the VSOC), agents mainly assume the following roles:
Automatic handling of simple events: For standardized and common security events with clear rules, agents can complete rapid detection, correlation analysis, and disposal based on preset rules and self-learning strategies, greatly avoiding manual intervention.
Complex event decision-making assistance:For security events with complex correlations and wide-ranging impacts, agents can integrate multi-source data, draw preliminary analysis conclusions, and provide decision-making references for operators. Finally, manual confirmation and optimization are carried out to achieve efficient response under human-machine collaboration.
With the continuous advancement of the deep integration of the VSOC and agents, security operation is evolving towards ""agent centralization"". A more efficient and intelligent security operation model will consist of VSOC + agent center + a small number of elite operators.
3. The application of post-quantum cryptography technology in the automotive industry has moved from technical accumulation to industrialization
The application of post-quantum cryptography technology in the automotive industry has moved from technical accumulation to industrialization under the impetus of both quantum threats and intelligent cybersecurity demand. In the short term, chip performance and standard unification should be handled. In the long term, a full-stack protection system of ""algorithm-chip-communication-cloud platform"" will be formed. OEMs should give priority to the layout of hybrid encryption, automotive chip certification and V2X security upgrades to cope with quantum security challenges in the next 10 years. The post-quantum cryptography migration strategy of the US NIST clearly states that for important infrastructure and business systems, the existing PKI algorithms will be replaced in 2028-2030.
Traditional asymmetric encryption algorithms like RSA and ECC are indeed vulnerable to attacks from quantum computers using algorithms like Shor's. This means that, if powerful quantum computers become a reality, public key cryptography systems relying on these algorithms for vehicle-to-cloud communication, OTA updates, and identity authentication could be compromised. The life cycle of a car is as long as 10-15 years, and quantum computers may break through in the next 10 years, so post-quantum protection should be deployed in advance.
One way to establish a quantum security system is to design Post-Quantum Cryptography (PQC), such as lattice cryptography and hash cryptography, and build a new public key cryptography system on this basis. Another way is to apply Quantum Key Distribution (QKD) technology that guarantees security with physical laws.
QKD does not rely on certain mathematical problems and can achieve absolute security of information theories. Under such security, no matter how powerful the eavesdropper's computing power is (even if s/he has a quantum computer), s/he cannot crack the quantum key generated by QKD.
Case 1: In June 2025, Geely officially released the world's first quantum security technology for intelligent connected vehicles, pioneering the integration of quantum-resistant encryption, quantum secure communication and other technologies, from identity authentication to communication encryption, from command transmission to data protection, and then to behavior monitoring, to build a comprehensive security protection chain, and create a security foundation with quantum security as the core. Geely plans to connect data centers in Hangzhou, Huzhou, Deqing and other places to the national wide-area quantum security backbone network, using quantum state superposition, indivisibility, and non-cloning physical properties to produce and distribute quantum keys, and advance the security line to the initial stage of data generation, transforming the paradigm to ""Security as a Service"".
Case 2: In March 2025, UNI-SENTRY officially released the world's first ""SPHINCS+ post-quantum cryptographic accelerator hardware IP"" that supports mainstream MCUs, providing chip-level solutions for the next-generation information security through a software-hardware collaborative architecture. It enables all hardware, and uses specially optimized high-performance parallel cores and fully pipelined hash cores (SHA256) to accelerate the core components of SPHINCS+. In addition, compared with high-performance processors (Intel E3-1120 @ 2100MHz), it is more than x260 times faster than C code implementation.
On April 26, 2025, UNI-SENTRY and SemiDrive signed a strategic cooperation agreement. By integrating the hardware trust root of the dual-mode encryption engine (supporting Kyber key encapsulation and Dilithium digital signature), it will enable E3650 to better meet the millisecond-level response requirements of zonal controllers, chassis domain controllers, and intelligent driving domain controllers under the protection of post-quantum cryptographic algorithms. Based on E3650, they jointly developed a variety of flexible and configurable information security solutions that can meet the UN WP.29 R155, the national standard GB 44495-2024 and enterprise standards, and support national encryption algorithms.
In May 2025, UNI-SENTRY's solution of Sphincs+ post-quantum cryptographic algorithm was fully adapted to Renesas RH850 U2X. In June 2025, UNI-SENTRY officially released the world's first ""ultra-lightweight 3-in-1 (Kyber+Dilithium+SHA3)"" post-quantum cryptography (PQC) hardware accelerator IP. This product integrates the NIST standardized algorithm Kyber (key encapsulation) and Dilithium (digital signature) into a single IP core, providing a chip-level post-quantum attack solution for smart cars, covering core controllers for the power domain, intelligent driving domain, chassis domain, cockpit domain, and body domain.
4. Stricter policies and regulations force OEMs to make safety design in advance, shifting from ""after-the-fact remediation"" to ""full life cycle safety design""
Since the release of the ""Data Security Law"" in 2021, national ministries and commissions have issued a total of 39 policies and regulations related to data security in the automotive industry (such as ""Several Provisions on Automotive Data Security Management (Trial)"", ""Guidelines for Detecting Important Data in Connected Vehicles and Autonomous Driving"", GB/T 41871-2022 ""Information Security Technology - Security Requirements for Automotive Data Processing"", GB/T 44464-2024 ""General Requirements for Automotive Data"", GB/T ""Intelligent Connected Vehicles - Data Security Management System Specifications"" (under preparation)) and 7 standards, so that the industry's data security management system is becoming perfect.
