DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
  1. DZone
  2. Software Design and Architecture
  3. Security
  4. Infographic: Auto Software Security

Infographic: Auto Software Security

An infographic that outlines the steps any cyber-physical software development program should follow.

Erika  Barron-Delgado user avatar by
Erika Barron-Delgado
·
Apr. 25, 16 · Opinion
Like (4)
Save
Tweet
Share
4.79K Views

Join the DZone community and get the full member experience.

Join For Free

we have come a long way since karl benz patented and developed what would become known as the modern automobile. the rise of driver-assist technology, internet connectivity, control-by-wire functionality, and other innovations means a greater reliance on software to carry out all types of functions — not just traditionally safety-critical systems. in fact, today’s car has more lines of code than a jet fighter. but with so much software being integrated along several tiers of the automotive supply chain, how do we ensure that the car as a system is safe, secure, and reliable?

automotive software survey

we asked software development professionals during a recent webinar a few questions about the perceptions of software quality in the automotive industry. the results not only provide insights about the perception of software quality ownership within the industry, but they also point to a lack of consensus amongst peers.

how does your organization determine functional safety requirements for the supply chain?

50% of respondents said that they rely on a certificate of compliance from suppliers. the other 50% said that policies that define testing protocols, including coverage, determine the functional safety requirements.

when is a hardware or software component considered done?

69% of respondents said that they consider a component finished when internal tests show 0% failure, versus 23% of respondents who said that passing government certifications means that the component is finished. only 8% said that a component is only finished when processes defined in standards, such as misra, are followed.

who owns functional safety for an automotive hardware component that contains software?

57% of respondents said that ultimately the manufacturer that assembles and sells the vehicle is responsible for the functional safety of all software-containing components. 35% of respondents said that functional safety is owned by the supplier of the hardware/software, whereas only 7% said that it’s the responsibility of the architects/programmers who design and create the code.

automotive software quality risks and what you can do to mitigate them

the following infographic identifies the growing surface area that cars of the not-too-distant future, as well as cars on the road today, expose that could be exploited by malicious hackers.

automotive software development defect risks and remediation

Software development security Infographic

Published at DZone with permission of Erika Barron-Delgado, DZone MVB. See the original article here.

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • Kubernetes vs Docker: Differences Explained
  • What Is a Kubernetes CI/CD Pipeline?
  • Building a Scalable Search Architecture
  • What Is Policy-as-Code? An Introduction to Open Policy Agent

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: