Smart Car Information Security (Cybersecurity and Data Security) Research Report, 2025
  • Aug.2025
  • Hard Copy
  • USD $4,700
  • Pages:441
  • Single User License
    (PDF Unprintable)       
  • USD $4,500
  • Code: FZQ020
  • Enterprise-wide License
    (PDF Printable & Editable)       
  • USD $6,800
  • Hard Copy + Single User License
  • USD $4,900
      

Research on Automotive Information Security: AI Fusion Intelligent Protection and Ecological Collaboration Ensure Cybersecurity and Data Security

At present, what are the security risks faced by intelligent connected vehicles? Automotive information security covers two aspects: cybersecurity and data security. Cybersecurity measures and data security technologies are embedded in the information security framework to form multi-layer protection.

intelligent connected vehicles have become integrated mobile smart terminals. The EEAs continue to evolve, but automotive information security attacks are increasing, including autonomous driving safety attacks (sensor failure and deception, software vulnerabilities and network attacks, decision algorithm defects, data privacy and security), vehicle-road-cloud integrated network attacks (Internet of Vehicles platform attacks, roadside infrastructure tools, satellite Internet attacks), and attacks on charging networks (new energy vehicle battery system attacks, charging station network attacks). For example, Toyota's network was reportedly hacked in August 2024, and Qualcomm identified a zero-day vulnerability, CVE-2024-43047 in October 2024, affecting its chipsets. Jaguar Land Rover was hacked in March 2025, resulting in the leakage of 700 internal documents. According to the 3 million+ vehicles monitored by Vecentek VSOC, security incidents in 2024 increased by 31% year-on-year compared with 2023.

In terms of policy, OEMs and specific models for both export and domestic markets must meet established standards and specifications (the European General Data Protection Regulation (GDPR), UN ECE WP.29 R155/R156, ISO/SAE 21434 "Road Vehicles-Cybersecurity Engineering", GB44495-2024 "Technical Requirements for Vehicle Information Security", GB/T 44464-2024 "General Requirements for Automotive Data", etc.). Only after meeting the information security specifications can vehicles be qualified to be launched on the market.

1. The trend of flattening the supply chain requires ecological collaboration and protection, and the shortened SDV iteration cycle increases the pressure of security testing

Software-defined vehicles (SDV) separate software and hardware. OEMs are currently adopting an iterative R&D model to shorten the new function release cycle to 3-6 months, so that the pressure of automotive software security testing is prominent. Faced with the threat of cybersecurity and data security, OEMs are increasingly integrating security practices into all phases of the vehicle lifecycle development within their agile DevOps for development and operation. They are gradually embracing the integrated development of DevSecOps.

With the trend of flattening the supply chain, OEMs now have to face more suppliers, and it is difficult for them to obtain device source code, and there is a lack of efficient firmware security testing tools. In view of this, OEMs are gradually increasing vulnerability management efforts and continuously strengthening software supply chain security efforts. Effective response measures include software bill of materials (SBOM) management, software composition analysis (SCA), code review, SAST, IAST, DAST, fuzz testing and other technologies. Among them, the software bill of materials (SBOM) includes not only component names, version numbers, suppliers, etc., but also license information, copyright statements, vulnerability data and other information. As one of the important tools for open source software governance and software supply chain security management, SCA generates SBOM as one of its important core functions, providing essential basic information for security in subsequent stages.

It is also worth noting that DAST has a collaborative value with IAST and SAST. DAST (dynamic application security testing) is a black box security testing technology that simulates external attacks (such as malicious request injection) when the application is running, and detects its dynamic response to detect security vulnerabilities. Collaboration between DAST and IAST: With Interactive Application Security Testing (IAST) accurate vulnerability positioning (such as code line level) is realized, the DAST false alarm rate reduces (from 30% to <5%). DAST and SAST are combined to form a "double inspection mechanism" (SAST for early repair of code defects + DAST for later verification of runtime security) to offer the protection in the full life cycle.

2. The application of AI in the field of automotive information security is evolving from single-point defense to intelligence and systematization

AI is reshaping the paradigm of automotive information security, shifting from passive protection to a closed loop of "prediction-defense-response". The application of AI in the field of automotive information security is evolving from single-point defense to intelligence and systematization. The main trends are reflected in two aspects: technology application and industrial ecology. The technology application trends include the following:

Cloud-edge-vehicle linkage: For example, NavInfo and Alibaba Cloud jointly build an intelligent cloud base to support the closed loop of autonomous driving R&D data and security strategy collaboration.

Deep collaboration between OEMs and technology companies (such as vertical foundation models and zero-trust architecture) will become mainstream, such as FAW Toyota × Tencent Cloud and NavInfo × Alibaba Cloud for joint research and development, focusing on the construction of "AI+security” platforms. Compliance requirements and global deployment will further drive scenario-based innovation of AI technology in line with regulations such as UN R155 and GB 44495-2024, and promote the application of AI in cross-border data and privacy protection (such as Vecentek's compliance solution for the EU).