At present, the data security challenges faced by OEMs include a wide variety of data types and diverse attacks, such as 0-day attacks, supply chain risks (OEMs share data with many partners and suppliers, so third-party risks become an important source of data leakage), and human factors (employees' weak security awareness and operational errors are also important causes of data leakage). Therefore, it is necessary to construct a data protection and governance system for the entire life cycle, and it is recommended to strengthen the construction in the following aspects (see the figure below).
For example, Agile Technology's data life cycle security protection solution with the data guard system (DGS) as the core includes data classification and grading, data encryption and decryption, data leakage prevention, outbound control, watermark traceability, log audit and other functional modules, effectively preventing data leakage and providing integrated data security protection and management for OEMs. Agile Technology's data security protection solution has currently protected the data security of industry benchmark OEMs including FAW, Changan, Dongfeng, Geely, Hozon, smart, Wuling, and Yutong.
In addition, security provider Eagle Cloud has developed its own integrated office security platform based on the SASE architecture - Eagle Cloud Hub, which integrates Zero Trust Network Access (ZTNA), Data Leakage Prevention (DLP), Extended Detection and Response (XDR), and Unified Endpoint Management (UEM), providing a comprehensive, flexible and secure SASE integrated office security solution. Its customers include Geely, SERES, Leapmotor, Avatr, WeRide and others.
Please Note: PDF E-mail from Publisher purchase option allows up to 10 users and does not allow printing or editing. This functionality will require a Global Site License.
At present, what are the security risks faced by intelligent connected vehicles? Automotive information security covers two aspects: cybersecurity and data security. Cybersecurity measures and data security technologies are embedded in the information security framework to form multi-layer protection.
intelligent connected vehicles have become integrated mobile smart terminals. The EEAs continue to evolve, but automotive information security attacks are increasing, including autonomous driving safety attacks (sensor failure and deception, software vulnerabilities and network attacks, decision algorithm defects, data privacy and security), vehicle-road-cloud integrated network attacks (Internet of Vehicles platform attacks, roadside infrastructure tools, satellite Internet attacks), and attacks on charging networks (new energy vehicle battery system attacks, charging station network attacks). For example, Toyota's network was reportedly hacked in August 2024, and Qualcomm identified a zero-day vulnerability, CVE-2024-43047 in October 2024, affecting its chipsets. Jaguar Land Rover was hacked in March 2025, resulting in the leakage of 700 internal documents. According to the 3 million+ vehicles monitored by Vecentek VSOC, security incidents in 2024 increased by 31% year-on-year compared with 2023.
In terms of policy, OEMs and specific models for both export and domestic markets must meet established standards and specifications (the European General Data Protection Regulation (GDPR), UN ECE WP.29 R155/R156, ISO/SAE 21434 ""Road Vehicles-Cybersecurity Engineering"", GB44495-2024 ""Technical Requirements for Vehicle Information Security"", GB/T 44464-2024 ""General Requirements for Automotive Data"", etc.). Only after meeting the information security specifications can vehicles be qualified to be launched on the market.
1. The trend of flattening the supply chain requires ecological collaboration and protection, and the shortened SDV iteration cycle increases the pressure of security testing
Software-defined vehicles (SDV) separate software and hardware. OEMs are currently adopting an iterative R&D model to shorten the new function release cycle to 3-6 months, so that the pressure of automotive software security testing is prominent. Faced with the threat of cybersecurity and data security, OEMs are increasingly integrating security practices into all phases of the vehicle lifecycle development within their agile DevOps for development and operation. They are gradually embracing the integrated development of DevSecOps.
With the trend of flattening the supply chain, OEMs now have to face more suppliers, and it is difficult for them to obtain device source code, and there is a lack of efficient firmware security testing tools. In view of this, OEMs are gradually increasing vulnerability management efforts and continuously strengthening software supply chain security efforts. Effective response measures include software bill of materials (SBOM) management, software composition analysis (SCA), code review, SAST, IAST, DAST, fuzz testing and other technologies. Among them, the software bill of materials (SBOM) includes not only component names, version numbers, suppliers, etc., but also license information, copyright statements, vulnerability data and other information. As one of the important tools for open source software governance and software supply chain security management, SCA generates SBOM as one of its important core functions, providing essential basic information for security in subsequent stages.
It is also worth noting that DAST has a collaborative value with IAST and SAST. DAST (dynamic application security testing) is a black box security testing technology that simulates external attacks (such as malicious request injection) when the application is running, and detects its dynamic response to detect security vulnerabilities. Collaboration between DAST and IAST: With Interactive Application Security Testing (IAST) accurate vulnerability positioning (such as code line level) is realized, the DAST false alarm rate reduces (from 30% to <5%). DAST and SAST are combined to form a ""double inspection mechanism"" (SAST for early repair of code defects + DAST for later verification of runtime security) to offer the protection in the full life cycle.
2. The application of AI in the field of automotive information security is evolving from single-point defense to intelligence and systematization
AI is reshaping the paradigm of automotive information security, shifting from passive protection to a closed loop of ""prediction-defense-response"". The application of AI in the field of automotive information security is evolving from single-point defense to intelligence and systematization. The main trends are reflected in two aspects: technology application and industrial ecology. The technology application trends include the following:
Cloud-edge-vehicle linkage: For example, NavInfo and Alibaba Cloud jointly build an intelligent cloud base to support the closed loop of autonomous driving R&D data and security strategy collaboration.
Deep collaboration between OEMs and technology companies (such as vertical foundation models and zero-trust architecture) will become mainstream, such as FAW Toyota × Tencent Cloud and NavInfo × Alibaba Cloud for joint research and development, focusing on the construction of ""AI+security” platforms. Compliance requirements and global deployment will further drive scenario-based innovation of AI technology in line with regulations such as UN R155 and GB 44495-2024, and promote the application of AI in cross-border data and privacy protection (such as Vecentek's compliance solution for the EU).
In addition, VSOC (Vehicle Safety Operation Center) is developing towards intelligence and cloud computing to reduce the global deployment cost (Chery VSOC supports real-time translation in multiple languages).
Callisto S3-VSOC: Based on the AI-native automotive cybersecurity platform, Callisto S3 relies on the self-developed foundation model platform “Butterfly AI 2.0” (Automotive Safety Agent Cluster) to build an automotive safety agent cluster that integrates compliance, cognition and operation, enabling the process from vehicle abnormal reporting to cloud AI alarm analysis, automatically generating ""Security Incident Investigation Report"" in one sentence, and assisting compliance engineers in natural language interactive investigation, reducing the time spent on daily security operations by 65%.
Cognitive evolution (from experience to reasoning): Butterfly AI understands the semantics of CAN signals, diagnostic signals, remote control signals, etc. through foundation models, establishes attack maps and signal sequence behavior reasoning mechanisms, and truly transforms ""data from traffic to attacks"".
Ecological collaboration (from closed to linkage): TSP, remote diagnosis, OTA and intelligent driving platforms are connected to achieve natural language-driven collaboration between systems and support integrated automatic response processes.
Risk governance (from static defense to dynamic closed loop): Users can build and adjust security policies using natural language, and agents can continuously learn and evolve monitoring strategies based on feedback.
Inchtek’s inVSOC Automotive Security Operation Platform: inVSOC V3 uses a self-developed high-performance DAG execution engine to support multiple analysis operators such as sequence, parallel, extreme value, and difference, and conduct real-time processing and correlation analysis of massive vehicle logs.
Dynamic strategy adjustment: Based on AI's adaptive learning, it continuously optimizes threat detection rules to respond to novel attacks (such as 0-day vulnerability);
Generative AI-driven investigation response (GenAI) includes:
Alarm analysis assistant: Automatically associate the CVE/NVD vulnerability library, Auto-ISAC threat intelligence, generate alarm summary and disposal suggestions (for example: automatically match √CVSS score and recommend patch strategy).
Data insight assistant: Support natural language interaction (such as ""show high-frequency attack sources in the past 7 days""), automatically generate visual charts, and accelerate operational decision-making.
Knowledge base Q&A: Integrate automotive safety knowledge base to answer operational questions such as compliance processes and incident handling specifications, and reduce personnel training costs.
Baidu's Vehicle Security Operations Center (VSOC)
AI risk assessment: When the VSOC receives events reported by IDPS, it only means that an event has occurred. Whether this event really poses a security risk can be automatically assessed by a foundation model, and a recommended solution can be given.
Alarm noise reduction: Based on the AI foundation model, the alarms can be whitened, deduplicated, aggregated, and automatically ignored to reduce noise.
Operation robot - Copilot: The VSOC integrates a natural language interactive robot dubbed Copilot based on a foundation model, which can guide the VSOC to perform automated statistics, report generation, risk interpretation, work order creation, security response, etc. through natural language.
With the continuous evolution of AI technology, the application of agents in security operation has moved from concept verification to actual implementation. In the existing intelligent operation system (such as the VSOC), agents mainly assume the following roles:
Automatic handling of simple events: For standardized and common security events with clear rules, agents can complete rapid detection, correlation analysis, and disposal based on preset rules and self-learning strategies, greatly avoiding manual intervention.
Complex event decision-making assistance:For security events with complex correlations and wide-ranging impacts, agents can integrate multi-source data, draw preliminary analysis conclusions, and provide decision-making references for operators. Finally, manual confirmation and optimization are carried out to achieve efficient response under human-machine collaboration.
With the continuous advancement of the deep integration of the VSOC and agents, security operation is evolving towards ""agent centralization"". A more efficient and intelligent security operation model will consist of VSOC + agent center + a small number of elite operators.
