Hello,Welcome toChina Automotive Cyber Security Summit 2018!



(The 23rd, Feb. 2017)

08:15 Registration & Coffeebreak

09:00 Chairman Opening Speech

09:10 Development and Improvement of Connected Car

          Relevant Laws and Regulations

  •    Connected car as the future standard configuraton in the automotive industry,

  •     understand its regulations, laws, Supervision, standard etc. draft in the before

  •     market and after market

  •     How the Government will revise the existing regulations of connected vehicles against     its technology features and potential security risks

  •     Introduce connected car into current cyber security management system to ensure         effective controlling of its relevant technology, products, and services

  •     Developing connected car security standard system 

09:40 Real Life Telematics Attacks and Vulnerabilities

  •    Understand the details of recent real-life Telematics /OBD2 dongle attacks and

  •    vulnerabilities

  •    Discuss the Ecosystem impacts of these serious vehicle vulnerabilities and possible              mitigation strategies

  •    With the OBDII port providing access to important vehicle data, learn what efforts              companies are making to ensure that data being taken out the vehicle is being          


  •    Bolt-on devices can modify software, affecting  in-vehicle cybersecurity systems. How      can defenses be developed to adapt to new devices being  introduced to the car?

10:10 Integration of Security and Functional Safety

     •   Cybersecurity breaches undermine the overall safety 

           of a product, but methods for preparing for them lie 

           outside engineering traditions. How do we harmonize 

           these different approaches?

       •  Explore the role cybersecurity should play in functional 

           safety and how to incorporate the security approach 

           methods alongside those from the ISO 26262 to avoid 

           fatal errors

        • Practicing failure: Participate in a live exercise of a 

           fictitious scenario where cybersecurity impacts vehicle 

           safety. First in the absence, then presence, of ready 

           postures toward failure

 10:40 Social Networking & Coffee Break

11:10 Developing a Culture of Security. How Can 

           Automotive Companies Transform Themselves into

           Secure Enterprises and What Can They Learn

           From Other Industries?

11:40 Discussion of some basic questions upon 

          Automotive cyber security: Who will guard products

          safety and privacy safety? How to provide better

          safety models? What are the basic safety 

          requirement of connected cars? What are the 

          business development opportunities that will be

          brought by connected cars? 

12:00 Social Networking & Luncheon

13:30 Panel Discussion:  Low-Level Security Issues in Heavy 

          Duty Vehicles-Safety - strengths or Mishap 

          for connected vehicles? As to the locus of responsi-

          bility for monitoring the vehicle for security. Does it 

          belong with the manufacturer, owner, government 

          agency, or an aftermarket security company?

14:00  Get An Pratical Data 

         • to get the big picture of the kind of vulnerabilities 

            seen, which systems and attack vectors seem to 

            be the most affected, and how significant the 

            vulnerabilities really are

        • This data will be useful when considering cybers

            security strategy and planning, giving a valuable 

            insight into common struggles, failures, and 

            solutions that the industry faces

14: 30 Reevaluate Vehicle Electronics and Software 

           Architectures and Make sure that Systems are 

           being Developed to be Resilient to Attacks

        • Applying critical thinking to maximize safety and 

           security through your network architecture

        • The metrics used for maximizing safety and security

        • Best practices for designing a vehicle architecture 

        • Consider security in future electrical architectures

15:30 Learn How to Mitigate the Concerns of Protecting 

          the Data Exchange with a Layered Security Approach, 

          eg. Operating System, Network Firewall, Web 

          Runtime, API & Application Layer, and the Best 

          Practices to Implement

16:30 Defining Architecture and Interfaces for an Open, 

            Distributed, Flexible and Secure V2X Systems 


        • V2X-capable hardware security modules for automotive 

            mass market 

        • Vehicular (hardware) security evaluation standards 

        • Vehicular security evaluation infrastructure 

           (e.g., trusted OEM or third-party evaluation labs 

            that are strongly connected with the existing PKI 


       • Real-world hardware security practice especially 

            for V2X safety communication systems

17:00  From eMobility to Connected Self-Driving - Securing the 

            Automotive Revolution

17:30  Securing Software Updates for Automobiles, Discuss 

           Secure and Seamless Integration of Over the air 

           Software Update Capability in an Advanced Multi-core 


18:00  End of Day One

DAY TWO SUMMIT Friday (24th, Feb. 2017)

08:15  Registration & Coffeebreak

09:00  Chairman Recap Day One Summit

09:10  Learn the Cybersecurity Solutions based on

           Big Data and Cloud Platform

09:40 Update on SHE, EVITA, & CAMP 

10:10 Secure Can Bus In-vehicle Communication

        •Use lightweight cryptography to achieve CAN 

           implicit authentication 

        •A Secure Design for Practical Identity-Anonymized 

          CAN Application

10:40  Social Networking & Coffee Break

11:10  Addressing Cyber Security Throughout The Supply 

           Chain To Secure The Vehicle’s Evolving Ecosystem

11:40 Towards a Systematic Penetration Testing 

          Framework for In-Vehicular CAN Networks

12:00 Social Networking & Luncheon

13:30 Master the Cutting-edge Security Technology and 

          Methods that are Used in the Process of 

          Developing Underlying Software

14:00 Strategies to Protect ECU Software from Attack

       • Intrusion Detection and Prevention – Protecting

          Gateway ECUs

       • How to Realize Communication Security between

          Outside-in car and Backend -New Generation of

          Telematics Security Key Technology

14:30  Intrusion Detection & Reaction 

        • Automotive Firewalls and Intrusion Detection Systems

        • Intrusion Detection by Density Estimation of Reception 

           Cycle Periods for In-Vehicle Networks

        • Early Warning Systems and Confirm Information Security Review System

15:00  Integration of Security Test Methods Throughout the 

            Validation and Verification Process

Next Item:It's the last one
Previous Item:It's the first one
  • 电话咨询
  • 13764456747
  • 021-52710299-8037