Welcome To The SAE MOBILUS Cybersecurity Hub

Your single, comprehensive source containing the latest cyber-physical security industry resources and news. Built with feedback from our customers and leaders in the industry to help you detect, mitigate, and reduce vulnerabilities in your products and services.

The Cybersecurity Knowledge Hub is your place to stay informed with current news from SAE and other leading sources, keep up to date with relevant, curated training and events, and access cutting-edge regulatory updates and standards.

SAE International Journal of Transportation Cybersecurity and Privacy is a scholarly publication of original high-quality scientific articles focusing on the Cyber Physical System (CPS) related areas of transportation cybersecurity and privacy.

Click the image title to learn more. 

Written by Kirsten Koepsel, The Aerospace Supply Chain and Cyber Security: Challenges Ahead looks at the current state of commercial aviation and cyber security, how information technology and its attractiveness to cyber attacks are affecting it, and the way supply chains have become a vital part of the industry’s cyber-security strategy.

In a very interconnected world, cyber vulnerability is real. Kirsten Koepsel, lawyer and engineer specializing in cyber security, talks with SAE International about how this new environment affects the planes and airports we use every day.



Editor's Picks

11-01-01-0001 | 2018-02-14
Journal Article
Designers of automotive systems find themselves pulled in an impossible number of directions. Systems must use the most advanced security features, but at the same time run on low-cost and resource-constrained hardware. Ultimately, an engineering trade-off will eventually be made regarding how …
2018-01-0012 | 2018-04-03
Technical Paper
Advanced safety features and new services in connected cars depend on the security of the underlying vehicle functions. Due to the interconnection with the outside world and as a result of being an embedded system a modern vehicle is exposed to both, malicious activities as faced by traditional I…
2018-01-0018 | 2018-04-03
Technical Paper
In the automotive network architecture, the basic functions of gateway include routing, diagnostic, network management and so on. With the rapid development of connected vehicles, the cybersecurity has become an important topic in the automotive network. A spoof ECU can be used to hack the automo…
2018-01-0019 | 2018-04-03
Technical Paper
Some of the recent studies reveal that it is possible to access the in-vehicle networks and inject malicious messages to alter the behavior of the vehicle. Researchers have shown that, it is possible to hack a car’s communication network and remotely take control of brake, steering, power window …
J3138_201806 | 2018-06-02
Ground Vehicle Standard
This document describes some of the actions that should be taken to help ensure safe vehicle operation in the case that any such connected device (external test equipment, connected data collection device) has been compromised by a source external to the vehicle. In particular, this document d…

In The News

Data Technology
On November 16, 2018, President Trump signed into law the Cybersecurity and Infrastructure Security Agency Act of 2018. This landmark legislation elevates the mission of the former National Protection and Programs Directorate (NPPD) within DHS and establishes the Cybersecurity and Infrastructure Security Agency (CISA).
Homeland Security | 2018-11-16
The U.S. House of Representatives passed the CISA bill that creates a new cybersecurity agency at the Department of Homeland Security (DHS).

In October, the Senate passed the Cybersecurity and Infrastructure Security Agency (CISA) Act (H.R. 3359), now the Congress passed the legislation unanimously and it is going to be signed by the President.
Security Affairs | 2018-11-16
Popular drone maker DJI exposed user accounts to unauthorized access along with information that passes through the vendor's digital infrastructure; this includes flight logs, videos and images captured by the devices, live camera and microphone feed, and flight map.
BC.com | 2018-11-09
The National Institute of Standards and Technology (NIST) is planning to use Artificial Intelligence to assign the CVSS scores to reported vulnerabilities.
Security Affairs | 2018-11-06
Memory handling issues in U-Boot open-source bootloader for embedded devices make possible multiple exploitation techniques that lead to arbitrary code execution.

U-Boot, short for the Universal Boot Loader, is a first-stage and second-stage bootloader. It is responsible for the initial hardware configuration and loading the operating system (OS) kernel.
BC.conm | 2018-11-05