3. The application of post-quantum cryptography technology in the automotive industry has moved from technical accumulation to industrialization
The application of post-quantum cryptography technology in the automotive industry has moved from technical accumulation to industrialization under the impetus of both quantum threats and intelligent cybersecurity demand. In the short term, chip performance and standard unification should be handled. In the long term, a full-stack protection system of ""algorithm-chip-communication-cloud platform"" will be formed. OEMs should give priority to the layout of hybrid encryption, automotive chip certification and V2X security upgrades to cope with quantum security challenges in the next 10 years. The post-quantum cryptography migration strategy of the US NIST clearly states that for important infrastructure and business systems, the existing PKI algorithms will be replaced in 2028-2030.
Traditional asymmetric encryption algorithms like RSA and ECC are indeed vulnerable to attacks from quantum computers using algorithms like Shor's. This means that, if powerful quantum computers become a reality, public key cryptography systems relying on these algorithms for vehicle-to-cloud communication, OTA updates, and identity authentication could be compromised. The life cycle of a car is as long as 10-15 years, and quantum computers may break through in the next 10 years, so post-quantum protection should be deployed in advance.
One way to establish a quantum security system is to design Post-Quantum Cryptography (PQC), such as lattice cryptography and hash cryptography, and build a new public key cryptography system on this basis. Another way is to apply Quantum Key Distribution (QKD) technology that guarantees security with physical laws.
QKD does not rely on certain mathematical problems and can achieve absolute security of information theories. Under such security, no matter how powerful the eavesdropper's computing power is (even if s/he has a quantum computer), s/he cannot crack the quantum key generated by QKD.
Case 1: In June 2025, Geely officially released the world's first quantum security technology for intelligent connected vehicles, pioneering the integration of quantum-resistant encryption, quantum secure communication and other technologies, from identity authentication to communication encryption, from command transmission to data protection, and then to behavior monitoring, to build a comprehensive security protection chain, and create a security foundation with quantum security as the core. Geely plans to connect data centers in Hangzhou, Huzhou, Deqing and other places to the national wide-area quantum security backbone network, using quantum state superposition, indivisibility, and non-cloning physical properties to produce and distribute quantum keys, and advance the security line to the initial stage of data generation, transforming the paradigm to ""Security as a Service"".
Case 2: In March 2025, UNI-SENTRY officially released the world's first ""SPHINCS+ post-quantum cryptographic accelerator hardware IP"" that supports mainstream MCUs, providing chip-level solutions for the next-generation information security through a software-hardware collaborative architecture. It enables all hardware, and uses specially optimized high-performance parallel cores and fully pipelined hash cores (SHA256) to accelerate the core components of SPHINCS+. In addition, compared with high-performance processors (Intel E3-1120 @ 2100MHz), it is more than x260 times faster than C code implementation.
On April 26, 2025, UNI-SENTRY and SemiDrive signed a strategic cooperation agreement. By integrating the hardware trust root of the dual-mode encryption engine (supporting Kyber key encapsulation and Dilithium digital signature), it will enable E3650 to better meet the millisecond-level response requirements of zonal controllers, chassis domain controllers, and intelligent driving domain controllers under the protection of post-quantum cryptographic algorithms. Based on E3650, they jointly developed a variety of flexible and configurable information security solutions that can meet the UN WP.29 R155, the national standard GB 44495-2024 and enterprise standards, and support national encryption algorithms.
In May 2025, UNI-SENTRY's solution of Sphincs+ post-quantum cryptographic algorithm was fully adapted to Renesas RH850 U2X. In June 2025, UNI-SENTRY officially released the world's first ""ultra-lightweight 3-in-1 (Kyber+Dilithium+SHA3)"" post-quantum cryptography (PQC) hardware accelerator IP. This product integrates the NIST standardized algorithm Kyber (key encapsulation) and Dilithium (digital signature) into a single IP core, providing a chip-level post-quantum attack solution for smart cars, covering core controllers for the power domain, intelligent driving domain, chassis domain, cockpit domain, and body domain.
4. Stricter policies and regulations force OEMs to make safety design in advance, shifting from ""after-the-fact remediation"" to ""full life cycle safety design""
Since the release of the ""Data Security Law"" in 2021, national ministries and commissions have issued a total of 39 policies and regulations related to data security in the automotive industry (such as ""Several Provisions on Automotive Data Security Management (Trial)"", ""Guidelines for Detecting Important Data in Connected Vehicles and Autonomous Driving"", GB/T 41871-2022 ""Information Security Technology - Security Requirements for Automotive Data Processing"", GB/T 44464-2024 ""General Requirements for Automotive Data"", GB/T ""Intelligent Connected Vehicles - Data Security Management System Specifications"" (under preparation)) and 7 standards, so that the industry's data security management system is becoming perfect.
At present, the data security challenges faced by OEMs include a wide variety of data types and diverse attacks, such as 0-day attacks, supply chain risks (OEMs share data with many partners and suppliers, so third-party risks become an important source of data leakage), and human factors (employees' weak security awareness and operational errors are also important causes of data leakage). Therefore, it is necessary to construct a data protection and governance system for the entire life cycle, and it is recommended to strengthen the construction in the following aspects (see the figure below).
For example, Agile Technology's data life cycle security protection solution with the data guard system (DGS) as the core includes data classification and grading, data encryption and decryption, data leakage prevention, outbound control, watermark traceability, log audit and other functional modules, effectively preventing data leakage and providing integrated data security protection and management for OEMs. Agile Technology's data security protection solution has currently protected the data security of industry benchmark OEMs including FAW, Changan, Dongfeng, Geely, Hozon, smart, Wuling, and Yutong.
