Skip to main content

C2A and NXP unveil cybersecurity solution for C/AVs

C2A Security has launched a cybersecurity solution for connected and autonomous vehicles (C/AVs) that uses NXP Semiconductors’ CAN (Controller Area Network) transceivers. C2A says the transceivers detect and prevent malicious activity on the vehicle’s CAN bus. The solution also includes the C2A Stamper firewall and the SecMon intrusion detection software to detect potentially malicious activity. It also uses an in-vehicle System on Chip to enable an appropriate response, the company adds. Nathanie
September 25, 2019 Read time: 1 min
C2A Security has launched a cybersecurity solution for connected and autonomous vehicles (C/AVs) that uses 566 NXP Semiconductors’ CAN (Controller Area Network) transceivers.


C2A says the transceivers detect and prevent malicious activity on the vehicle’s CAN bus.

The solution also includes the C2A Stamper firewall and the SecMon intrusion detection software to detect potentially malicious activity. It also uses an in-vehicle System on Chip to enable an appropriate response, the company adds.

Nathaniel Meron, chief product and marketing officer at C2A Security, says: "C2A is looking to provide the automotive industry with comprehensive security solutions, covering all relevant attack vectors.”

For more information on companies in this article

Related Content

  • Automotive industry releases vehicle cybersecurity best practices
    July 22, 2016
    Members of the US Automotive Information Sharing and Analysis Center (Auto-ISAC) have released an overview of comprehensive Automotive Cybersecurity Best Practices, developed as a proactive measure to further enhance vehicle cybersecurity throughout the industry. The Executive Summary has been released publicly on the Auto-ISAC website. The Best Practices provide guidance to assist an organisation's development in seven key topic areas, including governance, risk assessment and management, threat de
  • Trend Micro discovers 'indefensible' car security/CAN standard flaw
    August 18, 2017
    Trend Micro claims to have discovered a hack is found that is not only successful in being able to drastically affect the performance and function of the car, but is also stealthy and vendor neutral. Discovered by researchers at Politecnico di Milano, Linklayer Labs and Trend Micro’s Forward-looking Threat Research (FTR) team, the hack is said to be currently indefensible by modern car security technology and to completely resolve it would require broad, sweeping changes in standards and the ways in-vehi
  • Here unveils Live Sense road hazard SDK
    October 14, 2019
    Here Technologies has released a software development kit (SDK) which it says provides real-time insights on driving conditions and upcoming obstacles without the need for connectivity. Here claims its Live Sense SDK uses artificial intelligence and machine learning to turn front-facing cameras such as smartphones and dashcams into vehicle sensors which can detect other vehicles, pedestrians or cyclists, potholes and road closures. Live Sense then provides information through audio and visual notificati
  • C-ITS in the EU: ‘A little tribal’
    April 1, 2019
    As the C-ITS Delegated Act begins its journey through the European policy maze, Adam Hill looks at who is expecting what from this proposed framework for connected vehicles – and why some people are insisting that the lawmakers are already getting things wrong here are furrowed brows in Brussels and Strasbourg as European Union legislators begin to consider the rules which will underpin future services such as connected vehicles. The idea is to create a regulatory framework to harmonise cooperative ITS