In addition, VSOC (Vehicle Safety Operation Center) is developing towards intelligence and cloud computing to reduce the global deployment cost (Chery VSOC supports real-time translation in multiple languages).

Callisto S3-VSOC: Based on the AI-native automotive cybersecurity platform, Callisto S3 relies on the self-developed foundation model platform “Butterfly AI 2.0” (Automotive Safety Agent Cluster) to build an automotive safety agent cluster that integrates compliance, cognition and operation, enabling the process from vehicle abnormal reporting to cloud AI alarm analysis, automatically generating "Security Incident Investigation Report" in one sentence, and assisting compliance engineers in natural language interactive investigation, reducing the time spent on daily security operations by 65%.
Cognitive evolution (from experience to reasoning): Butterfly AI understands the semantics of CAN signals, diagnostic signals, remote control signals, etc. through foundation models, establishes attack maps and signal sequence behavior reasoning mechanisms, and truly transforms "data from traffic to attacks".
Ecological collaboration (from closed to linkage): TSP, remote diagnosis, OTA and intelligent driving platforms are connected to achieve natural language-driven collaboration between systems and support integrated automatic response processes.
Risk governance (from static defense to dynamic closed loop): Users can build and adjust security policies using natural language, and agents can continuously learn and evolve monitoring strategies based on feedback.

Inchtek’s inVSOC Automotive Security Operation Platform: inVSOC V3 uses a self-developed high-performance DAG execution engine to support multiple analysis operators such as sequence, parallel, extreme value, and difference, and conduct real-time processing and correlation analysis of massive vehicle logs.
① Dynamic strategy adjustment: Based on AI's adaptive learning, it continuously optimizes threat detection rules to respond to novel attacks (such as 0-day vulnerability);

② Generative AI-driven investigation response (GenAI) includes:
Alarm analysis assistant: Automatically associate the CVE/NVD vulnerability library, Auto-ISAC threat intelligence, generate alarm summary and disposal suggestions (for example: automatically match √CVSS score and recommend patch strategy).
Data insight assistant: Support natural language interaction (such as "show high-frequency attack sources in the past 7 days"), automatically generate visual charts, and accelerate operational decision-making.
Knowledge base Q&A: Integrate automotive safety knowledge base to answer operational questions such as compliance processes and incident handling specifications, and reduce personnel training costs.

Baidu's Vehicle Security Operations Center (VSOC)
AI risk assessment: When the VSOC receives events reported by IDPS, it only means that an event has occurred. Whether this event really poses a security risk can be automatically assessed by a foundation model, and a recommended solution can be given.
Alarm noise reduction: Based on the AI foundation model, the alarms can be whitened, deduplicated, aggregated, and automatically ignored to reduce noise.
Operation robot - Copilot: The VSOC integrates a natural language interactive robot dubbed Copilot based on a foundation model, which can guide the VSOC to perform automated statistics, report generation, risk interpretation, work order creation, security response, etc. through natural language.

With the continuous evolution of AI technology, the application of agents in security operation has moved from concept verification to actual implementation. In the existing intelligent operation system (such as the VSOC), agents mainly assume the following roles:
Automatic handling of simple events: For standardized and common security events with clear rules, agents can complete rapid detection, correlation analysis, and disposal based on preset rules and self-learning strategies, greatly avoiding manual intervention.
Complex event decision-making assistance:For security events with complex correlations and wide-ranging impacts, agents can integrate multi-source data, draw preliminary analysis conclusions, and provide decision-making references for operators. Finally, manual confirmation and optimization are carried out to achieve efficient response under human-machine collaboration.

With the continuous advancement of the deep integration of the VSOC and agents, security operation is evolving towards "agent centralization". A more efficient and intelligent security operation model will consist of VSOC + agent center + a small number of elite operators.

3. The application of post-quantum cryptography technology in the automotive industry has moved from technical accumulation to industrialization

The application of post-quantum cryptography technology in the automotive industry has moved from technical accumulation to industrialization under the impetus of both quantum threats and intelligent cybersecurity demand. In the short term, chip performance and standard unification should be handled. In the long term, a full-stack protection system of "algorithm-chip-communication-cloud platform" will be formed. OEMs should give priority to the layout of hybrid encryption, automotive chip certification and V2X security upgrades to cope with quantum security challenges in the next 10 years. The post-quantum cryptography migration strategy of the US NIST clearly states that for important infrastructure and business systems, the existing PKI algorithms will be replaced in 2028-2030.