In addition, security provider Eagle Cloud has developed its own integrated office security platform based on the SASE architecture - Eagle Cloud Hub, which integrates Zero Trust Network Access (ZTNA), Data Leakage Prevention (DLP), Extended Detection and Response (XDR), and Unified Endpoint Management (UEM), providing a comprehensive, flexible and secure SASE integrated office security solution. Its customers include Geely, SERES, Leapmotor, Avatr, WeRide and others.
Please Note: PDF E-mail from Publisher purchase option allows up to 10 users and does not allow printing or editing. This functionality will require a Global Site License.
Table of Contents
441 Pages
- Definition
- 1 Automotive Information Security
- 1.1 Current Security Risks of Intelligent Connected Vehicles
- Security Issues Of Intelligent Vehicles
- Vehicle Attacks
- Classification of Internet of Vehicles Security Risks
- Summary of Major Global Intelligent Vehicle Cybersecurity Events
- Attack Classification (1)
- Attack Classification (2)
- Attack Classification (3)
- 1.2 Automotive Information Security Vulnerability Trends
- Authoritative Cybersecurity Vulnerability Platforms at Home and Abroad
- Vulnerability Rating Mechanism in the Automotive Industry
- 1.3 Supply Chain Security
- Comparison of Software Component Detection Tools
- Software Bill of Materials (SBOM) (1)
- Software Bill of Materials (SBOM) (2)
- Software Supply Chain Security
- Software Security and Compliance Scenarios in the automotive industry
- 1.4 Recommendations for Automotive Information Security Compliance System
- Role of TARA in Automotive Cybersecurity
- Specific Application Examples of TARA in Automotive Cybersecurity
- Case of Foundation Model Reconstructing TARA Platform (1)
- Case of Foundation Model Reconstructing TARA Platform (2)
- Case of Foundation Model Reconstructing TARA Platform (3)
- Security Products for WP29 R155/44495
- 1.5 Protection Technology: IDPS & VSOC
- IDS/IDPS Architecture
- Core Capability of VSOC
- VSOC: Evolution to Collaboration with Agent (1)
- VSOC: Evolution to Collaboration with Agent (2)
- VSOC: Evolution to Collaboration with Agent (3)
- IDPS & VSOC Solution Case
- 1.6 Protection Technology: Penetration Testing & Fuzz Testing
- Penetration Testing Technology
- Fuzz Testing Technology
- Fuzz Testing of Key Components (1)
- Fuzz Testing of Key Components (2)
- Fuzz Testing at the Vehicle-level/Development Stage
- 1.7 Protection Technology: SAST, IAST & DAST
- SAST Technology
- SAST Solution Providers and Cooperation with OEMs
- IAST Technology
- IAST Solution Providers and Cooperation with OEMs
- DAST Technology
- DAST Solution Providers and Cooperation with OEMs
- DevSecOps (1)
- DevSecOps (2)
- 1.8 Protection Technology: Post-quantum Cryptography
- SPHINCS+ Post-quantum Cryptographic Algorithm
- Application of PQC in the Automotive Field
- PQC Application Case in the Automotive Safety Field
- Cooperation Cases between Major PQC Suppliers and Automotive Customers
- 1.9 Policies, Regulations and Standards
- Laws, Regulations and Standards Related To Information Security (1)
- Laws, Regulations and Standards Related To Information Security (2)
- Three National Mandatory Standards
- Framework of GB 44495
- Impact of GB 44495 on OEMs
- 2 Automotive Data Security
- 2.1 Data Security Regulations and Policies
- Legal Provisions of Automotive Data Security Management System
- Standardization of Automotive Data Security Management System
- Model Data Compliance Embedded in the Development Process
- National Standards/Industry Standards Related to Classification and Grading of Intelligent Connected Vehicle Data
- 2.2 Data Security Challenges Faced by OEMs and Protection Response Suggestions
- Data Security Test Items
- Automotive Data Security Test: Personal Information Protection Test Method
- Automotive Data Security Test: Anonymization Test Method
- Autonomous Driving Data Desensitization: Key Technology for Protecting Privacy and Data Security
- Overview of OEMs and Models with Automotive Privacy Protection Logos
- 2.3 Background of Cross-border Data Regulations and Policies
- Core Methods for OEMs to Let Data Cross Borders
- Implementation Paths and Core Measures for Cross-border Data
- Typical Model Cross-border Data Cases
- Automotive Cross-border Service Providers and Cooperative OEMs
- 2.4 Data Security Case 1: Agile Technology
- Profile
- Product Series
- Automotive Data Security Solution
- Data Encryption Protection System and Cooperative OEMs
- DGS and Cooperative OEMs
- Intelligent Data Classification System Software for State Secrets and Cooperative OEMs
- DLP and Cooperative OEMs
- 2.5 Data Security Case 2: Eagle Cloud
- Profile
- XDLP
- XDLP and Cooperative OEMs (1)
- XDLP and Cooperative OEMs (2)
- 2.6 Data Security Case 3: BJCA
- Profile
