Column Control DTX
Column Control DTX

How to Validate Automotive Cybersecurity

Wireless Test Platform
+ Wireless Test Platform

Protecting vehicle components and subsystems with cyberattack emulation

Validating automotive cybersecurity requires connectivity gateways, a test management server, a reconnaissance and fuzzing server, and a library of known vulnerabilities and threats. Automakers must perform controlled cyberattacks, functional cybersecurity tests, protocol fuzzing, and vulnerability scans to exhaustively validate their implementations meet their cybersecurity goals. Testing must cover multiple attack vectors and account for the various automotive communication interfaces including cellular, Wi-Fi, Bluetooth®, CAN bus, and automotive Ethernet.

To manage cybersecurity risks in vehicle components and subsystems, OEMs must evaluate component and subsystem vulnerabilities against known vulnerabilities and emerging cyber threats. If vulnerabilities are found and remediated, re-verification tests are required to ensure remediations didn't inadvertently introduce new vulnerabilities. A test execution environment helps automate verification testing, improve test coverage, and demonstrate compliance within a cybersecurity management system (CSMS) — as outlined by the ISO / SAE 21434 standard and mandated by regulations such as UN R155.

Column Control DTX
SA8710A Automotive Cybersecurity Test Soluton

Automotive cybersecurity test solution

Validating the cybersecurity resilience of vehicle components and subsystems requires cyberattack emulation. The Keysight automotive cybersecurity test solution performs controlled cyberattacks, vulnerability scans, and protocol fuzzing on vehicular subsystems and components. It tests across multiple physical interfaces — including Bluetooth®, CAN bus, automotive Ethernet, cellular, and Wi-Fi — and automates test planning, execution, and reporting.
Column Control DTX

See demo of how to emulate a vehicle cyberattack

Column Control DTX

Explore products in our automotive cybersecurity validation solution

Column Control DTX
Column Control DTX

Related use cases

Column Control DTX
contact us logo

Get in touch with one of our experts

Need help finding the right solution for you?