Traditional asymmetric encryption algorithms like RSA and ECC are indeed vulnerable to attacks from quantum computers using algorithms like Shor's. This means that, if powerful quantum computers become a reality, public key cryptography systems relying on these algorithms for vehicle-to-cloud communication, OTA updates, and identity authentication could be compromised. The life cycle of a car is as long as 10-15 years, and quantum computers may break through in the next 10 years, so post-quantum protection should be deployed in advance.

One way to establish a quantum security system is to design Post-Quantum Cryptography (PQC), such as lattice cryptography and hash cryptography, and build a new public key cryptography system on this basis. Another way is to apply  Quantum Key Distribution (QKD) technology that guarantees security with physical laws.

QKD does not rely on certain mathematical problems and can achieve absolute security of information theories. Under such security, no matter how powerful the eavesdropper's computing power is (even if s/he has a quantum computer), s/he cannot crack the quantum key generated by QKD.

Case 1: In June 2025, Geely officially released the world's first quantum security technology for intelligent connected vehicles, pioneering the integration of quantum-resistant encryption, quantum secure communication and other technologies, from identity authentication to communication encryption, from command transmission to data protection, and then to behavior monitoring, to build a comprehensive security protection chain, and create a security foundation with quantum security as the core. Geely plans to connect data centers in Hangzhou, Huzhou, Deqing and other places to the national wide-area quantum security backbone network, using quantum state superposition, indivisibility, and non-cloning physical properties to produce and distribute quantum keys, and advance the security line to the initial stage of data generation, transforming the paradigm to "Security as a Service".

Case 2: In March 2025, UNI-SENTRY officially released the world's first "SPHINCS+ post-quantum cryptographic accelerator hardware IP" that supports mainstream MCUs, providing chip-level solutions for the next-generation information security through a software-hardware collaborative architecture. It enables all hardware, and uses specially optimized high-performance parallel cores and fully pipelined hash cores (SHA256) to accelerate the core components of SPHINCS+. In addition, compared with high-performance processors (Intel E3-1120 @ 2100MHz), it is more than x260 times faster than C code implementation.

On April 26, 2025, UNI-SENTRY and SemiDrive signed a strategic cooperation agreement. By integrating the hardware trust root of the dual-mode encryption engine (supporting Kyber key encapsulation and Dilithium digital signature), it will enable E3650 to better meet the millisecond-level response requirements of zonal controllers, chassis domain controllers, and intelligent driving domain controllers under the protection of post-quantum cryptographic algorithms. Based on E3650, they jointly developed a variety of flexible and configurable information security solutions that can meet the UN WP.29 R155, the national standard GB 44495-2024 and enterprise standards, and support national encryption algorithms.

In May 2025, UNI-SENTRY's solution of Sphincs+ post-quantum cryptographic algorithm was fully adapted to Renesas RH850 U2X. In June 2025, UNI-SENTRY officially released the world's first "ultra-lightweight 3-in-1 (Kyber+Dilithium+SHA3)" post-quantum cryptography (PQC) hardware accelerator IP. This product integrates the NIST standardized algorithm Kyber (key encapsulation) and Dilithium (digital signature) into a single IP core, providing a chip-level post-quantum attack solution for smart cars, covering core controllers for the power domain, intelligent driving domain, chassis domain, cockpit domain, and body domain.

4. Stricter policies and regulations force OEMs to make safety design in advance, shifting from "after-the-fact remediation" to "full life cycle safety design"

Since the release of the "Data Security Law" in 2021, national ministries and commissions have issued a total of 39 policies and regulations related to data security in the automotive industry (such as "Several Provisions on Automotive Data Security Management (Trial)", "Guidelines for Detecting Important Data in Connected Vehicles and Autonomous Driving", GB/T 41871-2022 "Information Security Technology - Security Requirements for Automotive Data Processing", GB/T 44464-2024 "General Requirements for Automotive Data", GB/T "Intelligent Connected Vehicles - Data Security Management System Specifications" (under preparation)) and 7 standards, so that the industry's data security management system is becoming perfect.

At present, the data security challenges faced by OEMs include a wide variety of data types and diverse attacks, such as 0-day attacks, supply chain risks (OEMs share data with many partners and suppliers, so third-party risks become an important source of data leakage), and human factors (employees' weak security awareness and operational errors are also important causes of data leakage). Therefore, it is necessary to construct a data protection and governance system for the entire life cycle, and it is recommended to strengthen the construction in the following aspects (see the figure below).

For example, Agile Technology's data life cycle security protection solution with the data guard system (DGS) as the core includes data classification and grading, data encryption and decryption, data leakage prevention, outbound control, watermark traceability, log audit and other functional modules, effectively preventing data leakage and providing integrated data security protection and management for OEMs. Agile Technology's data security protection solution has currently protected the data security of industry benchmark OEMs including FAW, Changan, Dongfeng, Geely, Hozon, smart, Wuling, and Yutong.