- Data Security Governance Solution
- Database Encryption and Access Control System
- Cooperative OEMs in Database Encryption and Access Control System
- Internet of Vehicles-specific Key Management and Interaction System (KMIS)
- Cooperative OEMs in KMIS
- V2X Security Certificate Authentication System
- V2X Security Certificate Authentication System Customers
- Internet of Vehicles Cryptography Application Solutions
- 2.7 Data Security Case 4: SafePloy
- Profile
- Cooperation with OEMs
- Cooperative OEMs in Code/Firmware Signature
- Cooperative OEMs in Lightweight CA System
- 2.8 Data Security Case 5: Infosec Technologies
- Profile
- Product Series
- DSec Series
- DSec Series (1)
- DSec Series (2)
- Cooperative OEMs in DSec Series
- iSec Cryptographic Module and Cooperative OEMs
- 3 Information Security Practices of OEMs
- 3.1 SERES
- Automotive Information Security System Construction
- Data Security Construction Steps and Effects
- Information Security Ecological Synergy Strategy and Effects
- Technology Integration and Innovation in Data Security Construction
- Security Protection Improvement through Intelligent Operation
- Automotive Information Security Cooperation Case
- 3.2 Leapmotor
- Automotive Information Security System Construction
- Automotive Information Security System Construction Steps and Strategy
- Innovation in Automotive Information Security System Construction
- Automotive Information Security Cooperation Case
- 3.3 Xpeng
- Automotive Information Security System Construction
- Automotive Information Security Cooperation Case
- Innovation in Automotive Information Security System Construction
- 3.4 NIO
- Automotive Information Security System Construction
- Automotive Safety R&D and Investment
- Automotive Information Security Cooperation Case
- 3.5 Li Auto
- Automotive Information Security System Construction
- Innovation in Automotive Information Security System Construction
- Automotive Information Security Cooperation Case
- Balancing Automotive Information Security Cooperation and Commercial Confidentiality in Practice
- 3.6 Xiaomi
- Automotive Information Security System Construction
- Implementation of Automotive Full-link Encryption System
- 3.7 BYD
- Automotive Information Security System Construction
- Automotive Information Security Cooperation Case
- Classification of Automotive Information Security Cooperation Systems
- 3.8 Geely
- Automotive Information Security System Construction
- Automotive Information Security System Construction Steps and Strategy
- Automotive Information Security Cooperation Case
- Intelligent Connected Vehicle Quantum Security Technology
- Zeekr’s Automotive Privacy Protection
- 3.9 Dongfeng Motor
- Automotive Information Security System Construction
- Automotive Information Security Cooperation Case
- Internet of Vehicles Security Strategy
- Cybersecurity and Data Security Management System Panorama
- Data Security Compliance Management Framework
- Vehicle-cloud Integrated Situational Perception Platform
- Closed-loop Procedure and Data Operation Mode
- 3.10 BAIC
- Automotive Information Security System Construction
- Application of Cloud-Application-Smart Terminal Protection System
- R&D-Production-After-sales Safety Protection System Implementation Steps and Strategy
- Automotive Information Security Cooperation Case
- 3.11 FAW
- Automotive Information Security System Construction
- Self-developed Results of Automotive Information Security Technology
- Automotive Information Security Cooperation Case
- 3.12 SAIC
- Automotive Information Security System Construction
- Automotive Information Security Cooperation Case
- 3.13 GAC
- Automotive Information Security System Construction
- Automotive Information Security System Construction Steps and Strategy
- Automotive Information Security Cooperation Case
- 3.14 JAC Group
- Automotive Information Security System Construction
- Automotive Information Security System Construction Cooperation Case
- 3.15 Chery
- Automotive Information Security System Construction
- Automotive Information Security System Construction Cooperation Case
- Highlights of Automotive Information Security System Construction
- 3.16 Changan
- Automotive Information Security System Construction
- Automotive Information Security System Construction Cooperation Case
- 3.17 Great Wall Motor
- Automotive Information Security System Construction
- Automotive Information Security System Construction Cooperation Case
- Automotive Information Security System Construction Steps and Strategy
- Automotive Information Security Technology Innovation System
- 4 Typical Automotive Information Security Hardware Companies
- 4.1 UNI-SENTRY
- Profile
- 3-in-1 Cryptographic Accelerator Hardware IP
- Ultra-lightweight 3-in-1 Accelerator Hardware IP
- MACSec IP for “Switch Chips”
- SecIC-HSM and Case 1
