Autonomous driving capabilities, expanded infotainment systems, and automated updates have created a massive expansion of the automotive digital environment — and the attack surface. Threat actors have the potential to control critical vehicle mechanisms via the hundreds of electronic control units (ECU) that control them. As connected technology is more widely deployed across all types of vehicles, the risks of remote attack will increase.
Red Balloon Security’s core technology, Symbiote, delivers protection at ECU level, and provides real-time, continuous integrity attestation of the devices it protects, ensuring that authorized software keeps running and unauthorized codes or commands do not execute. An OS-agnostic product, Symbiote works on devices from all major manufacturers and across the product spectrum.
Utilizing our automotive defense, device and vehicle manufacturers can protect any type of vehicle ECU, whether it supports passenger or commercial vehicles or industrial machinery from the full range of potential cyber attacks. As regulations evolve via the UNECE WP.29 and other wide-ranging standards, Red Balloon Security will continue to map its solutions to help our customers stay current.
Autonomous driving capabilities, expanded infotainment systems, and automated updates have created a massive expansion of the automotive digital environment — and the attack surface. Threat actors have the potential to control critical vehicle mechanisms via the hundreds of electronic control units (ECU) that control them. As connected technology is more widely deployed across all types of vehicles, the risks of remote attack will increase.
Red Balloon Security’s core technology, Symbiote, delivers protection at ECU level, and provides real-time, continuous integrity attestation of the devices it protects, ensuring that authorized software keeps running and unauthorized codes or commands do not execute. An OS-agnostic product, Symbiote works on devices from all major manufacturers and across the product spectrum.
Utilizing our automotive defense, device and vehicle manufacturers can protect any type of vehicle ECU, whether it supports passenger or commercial vehicles or industrial machinery from the full range of potential cyber attacks. As regulations evolve via the UNECE WP.29 and other wide-ranging standards, Red Balloon Security will continue to map its solutions to help our customers stay current.
Autonomous driving capabilities, expanded infotainment systems, and automated updates have created a massive expansion of the automotive digital environment — and the attack surface. Threat actors have the potential to control critical vehicle mechanisms via the hundreds of electronic control units (ECU) that control them. As connected technology is more widely deployed across all types of vehicles, the risks of remote attack will increase.
Red Balloon Security’s core technology, Symbiote, delivers protection at ECU level, and provides real-time, continuous integrity attestation of the devices it protects, ensuring that authorized software keeps running and unauthorized codes or commands do not execute. An OS-agnostic product, Symbiote works on devices from all major manufacturers and across the product spectrum.
Utilizing our automotive defense, device and vehicle manufacturers can protect any type of vehicle ECU, whether it supports passenger or commercial vehicles or industrial machinery from the full range of potential cyber attacks. As regulations evolve via the UNECE WP.29 and other wide-ranging standards, Red Balloon Security will continue to map its solutions to help our customers stay current.
Symbiote has proven capable of protecting resource-constrained vehicular ECUs. And it does it without impacting their real-time performance requirements.
Symbiote has proven capable of protecting resource-constrained vehicular ECUs. And it does it without impacting their real-time performance requirements.
Monitor code and memory usage to detect attacks, regardless of the vulnerability, for protection against zero days.
Embed security technology that supports the resiliency of your device firmware with runtime integrity protection at the host-level now and into the future.
Apply protection automatically to the final firmware without exposing intellectual property or disrupting device behavior or R&D resources. *Access to source code can accelerate the process.
Monitor code and memory usage to detect attacks, regardless of the vulnerability, for protection against zero days.
Embed security technology that supports the resiliency of your device firmware with runtime integrity protection at the host-level now and into the future.
Apply protection automatically to the final firmware without exposing intellectual property or disrupting device behavior or R&D resources. *Access to source code can accelerate the process.
Symbiote has proven capable of protecting resource-constrained vehicular ECUs. And it does it without impacting their real-time performance requirements.
Monitor code and memory usage to detect attacks, regardless of the vulnerability, for protection against zero days.
Embed security technology that supports the resiliency of your device firmware with runtime integrity protection at the host-level now and into the future.
Apply protection automatically to the final firmware without exposing intellectual property or disrupting device behavior or R&D resources. *Access to source code can accelerate the process.
Embedded device security can be added directly to embedded end devices, bringing enhanced security to non-standard or out-of-support devices.
Harden devices’ vulnerable surface.
Address existing vulnerabilities.
Anticipate and prepare for remote ECU attacks.
Embedded device security can be added to any operating system or hardware protecting the device from the boot loader to the application, including third-party libraries.
Enhance security without decreasing performance.
Open a path to detailed forensics.
Increase the time window for patches.
Automatically harden the devices.
Embedded device security can be added directly to embedded end devices, bringing enhanced security to non-standard or out-of-support devices.
Harden devices’ vulnerable surface.
Address existing vulnerabilities.
Anticipate and prepare for remote ECU attacks.
Embedded device security can be added to any operating system or hardware protecting the device from the boot loader to the application, including third-party libraries.
Enhance security without decreasing performance.
Open a path to detailed forensics.
Increase the time window for patches.
Automatically harden the devices.
Embedded device security can be added directly to embedded end devices, bringing enhanced security to non-standard or out-of-support devices.
Harden devices’ vulnerable surface.
Address existing vulnerabilities.
Anticipate and prepare for remote ECU attacks.
Embedded device security can be added to any operating system or hardware protecting the device from the boot loader to the application, including third-party libraries.
Enhance security without decreasing performance.
Open a path to detailed forensics.
Increase the time window for patches.
Automatically harden the devices.
Sal Stolfo was an original founding member of Red Balloon Security, Inc.
© 2022 Red Balloon Security.
All Rights Reserved.
Contact us now to discover more about Red Balloon Security’s range of solutions and services or to arrange a demonstration.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.
Reach out to learn more about our embedded security offering and to schedule a demo.