In addition, security provider Eagle Cloud has developed its own integrated office security platform based on the SASE architecture - Eagle Cloud Hub, which integrates Zero Trust Network Access (ZTNA), Data Leakage Prevention (DLP), Extended Detection and Response (XDR), and Unified Endpoint Management (UEM), providing a comprehensive, flexible and secure SASE integrated office security solution. Its customers include Geely, SERES, Leapmotor, Avatr, WeRide and others.

 

Definition

1 Automotive Information Security
1.1 Current Security Risks of Intelligent Connected Vehicles
Security Issues Of Intelligent Vehicles
Vehicle Attacks
Classification of Internet of Vehicles Security Risks  
Summary of Major Global Intelligent Vehicle Cybersecurity Events
Attack Classification (1)
Attack Classification (2)
Attack Classification (3)

1.2 Automotive Information Security Vulnerability Trends
Authoritative Cybersecurity Vulnerability Platforms at Home and Abroad
Vulnerability Rating Mechanism in the Automotive Industry

1.3 Supply Chain Security
Comparison of Software Component Detection Tools
Software Bill of Materials (SBOM) (1)
Software Bill of Materials (SBOM) (2)
Software Supply Chain Security
Software Security and Compliance Scenarios in the automotive industry

1.4 Recommendations for Automotive Information Security Compliance System
Role of TARA in Automotive Cybersecurity
Specific Application Examples of TARA in Automotive Cybersecurity
Case of Foundation Model Reconstructing TARA Platform (1)
Case of Foundation Model Reconstructing TARA Platform (2)
Case of Foundation Model Reconstructing TARA Platform (3)
Security Products for WP29 R155/44495

1.5 Protection Technology: IDPS & VSOC
IDS/IDPS Architecture
Core Capability of VSOC 
VSOC: Evolution to Collaboration with Agent (1)
VSOC: Evolution to Collaboration with Agent (2)
VSOC: Evolution to Collaboration with Agent (3)
IDPS & VSOC Solution Case

1.6 Protection Technology: Penetration Testing & Fuzz Testing
Penetration Testing Technology 
Fuzz Testing Technology 
Fuzz Testing of Key Components (1)
Fuzz Testing of Key Components (2)
Fuzz Testing at the Vehicle-level/Development Stage

1.7 Protection Technology: SAST, IAST & DAST
SAST Technology  
SAST Solution Providers and Cooperation with OEMs 
IAST Technology
IAST Solution Providers and Cooperation with OEMs
DAST Technology
DAST Solution Providers and Cooperation with OEMs
DevSecOps (1)
DevSecOps (2)

1.8 Protection Technology: Post-quantum Cryptography 
SPHINCS+ Post-quantum Cryptographic Algorithm
Application of PQC in the Automotive Field
PQC Application Case in the Automotive Safety Field
Cooperation Cases between Major PQC Suppliers and Automotive Customers
1.9 Policies, Regulations and Standards

Laws, Regulations and Standards Related To Information Security (1)
Laws, Regulations and Standards Related To Information Security (2)
Three National Mandatory Standards
Framework of GB 44495
Impact of GB 44495 on OEMs

2 Automotive Data Security
2.1 Data Security Regulations and Policies 
Legal Provisions of Automotive Data Security Management System
Standardization of Automotive Data Security Management System
Model Data Compliance Embedded in the Development Process
National Standards/Industry Standards Related to Classification and Grading of Intelligent Connected Vehicle Data

2.2 Data Security Challenges Faced by OEMs and Protection Response Suggestions
Data Security Test Items
Automotive Data Security Test: Personal Information Protection Test Method
Automotive Data Security Test: Anonymization Test Method
Autonomous Driving Data Desensitization: Key Technology for Protecting Privacy and Data Security
Overview of OEMs and Models with Automotive Privacy Protection Logos

2.3 Background of Cross-border Data Regulations and Policies
Core Methods for OEMs to Let Data Cross Borders
Implementation Paths and Core Measures for Cross-border Data
Typical Model Cross-border Data Cases  
Automotive Cross-border Service Providers and Cooperative OEMs

2.4 Data Security Case 1: Agile Technology
Profile
Product Series
Automotive Data Security Solution 
Data Encryption Protection System and Cooperative OEMs
DGS and Cooperative OEMs
Intelligent Data Classification System Software for State Secrets and Cooperative OEMs
DLP and Cooperative OEMs

2.5 Data Security Case 2: Eagle Cloud
Profile
XDLP
XDLP and Cooperative OEMs (1)
XDLP and Cooperative OEMs (2)

2.6 Data Security Case 3: BJCA
Profile
Data Security Governance Solution
Database Encryption and Access Control System
Cooperative OEMs in Database Encryption and Access Control System
Internet of Vehicles-specific Key Management and Interaction System (KMIS)
Cooperative OEMs in KMIS
V2X Security Certificate Authentication System
V2X Security Certificate Authentication System Customers
Internet of Vehicles Cryptography Application Solutions

2.7 Data Security Case 4: SafePloy
Profile
Cooperation with OEMs
Cooperative OEMs in Code/Firmware Signature
Cooperative OEMs in Lightweight CA System

2.8 Data Security Case 5: Infosec Technologies
Profile
Product Series
DSec Series 
DSec Series (1)
DSec Series (2)
Cooperative OEMs in DSec Series 
iSec Cryptographic Module and Cooperative OEMs  

3 Information Security Practices of OEMs
3.1 SERES
Automotive Information Security System Construction
Data Security Construction Steps and Effects
Information Security Ecological Synergy Strategy and Effects
Technology Integration and Innovation in Data Security Construction
Security Protection Improvement through Intelligent Operation
Automotive Information Security Cooperation Case

3.2 Leapmotor
Automotive Information Security System Construction
Automotive Information Security System Construction Steps and Strategy 
Innovation in Automotive Information Security System Construction 
Automotive Information Security Cooperation Case

3.3 Xpeng
Automotive Information Security System Construction
Automotive Information Security Cooperation Case
Innovation in Automotive Information Security System Construction

3.4 NIO
Automotive Information Security System Construction
Automotive Safety R&D and Investment 
Automotive Information Security Cooperation Case

3.5 Li Auto
Automotive Information Security System Construction
Innovation in Automotive Information Security System Construction
Automotive Information Security Cooperation Case
Balancing Automotive Information Security Cooperation and Commercial Confidentiality in Practice

3.6 Xiaomi  
Automotive Information Security System Construction
Implementation of Automotive "Full-link Encryption System"

3.7 BYD
Automotive Information Security System Construction
Automotive Information Security Cooperation Case
Classification of Automotive Information Security Cooperation Systems

3.8 Geely
Automotive Information Security System Construction
Automotive Information Security System Construction Steps and Strategy
Automotive Information Security Cooperation Case
Intelligent Connected Vehicle Quantum Security Technology
Zeekr’s Automotive Privacy Protection 

3.9 Dongfeng Motor
Automotive Information Security System Construction
Automotive Information Security Cooperation Case
Internet of Vehicles Security Strategy
Cybersecurity and Data Security Management System Panorama
Data Security Compliance Management Framework
Vehicle-cloud Integrated Situational Perception Platform
Closed-loop Procedure and Data Operation Mode

3.10 BAIC
Automotive Information Security System Construction
Application of "Cloud-Application-Smart Terminal" Protection System
"R&D-Production-After-sales" Safety Protection System Implementation Steps and Strategy
Automotive Information Security Cooperation Case

3.11 FAW
Automotive Information Security System Construction
Self-developed Results of Automotive Information Security Technology
Automotive Information Security Cooperation Case

3.12 SAIC
Automotive Information Security System Construction
Automotive Information Security Cooperation Case

3.13 GAC
Automotive Information Security System Construction
Automotive Information Security System Construction Steps and Strategy
Automotive Information Security Cooperation Case

3.14 JAC Group
Automotive Information Security System Construction
Automotive Information Security System Construction Cooperation Case

3.15 Chery
Automotive Information Security System Construction
Automotive Information Security System Construction Cooperation Case
Highlights of Automotive Information Security System Construction

3.16 Changan
Automotive Information Security System Construction
Automotive Information Security System Construction Cooperation Case

3.17 Great Wall Motor
Automotive Information Security System Construction
Automotive Information Security System Construction Cooperation Case
Automotive Information Security System Construction Steps and Strategy
Automotive Information Security Technology Innovation System

4 Typical Automotive Information Security Hardware Companies
4.1 UNI-SENTRY
Profile
"3-in-1" Cryptographic Accelerator Hardware IP
"Ultra-lightweight 3-in-1" Accelerator Hardware IP
MACSec IP for “Switch Chips”
SecIC-HSM and Case 1
SecIC-HSM and Case 2
"SPHINCS+ Post-quantum Cryptography" Accelerator Hardware IP
Sphincs+ Post-quantum Cryptographic Algorithm Adaptation Case
Dynamics
Cooperation 

4.2 Thinktech
Profile
Dynamics
Mizar Series Automotive-grade Security Chips
Cooperation Projects in Mizar Series Automotive-grade Security Chips
Alioth Series High Functional Safety MCUs (1)
Alioth Series High Functional Safety MCUs (2)
Alioth TTA8 Application Panorama
Cooperation Projects in Alioth Series  