- SecIC-HSM and Case 2
- SPHINCS+ Post-quantum Cryptography Accelerator Hardware IP
- Sphincs+ Post-quantum Cryptographic Algorithm Adaptation Case
- Dynamics
- Cooperation
- 4.2 Thinktech
- Profile
- Dynamics
- Mizar Series Automotive-grade Security Chips
- Cooperation Projects in Mizar Series Automotive-grade Security Chips
- Alioth Series High Functional Safety MCUs (1)
- Alioth Series High Functional Safety MCUs (2)
- Alioth TTA8 Application Panorama
- Cooperation Projects in Alioth Series
- 4.3 NationalChip
- Profile
- Dynamics
- CPU Technology Roadmap
- Automotive Electronic Digital Chip Technology Roadmap
- Mixed-signal Automotive Electronic Chip Technology Roadmap
- Automotive Information Security Chip Technology Roadmap
- Automotive-grade Information Security Chip: Vehicle & Cloud and Roadside
- Edge Security Chip Technology Roadmap
- Cooperative OEMs in Automotive-grade Information Security Chip (1)
- Cooperative OEMs in Automotive-grade Information Security Chip (2)
- Cooperative OEMs in Automotive-grade Information Security Chip (3)
- Cooperative OEMs in Automotive-grade Information Security Chip (4)
- Cooperative OEMs in Automotive-grade Information Security Chip (5)
- Automotive-grade Information Security Chip Shipments
- Automotive-grade Information Security Chip Shipments and Application
- 4.4 Shanghai Hangxin
- Profile
- Post-quantum Cryptographic Encryption Signature Solution
- ACM32 Series
- Cooperative OEMs in ACM32 Series
- Automotive Safety Solutions
- ACL16 Automotive-grade Security Chip
- Cooperative OEMs in ACL16
- ACL16_S Automotive-grade Security Chip
- Cooperative OEMs in ACL16_S
- V2X Security Authentication Solution
- V2X Security Authentication Solution and Customers
- T-BOX Solution
- 4.5 HSEC
- Profile
- Security Chip Series
- Automotive Terminal Security Chip
- Cooperative OEMs in Automotive Terminal Security Chip (1)
- Cooperative OEMs in Automotive Terminal Security Chip (2)
- 4.6 Fudan Microelectronics
- Profile and Automotive-grade Chip Product Line
- Automotive Security Chip
- Cooperative OEMs in Automotive Security Chip
- 4.7 Nations Technologies
- Automotive-grade Security Chip
- Cooperative OEMs in Automotive-grade Security Chip
- 4.8 HED
- Internet of Vehicles SE Products (1)
- Internet of Vehicles SE Products (2)
- Internet of Vehicles SE Products (3)
- Automotive Safety SE Chip Customers
- 4.9 W.UNITED
- Automotive-grade Chip Series
- Automotive-grade Chip Customers (1)
- Automotive-grade Chip Customers (2)
- Automotive-grade Chip Customers (3)
- 4.10 Tongxin Microelectronics
- Automotive Security Chip
- Automotive Security Chip Customers
- 5 Major Automotive Information Security Software Providers
- 5.1 Software Security Technology
- Profile
- SoftSec SCA (1)
- SoftSec SCA (2)
- SoftSec SCA (3)
- SoftSec SCA Customers
- SoftSec FUZZ
- SoftSec FUZZ Customers
- SoftSec MCP
- StatiCode SAST (1)
- StatiCode SAST (2)
- StatiCode SAST (3)
- StatiCode SAST (4)
- StatiCode SAST Customers
- 5.2 Anban Tech
- Profile
- Dynamics
- ICV Information Security Testing Integrated Solution
- ICV Information Security Solution
- Yizhen Protocol Fuzz Testing System and Customers
- Yishi Firmware Supply Chain Security Management System and Customers
- Yice Unit Intelligent Fuzz Testing System and Customers
- Foundation Model Firewall System
- Foundation Model Security Assessment System
- Yizhi Foundation Model Security Assessment System
- 5.3 SourceGuard
- Profile
- Wisdom Fuzz Testing Platform
- Cooperative OEMs in Wisdom Fuzz Testing Platform
- Swift Fuzzer
- Advantages of Swift Fuzzer and Cooperative OEMs
- Cybellum
- Cooperative OEMs in Cybellum
- Swift-Code
- Swift-AI
- Cooperative OEMs in Swift-AI
- 5.4 Seczone
- Profile
- Internet of Vehicles Software Security Solution
- Software Supply Chain Security Architecture
- Fuzz Testing Platform (SFuzz)
- Internet of Vehicles Security Detection Solution based on SFuzz
- Cooperative OEMs in Sfuzz
- CodeSec 4.0
- CodeSec and Cooperative OEMs
- Gray Box Security Testing Platform: VulHunter
- Cooperative OEMs in VulHunter
- Component Security and Compliance Management Platform: SourceCheck
- Cooperative OEMs in SourceCheck
- SBOM Management Platform
- DevSecOps Platform
- 5.5 SECTREND
- Profile
- CleanSource SCA
- CleanSource SCA and Cooperative OEMs
- CleanCode SAST
- Internet of Vehicles Security Service
- 5.6 Feysh Technology
- Profile
- Corax Code Security Analysis Platform
- Stork Software Component Analysis Platform
- 5.7 TICPSH
- Profile
- SmartRocket TestSec (1)
- SmartRocket TestSec (2)
- SmartRocket TestSec (3)
- SmartRocket PeneX
- SmartRocket Scanner
- SmartRocket BinAnalyzer
- IDPS&VSOC Integrated Platform (1)
- IDPS&VSOC Integrated Platform (2)
- 5.8 Chiwu Technology
- Profile
- Intelligent Connected Vehicle Security Solution
- Penetration Testing Service
