November 28, 2017 By David Strom 2 min read

Israel is becoming a major center for connected car research. Fueled by government-backed military research, test labs established by automakers and numerous connected car startups, the country has attracted top talent from around the world and provided innovative technologies in automotive cybersecurity.

The History of Connected Car Research in Israel

General Motors was one of the first major car manufacturers to come to Israel. Since then, almost every manufacturer has built its own testing facility there. But there are plenty of others who have come to the startup nation.

Delphi, the automotive parts supplier, has invested heavily in Israeli connected car startups, such as Otonomo, an automotive data services company; Innoviz, a laser sensor vendor for self-driving cars; and Valens, a chip-maker. Similarly, Porsche invested an eight-figure sum in the Israeli venture capitalist funds of Magma and Grove, which are funding numerous connected car startups. Earlier this year, Honda and Volvo established an $8 million startup accelerator called DRIVE in Tel Aviv to further connected car work. And then there is Uber’s $680 million acquisition of Israeli autonomous trucking startup Otto last summer. All of this investment aims to make connected cars operate more securely.

“What makes cars so vulnerable to attack is that they are such complex systems,” said Yaron Wolfsthal, head of the IBM research center in Beer Sheva, Israel, according to Reuters.

This past October, Wolfsthal spoke at the Cyber Security Workshop for Future Smart Mobility conference in Beer Sheva, where he and other experts discussed connected car development, including vulnerable sensors, insufficient testing, integration of different networks and other security issues. According to Tal Oron-Gilad, a professor at Ben-Gurion University (BGU) of human factors engineering, who also spoke at the conference, part of the problem relates to understanding what kind of cyber situational awareness drivers should have, if any.

A Nexus of Cybersecurity Research

During the conference, a partnership between BGU, Cymotive Technologies, Harman/Samsung, Deutsche Telekom Innovation Laboratories and venture capital firm Jerusalem Venture Partners (JVP) announced that it was building the world’s first automotive cyber test track in Beer Sheva. Other test tracks have been built around the world, but this is the first one designed specifically for cyber purposes. The track will be used to test smart mobility technologies and develop international standards, along with implementations from various automakers from around the world. The track builds on a nexus of cybersecurity research that has arisen in the Israeli desert, about an hour south of Tel Aviv.

Israel has invested significant funds in automotive research, according to Will Simon, the president of the U.S.-Israel Transportation Innovation Center. “The connected car has become the poster child for IoT insecurity and is motivating a lot of research,” he said at the conference. “Israel wants to move away from fossil fuels, and there are now hundreds of mobility companies based there,” including EcoMotion, Guardknox and the country’s first venture capitalist fund dedicated to connected cars, Maniv. “It is more an exception of who in the connected car space isn’t working in Israel these days,” Simon said.

Bridging Innovation and Security

A recent study by Black Duck Software noted that, because smart automobile manufacturers have been “focusing their attention on differentiating features, the disparity between innovation and security is growing at an accelerated speed.” With so much investment in connected car research and development, Israel is leading the way in the effort to make the roads safer for smart car operators around the world.

Learn how IBM X-Force Red helps protect connected cars

More from Application Security

PixPirate: The Brazilian financial malware you can’t see

10 min read - Malicious software always aims to stay hidden, making itself invisible so the victims can’t detect it. The constantly mutating PixPirate malware has taken that strategy to a new extreme. PixPirate is a sophisticated financial remote access trojan (RAT) malware that heavily utilizes anti-research techniques. This malware’s infection vector is based on two malicious apps: a downloader and a droppee. Operating together, these two apps communicate with each other to execute the fraud. So far, IBM Trusteer researchers have observed this…

From federation to fabric: IAM’s evolution

15 min read - In the modern day, we’ve come to expect that our various applications can share our identity information with one another. Most of our core systems federate seamlessly and bi-directionally. This means that you can quite easily register and log in to a given service with the user account from another service or even invert that process (technically possible, not always advisable). But what is the next step in our evolution towards greater interoperability between our applications, services and systems?Identity and…

Audio-jacking: Using generative AI to distort live audio transactions

7 min read - The rise of generative AI, including text-to-image, text-to-speech and large language models (LLMs), has significantly changed our work and personal lives. While these advancements offer many benefits, they have also presented new challenges and risks. Specifically, there has been an increase in threat actors who attempt to exploit large language models to create phishing emails and use generative AI, like fake voices, to scam people. We recently published research showcasing how adversaries could hypnotize LLMs to serve nefarious purposes simply…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today