4.3 NationalChip
Profile
Dynamics
CPU Technology Roadmap
Automotive Electronic Digital Chip Technology Roadmap
Mixed-signal Automotive Electronic Chip Technology Roadmap
Automotive Information Security Chip Technology Roadmap
Automotive-grade Information Security Chip: Vehicle & Cloud and Roadside
Edge Security Chip Technology Roadmap
Cooperative OEMs in Automotive-grade Information Security Chip (1)
Cooperative OEMs in Automotive-grade Information Security Chip (2)
Cooperative OEMs in Automotive-grade Information Security Chip (3)
Cooperative OEMs in Automotive-grade Information Security Chip (4)
Cooperative OEMs in Automotive-grade Information Security Chip (5)
Automotive-grade Information Security Chip Shipments
Automotive-grade Information Security Chip Shipments and Application

4.4 Shanghai Hangxin
Profile
Post-quantum Cryptographic Encryption Signature Solution
ACM32 Series
Cooperative OEMs in ACM32 Series 
Automotive Safety Solutions 
ACL16 Automotive-grade Security Chip
Cooperative OEMs in ACL16
ACL16_S Automotive-grade Security Chip
Cooperative OEMs in ACL16_S
V2X Security Authentication Solution
V2X Security Authentication Solution and Customers
T-BOX Solution

4.5 HSEC
Profile
Security Chip Series  
Automotive Terminal Security Chip 
Cooperative OEMs in Automotive Terminal Security Chip (1)
Cooperative OEMs in Automotive Terminal Security Chip (2)

4.6 Fudan Microelectronics
Profile and Automotive-grade Chip Product Line
Automotive Security Chip
Cooperative OEMs in Automotive Security Chip

4.7 Nations Technologies
Automotive-grade Security Chip
Cooperative OEMs in Automotive-grade Security Chip

4.8 HED
Internet of Vehicles SE Products (1)
Internet of Vehicles SE Products (2)
Internet of Vehicles SE Products (3)
Automotive Safety SE Chip Customers

4.9 W.UNITED
Automotive-grade Chip Series
Automotive-grade Chip Customers (1)
Automotive-grade Chip Customers (2)
Automotive-grade Chip Customers (3)

4.10 Tongxin Microelectronics
Automotive Security Chip
Automotive Security Chip Customers

5 Major Automotive Information Security Software Providers 
5.1 Software Security Technology 
Profile
SoftSec SCA (1)
SoftSec SCA (2)
SoftSec SCA (3)
SoftSec SCA Customers
SoftSec FUZZ 
SoftSec FUZZ Customers
SoftSec MCP 
StatiCode SAST (1)
StatiCode SAST (2)
StatiCode SAST (3)
StatiCode SAST (4)
StatiCode SAST Customers

5.2 Anban Tech
Profile
Dynamics
ICV Information Security Testing Integrated Solution
ICV Information Security Solution
Yizhen Protocol Fuzz Testing System and Customers
Yishi Firmware Supply Chain Security Management System and Customers        
Yice Unit Intelligent Fuzz Testing System and Customers
Foundation Model Firewall System
Foundation Model Security Assessment System
Yizhi Foundation Model Security Assessment System

5.3 SourceGuard
Profile
Wisdom Fuzz Testing Platform
Cooperative OEMs in Wisdom Fuzz Testing Platform
Swift Fuzzer 
Advantages of Swift Fuzzer and Cooperative OEMs 
Cybellum 
Cooperative OEMs in Cybellum 
Swift-Code  
Swift-AI  
Cooperative OEMs in Swift-AI  

5.4 Seczone
Profile
Internet of Vehicles Software Security Solution
Software Supply Chain Security Architecture  
Fuzz Testing Platform (SFuzz)
Internet of Vehicles Security Detection Solution based on SFuzz
Cooperative OEMs in Sfuzz 
CodeSec 4.0
CodeSec and Cooperative OEMs 
Gray Box Security Testing Platform: VulHunter
Cooperative OEMs in VulHunter  
Component Security and Compliance Management Platform: SourceCheck
Cooperative OEMs in SourceCheck 
SBOM Management Platform
DevSecOps Platform

5.5 SECTREND
Profile
CleanSource SCA
CleanSource SCA and Cooperative OEMs
CleanCode SAST
Internet of Vehicles Security Service

5.6 Feysh Technology
Profile
Corax Code Security Analysis Platform
Stork Software Component Analysis Platform

5.7 TICPSH 
Profile
SmartRocket TestSec (1)
SmartRocket TestSec (2)
SmartRocket TestSec (3)
SmartRocket PeneX 
SmartRocket Scanner  
SmartRocket BinAnalyzer  
IDPS&VSOC Integrated Platform (1)
IDPS&VSOC Integrated Platform (2)

5.8 Chiwu Technology
Profile
Intelligent Connected Vehicle Security Solution
Penetration Testing Service
Software Composition Analysis (SCA) Platform 
Unified Terminal Security Management Platform (UTSMP)
Terminal Application Hardening Platform
Terminal Firmware Security Analysis Platform