- Software Composition Analysis (SCA) Platform
- Unified Terminal Security Management Platform (UTSMP)
- Terminal Application Hardening Platform
- Terminal Firmware Security Analysis Platform
- 5.9 Xmirror
- Products and Services
- Automotive Solution Application (1)
- Automotive Solution Application (2)
- Cooperative OEMs
- 6 Typical Internet of Vehicles Information Security Solution Providers
- 6.1 Vecentek
- Profile
- Customers
- Product system
- Security Testing Service and Testing Toolset
- Automotive Cybersecurity Testing System
- deCORE DS and Cooperative OEMs
- Next-generation deCORE EEAS
- deCORE SecOC & deCORE vETH
- deCORE Ccloud
- deCore Fuzz Tool
- Cooperative OEMs in deCore Fuzz Tool
- deCORE CR and Cooperative Companies
- deCORE IDPS
- deCORE VSOC
- Advantages of IDPS & VSOC
- Cooperative OEMs in IDPS & VSOC
- 6.2 Callisto Technology
- Butterfly AI 2.0 (1)
- Butterfly AI 2.0 (2)
- Butterfly AI 2.0 (3)
- Butterfly AI 2.0 (4)
- Cooperative OEMs in Butterfly AI 2.0
- Cooperation with Tier 1 Suppliers
- S3-VSOC
- Cooperative OEMs in S3-VSOC
- Automotive Data Security Solution
- Data Compliance Agent
- Vehicle-Road-Cloud Security Solution
- Domain Control Information Security Solution
- 6.3 GoGoByte
- Profile
- Automotive Information Security Product - DefenseWeaver and Advantages
- Cooperative OEMs in DefenseWeaver
- Automotive Information Security Product - ThreatTrace
- Cooperative OEMs
- 6.4 Inchtek
- Profile and Customers
- Smart Car Connectivity and Information Security Solution
- Autonomous Vehicle Information Security Solution
- IDPS 3.0
- IDPS
- inHSM: HSM Information Security Firmware for Security Chips
- Chips Compatible with inHSM
- inTARA: Threat Analysis and Assessment Tool
- inTARA-NEO
- inDARA: Data Security and Privacy Impact Assessment System, Development and Verification Tool
- inVSOC: Automotive Cybersecurity Operation Platform
- inCSMS: Information Security Management Platform
- inSSM: Software Security Module
- SecOC: Secure Communication Module
- Central Network Controller Series
- Central Network Controller Application Case
- 6.5 SECDEER
- Profile
- Vehicle Vulnerability Detection Platform
- Cooperative OEMs in Vehicle Vulnerability Detection Platform
- Comprehensive Test Range for Internet of Vehicles Security
- Cooperative OEMs in Comprehensive Test Range for Internet of Vehicles Security
- 6.6 Topsec
- Automotive Firewall
- Automotive IDPS
- Internet of Vehicles Security Detection Platform
- Internet of Vehicles Security Solution
- Internet of Vehicles Data Security Solution
- 6.7 SEC-ICV
- Profile
- Security Operation Management System
- Vehicle Manufacturing Enterprise - Security Operation Solution
- One-Stop Automotive Password Application Solution
- Password Protection Matrix: Full Life Cycle + Full Domain Coverage
- Unified Identity Management System
- Vulnerability and Risk Management System
- Intelligent Terminal Information Security Protection Software
- Terminal Security Protection SDK
- Terminal Security Monitoring and Response System
- Full Life Cycle Data Security Governance System
- Intelligent Connected Vehicle Security Operation Center Solution
- Intelligent Connected Vehicle EEA Security Solution
- “Vehicle-Road-Cloud Integration” Security System Solution
- Vehicle-Road-Cloud Integration - Agent Solution
- 6.8 Yaxon Zhilian
- Profile
- Vehicle-Cloud Collaborative Information Security Solution and Cooperative OEMs
- Central Security Domain Gateway and Cooperative OEMs
- Ethernet Security Gateway and Cooperative OEMs
- 6.9 Qingtianxinan
- Profile
- IDPS
- Cooperative OEMs in IDPS
- VSOC
- Cooperative OEMs in VSOC
- 7 Trends and Summary
- Summary of Automotive Information Security Chips
- Summary of Fuzz Testing Solutions
- Summary of SCA Tools/Platforms
- Summary of Source Code Security Tools/Platforms
- Summary of IDPS & VSOC Solutions
- Summary of Secure Communication Solutions/Platforms and Cooperative OEMs
- Summary of Internet of Vehicles Security Solutions and Cooperative OEMs
- Summary of Automotive Cybersecurity Solutions and Cooperative OEMs
- Summary of Automotive Data Security Solutions and Cooperative OEMs
- Trend 1:
- The application of Post-quantum cryptography technology in the automotive industry has moved from technical accumulation to industrialization
- Summary of Post-quantum Cryptography Products and Cooperative OEMs
- Trend 3:
- Application of AI in Automotive Information Security/Cooperation Cases
- Trend 4:
- Foundation Model Automotive Information Security Application/OEMs
- Application of Agents in Automotive Information Security/Cooperation Cases
Pricing
Currency Rates
Questions or Comments?
Our team has the ability to search within reports to verify it suits your needs. We can also help maximize your budget by finding sections of reports you can purchase.