View, browse and sort the list of sessions by Pass Type, Track, Day/Time, or by Speaker. Sessions are subject to change. Seating is on a first-come, first-served basis. Please arrive early to ensure you get a seat.
Build your conference agenda today! By signing up for the Scheduler, you can add sessions to your "Favorites" and develop your own personalized schedule. This personalized schedule will be synced with the official Arm TechCon Event App.
This presentation proposes that the threat of automotive cyberattack requires a multi-faceted, multi-level "swiss cheese" defence, and that the compromising of various vehicles has helped to advance thinking in this area. It discusses how approaches such as the separation of the multiple domains on automotive communications infrastructure are logically complemented by the security conscious development of the applications themselves. And it describes how many of the tools and techniques established for the development of high criticality applications lend themselves admirably to the quest to provide an outstanding level of robustness and integrity to maximize the security of the connected car.
Architectural approaches such as the separation of the multiple domains on communications infrastructure key to automotive security, but need to be complemented by the security conscious development of the applications themselves.