5.9 Xmirror
Products and Services
Automotive Solution Application (1)
Automotive Solution Application (2)
Cooperative OEMs

6 Typical Internet of Vehicles Information Security Solution Providers 
6.1 Vecentek
Profile
Customers
Product system
Security Testing Service and Testing Toolset
Automotive Cybersecurity Testing System
deCORE DS and Cooperative OEMs
Next-generation deCORE EEAS
deCORE SecOC & deCORE vETH
deCORE Ccloud
deCore Fuzz Tool 
Cooperative OEMs in deCore Fuzz Tool 
deCORE CR and Cooperative Companies
deCORE IDPS
deCORE VSOC
Advantages of IDPS & VSOC 
Cooperative OEMs in IDPS & VSOC 

6.2 Callisto Technology
Butterfly AI 2.0 (1)
Butterfly AI 2.0 (2)
Butterfly AI 2.0 (3)
Butterfly AI 2.0 (4)
Cooperative OEMs in Butterfly AI 2.0
Cooperation with Tier 1 Suppliers
S3-VSOC
Cooperative OEMs in S3-VSOC 
Automotive Data Security Solution
Data Compliance Agent
Vehicle-Road-Cloud Security Solution
Domain Control Information Security Solution

6.3 GoGoByte
Profile
Automotive Information Security Product - DefenseWeaver and Advantages
Cooperative OEMs in DefenseWeaver 
Automotive Information Security Product - ThreatTrace
Cooperative OEMs

6.4 Inchtek
Profile and Customers
Smart Car Connectivity and Information Security Solution 
Autonomous Vehicle Information Security Solution
IDPS 3.0
IDPS  
inHSM: HSM Information Security Firmware for Security Chips 
Chips Compatible with inHSM
inTARA: Threat Analysis and Assessment Tool  
inTARA-NEO
inDARA: Data Security and Privacy Impact Assessment System, Development and Verification Tool 
inVSOC: Automotive Cybersecurity Operation Platform  
inCSMS: Information Security Management Platform  
inSSM: Software Security Module  
SecOC: Secure Communication Module 
Central Network Controller Series 
Central Network Controller Application Case

6.5 SECDEER
Profile
Vehicle Vulnerability Detection Platform
Cooperative OEMs in Vehicle Vulnerability Detection Platform
Comprehensive Test Range for Internet of Vehicles Security
Cooperative OEMs in Comprehensive Test Range for Internet of Vehicles Security

6.6 Topsec
Automotive Firewall
Automotive IDPS
Internet of Vehicles Security Detection Platform
Internet of Vehicles Security Solution
Internet of Vehicles Data Security Solution

6.7 SEC-ICV
Profile
Security Operation Management System
Vehicle Manufacturing Enterprise - Security Operation Solution
One-Stop Automotive Password Application Solution
Password Protection Matrix: Full Life Cycle + Full Domain Coverage
Unified Identity Management System
Vulnerability and Risk Management System
Intelligent Terminal Information Security Protection Software
Terminal Security Protection SDK
Terminal Security Monitoring and Response System
Full Life Cycle Data Security Governance System
Intelligent Connected Vehicle Security Operation Center Solution
Intelligent Connected Vehicle EEA Security Solution
“Vehicle-Road-Cloud Integration” Security System Solution
Vehicle-Road-Cloud Integration - Agent Solution

6.8 Yaxon Zhilian
Profile
Vehicle-Cloud Collaborative Information Security Solution and Cooperative OEMs
Central Security Domain Gateway and Cooperative OEMs
Ethernet Security Gateway and Cooperative OEMs

6.9 Qingtianxinan
Profile
IDPS  
Cooperative OEMs in IDPS 
VSOC
Cooperative OEMs in VSOC 

7 Trends and Summary
Summary of Automotive Information Security Chips
Summary of Fuzz Testing Solutions
Summary of SCA Tools/Platforms
Summary of Source Code Security Tools/Platforms
Summary of IDPS & VSOC Solutions
Summary of Secure Communication Solutions/Platforms and Cooperative OEMs
Summary of Internet of Vehicles Security Solutions and Cooperative OEMs
Summary of Automotive Cybersecurity Solutions and Cooperative OEMs
Summary of Automotive Data Security Solutions and Cooperative OEMs
Trend 1:
The application of Post-quantum cryptography technology in the automotive industry has moved from technical accumulation to industrialization
Summary of Post-quantum Cryptography Products and Cooperative OEMs
Trend 3:
Application of AI in Automotive Information Security/Cooperation Cases
Trend 4:
Foundation Model Automotive Information Security Application/OEMs
Application of Agents in Automotive Information Security/Cooperation Cases

Smart Car Information Security (Cybersecurity and Data Security) Research Report, 2025

Research on Automotive Information Security: AI Fusion Intelligent Protection and Ecological Collaboration Ensure Cybersecurity and Data Security At present, what are the security risks faced by inte...

