Israel is becoming a major center for connected car research. Fueled by government-backed military research, test labs established by automakers and numerous connected car startups, the country has attracted top talent from around the world and provided innovative technologies in automotive cybersecurity.

The History of Connected Car Research in Israel

General Motors was one of the first major car manufacturers to come to Israel. Since then, almost every manufacturer has built its own testing facility there. But there are plenty of others who have come to the startup nation.

Delphi, the automotive parts supplier, has invested heavily in Israeli connected car startups, such as Otonomo, an automotive data services company; Innoviz, a laser sensor vendor for self-driving cars; and Valens, a chip-maker. Similarly, Porsche invested an eight-figure sum in the Israeli venture capitalist funds of Magma and Grove, which are funding numerous connected car startups. Earlier this year, Honda and Volvo established an $8 million startup accelerator called DRIVE in Tel Aviv to further connected car work. And then there is Uber’s $680 million acquisition of Israeli autonomous trucking startup Otto last summer. All of this investment aims to make connected cars operate more securely.

“What makes cars so vulnerable to attack is that they are such complex systems,” said Yaron Wolfsthal, head of the IBM research center in Beer Sheva, Israel, according to Reuters.

This past October, Wolfsthal spoke at the Cyber Security Workshop for Future Smart Mobility conference in Beer Sheva, where he and other experts discussed connected car development, including vulnerable sensors, insufficient testing, integration of different networks and other security issues. According to Tal Oron-Gilad, a professor at Ben-Gurion University (BGU) of human factors engineering, who also spoke at the conference, part of the problem relates to understanding what kind of cyber situational awareness drivers should have, if any.

A Nexus of Cybersecurity Research

During the conference, a partnership between BGU, Cymotive Technologies, Harman/Samsung, Deutsche Telekom Innovation Laboratories and venture capital firm Jerusalem Venture Partners (JVP) announced that it was building the world’s first automotive cyber test track in Beer Sheva. Other test tracks have been built around the world, but this is the first one designed specifically for cyber purposes. The track will be used to test smart mobility technologies and develop international standards, along with implementations from various automakers from around the world. The track builds on a nexus of cybersecurity research that has arisen in the Israeli desert, about an hour south of Tel Aviv.

Israel has invested significant funds in automotive research, according to Will Simon, the president of the U.S.-Israel Transportation Innovation Center. “The connected car has become the poster child for IoT insecurity and is motivating a lot of research,” he said at the conference. “Israel wants to move away from fossil fuels, and there are now hundreds of mobility companies based there,” including EcoMotion, Guardknox and the country’s first venture capitalist fund dedicated to connected cars, Maniv. “It is more an exception of who in the connected car space isn’t working in Israel these days,” Simon said.

Bridging Innovation and Security

A recent study by Black Duck Software noted that, because smart automobile manufacturers have been “focusing their attention on differentiating features, the disparity between innovation and security is growing at an accelerated speed.” With so much investment in connected car research and development, Israel is leading the way in the effort to make the roads safer for smart car operators around the world.

Learn how IBM X-Force Red helps protect connected cars

More from Application Security

Securing Your SAP Environments: Going Beyond Access Control

Many large businesses run SAP to manage their business operations and their customer relations. Security has become an increasingly critical priority due to the ongoing digitalization of society and the new opportunities that attackers exploit to achieve a system breach. Recent attacks related to corrupt data, stealing personal information and escalating privileges for remote code execution all highlight the new and varied entry points threat actors have taken advantage of. Attackers with the appropriate skills could be able to exploit…

Does Follina Mean It’s Time to Abandon Microsoft Office?

As a freelance writer, I spend most of my day working in Microsoft Word. Then, I send drafts to clients and companies across the globe. So, news of the newly discovered Microsoft Office vulnerability made me concerned about the possibility of accidentally spreading malware to my clients. I take extra precautions to ensure that I’m not introducing risk to my clients. Still, using Microsoft Office was something I did many times a day without a second thought. I brought up…

3 Reasons Why Technology Integration Matters

As John Donne once wrote, “No man is an island entire of itself.” With digitalization bridging any distance, the same logic could be applied to tech. Threat actors have vast underground forums for sharing their intelligence, while security professionals remain tight-lipped in a lot of data breach cases. Much like the way a vaccine can help stop the spread of infectious diseases, sharing threat intelligence and defense strategies can help to establish a more secure future for everyone.  So what…

Why Your Success Depends on Your IAM Capability

It’s truly universal: if you require your workforce, customers, patients, citizens, constituents, students, teachers… anyone, to register before digitally accessing information or buying goods or services, you are enabling that interaction with identity and access management (IAM). Many IAM vendors talk about how IAM solutions can be an enabler for productivity, about the return on investment (ROI) that can be achieved after successfully rolling out an identity strategy. They all talk about reduction in friction, improving users' perception of the…