Scheme Introduction
The intelligent connected vehicle information security vulnerability verification platform is used to restore the real vulnerabilities existing in the intelligent vehicle system. By simulating the threat scenario of automotive information security, it realizes the combination of target drones and vulnerabilities to build an attack link platform.
Assist car companies in enhancing their information security capabilities
By using vulnerability exploitation scripts to display the ways in which vulnerabilities are exploited, it has visualization capabilities and can vividly simulate the scenario of vehicles being invaded by networks. It serves as a great help for vehicle enterprises to discover information security vulnerabilities in a timely manner during development and testing, and assists in the construction of their information security capability system.
Developing information security requirements for the automotive industry in a positive direction
Build an infosec vulnerability verification platform based on ISO/SAE 21434. It features modules for asset management, target drones (physical/virtual), vulnerability management, CTF exercises, and system management. It provides services such as automotive cybersecurity assessment, vulnerability monitoring, and emergency response for vehicle manufacturers, and supports cybersecurity drills and attack-defense exercises.
Reproduction and verification of vehicle and component vulnerabilities
Building a arsenal includes vulnerability exploitation scripts (POCs) and testing environments for implementing attacks. By accessing the interface to test the components in the target library, the corresponding POC can be selected based on the object, type, and version, and called and run automatically or semi automatically to achieve the effect of vulnerability reproduction and demonstration.