New Energy Vehicle 800-1000V High-Voltage Architecture and Supply Chain Research Report, 2025

Research on 800-1000V Architecture: to be installed in over 7 million vehicles in 2030, marking the arrival of the era of full-domain high voltage and megawatt supercharging. In 2025, the 800-1000V h...

Foreign Tier 1 ADAS Suppliers Industry Research Report 2025

Research on Overseas Tier 1 ADAS Suppliers: Three Paths for Foreign Enterprises to Transfer to NOA Foreign Tier 1 ADAS suppliers are obviously lagging behind in the field of NOA. In 2024, Aptiv (2.6...

VLA Large Model Applications in Automotive and Robotics Research Report, 2025

ResearchInChina releases "VLA Large Model Applications in Automotive and Robotics Research Report, 2025": The report summarizes and analyzes the technical origin, development stages, application cases...

OEMs’ Next-generation In-vehicle Infotainment (IVI) System Trends Report, 2025

ResearchInChina releases the "OEMs’ Next-generation In-vehicle Infotainment (IVI) System Trends Report, 2025", which sorts out iterative development context of mainstream automakers in terms of infota...

Autonomous Driving SoC Research Report, 2025

High-level intelligent driving penetration continues to increase, with large-scale upgrading of intelligent driving SoC in 2025 In 2024, the total sales volume of domestic passenger cars in China was...

China Passenger Car HUD Industry Report, 2024

ResearchInChina released the "China Passenger Car HUD Industry Report, 2025", which sorts out the HUD installation situation, the dynamics of upstream, midstream and downstream manufacturers in the HU...

ADAS and Autonomous Driving Tier 1 Suppliers Research Report, 2025 – Chinese Companies

ADAS and Autonomous Driving Tier 1 Suppliers Research Report, 2025 – Chinese Companies Research on Domestic ADAS Tier 1 Suppliers: Seven Development Trends in the Era of Assisted Driving 2.0 In the ...

Automotive ADAS Camera Report, 2025

①In terms of the amount of installed data, installations of side-view cameras maintain a growth rate of over 90%From January to May 2025, ADAS cameras (statistical scope: front-view, side-view, surrou...

Body (Zone) Domain Controller and Chip Industry Research Report,2025

Body (Zone)  Domain Research: ZCU Installation Exceeds 2 Million Units, Evolving Towards a "Plug-and-Play" Modular Platform The body (zone) domain covers BCM (Body Control Module), BDC (Body Dom...

Automotive Cockpit Domain Controller Research Report, 2025

Cockpit domain controller research: three cockpit domain controller architectures for AI Three layout solutions for cockpit domain controllers for deep AI empowerment As intelligent cockpit tran...

China Passenger Car Electronic Control Suspension Industry Research Report, 2025

Electronic control suspension research: air springs evolve from single chamber to dual chambers, CDC evolves from single valve to dual valves ResearchInChina released  "China Passenger Car Elect...

Automotive XR Industry Report, 2025

Automotive XR industry research: automotive XR application is still in its infancy, and some OEMs have already made forward-looking layout  The Automotive XR Industry Report, 2025, re...

Intelligent Driving Simulation and World Model Research Report, 2025

1. The world model brings innovation to intelligent driving simulation In the advancement towards L3 and higher-level autonomous driving, the development of end-to-end technology has raised higher re...

Autonomous Driving Map (HD/LD/SD MAP, Online Reconstruction, Real-time Generative Map) Industry Report 2025

Research on Autonomous Driving Maps: Evolve from Recording the Past to Previewing the Future with "Real-time Generative Maps" "Mapless NOA" has become the mainstream solution for autonomous driving s...

End-to-End Autonomous Driving Research Report, 2025

End-to-End Autonomous Driving Research: E2E Evolution towards the VLA Paradigm via Synergy of Reinforcement Learning and World Models??The essence of end-to-end autonomous driving lies in mimicking dr...

Research Report on OEMs and Tier1s’ Intelligent Cockpit Platforms (Hardware & Software) and Supply Chain Construction Strategies, 2025

Research on intelligent cockpit platforms: in the first year of mass production of L3 AI cockpits, the supply chain accelerates deployment of new products An intelligent cockpit platform primarily r...

Automotive EMS and ECU Industry Report, 2025

Research on automotive EMS: Analysis on the incremental logic of more than 40 types of automotive ECUs and EMS market segments In this report, we divide automotive ECUs into five major categories (in...

2005- www.researchinchina.com All Rights Reserved 京ICP备05069564号-1 京公网安备1101054484号