By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: Enabled Testing Methodologies: Secure Development Lifecycle (SDL) Testing and Penetration Testing | HackerNoon
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > Enabled Testing Methodologies: Secure Development Lifecycle (SDL) Testing and Penetration Testing | HackerNoon
Computing

Enabled Testing Methodologies: Secure Development Lifecycle (SDL) Testing and Penetration Testing | HackerNoon

News Room
Last updated: 2025/03/15 at 12:42 PM
News Room Published 15 March 2025
Share
SHARE

Table of Links

Abstract and 1 Introduction

2. Current Security Testing Platforms

2.1. Recent progress

3. A New Testing Platform and 3.1. Testing platform roles

3.2. Web-based remote access

3.3. Testbed setup

4. Enabled Testing Methodologies

4.1. Secure Development Lifecycle (SDL) testing and 4.2. Penetration testing

4.3. Research testing

5. Conclusion & Outlook, and References

4. Enabled Testing Methodologies

4.1. Secure Development Lifecycle (SDL) testing

VSEC Test aims to integrate all methods of vehicle cybersecurity testing into a single easy-to-use platform. As discussed above, a portion of cybersecurity verification, as required by the ISO/SAE standard, is no different than software and systems verification required by other industry standards. The remote capabilities and test management features offered by VSEC Test allows test engineers to design and set up the test procedures one time in order to run on a schedule or triggered by other tools as a part of CI/CD frameworks. This centralized platform for test procedures and results can potentially be used to exchange data throughout the supply chain and ensure consistent verification test coverage for the development life cycle of a vehicle.

For example, we perform continuous cybersecurity functional testing on components with over-the-air (OTA) update functionality as a service. We set up the test rack and develop the test procedures once on VSEC Test, and it is performed on a periodic schedule and also whenever a new software update is applied. Continuous functional testing against cybersecurity requirements effectively identified vulnerabilities that were overlooked during the development cycle. In addition, VSEC Test provides a set of built-in tests as a preliminary scan for known weaknesses and vulnerabilities, which can be used directly against a target vehicle or ECU. This scan can allow users to easily and quickly determine if there are large gaps in measures protecting the interface or if there are known exploits that will work on the target vehicle or ECU.

4.2. Penetration testing

Pentesting approaches. Most pentest engagements start with an exploratory phase, where the tester aims to discover as much information about the target as possible. The duration and effort in this phase is largely determined by the amount of information available to the tester. VSEC Test allows users to build a pool of their own test scripts or use built-in discovery scans specifically targeting automotive networks, including protocols such as UDS and XCP. These tests can be queued up and ran in the background or over the weekend, saving time and allowing a team to focus on more technically challenging tasks or other projects. The web interface allows testers to access and check on test status at any time from anywhere to determine the next step of action.

Partner Pentesting. A major difficulty in accessing the talent pool of world-class vehicle penetration testers is physical location. The VSEC Test platform enables any remote engineer with credentials to connect to the bench and handle any physical interactions with the component and remotely script and execute tests from VSEC Test. We call this Partner Pentesting.

To evaluate the Partner Pentesting concept, we set up a scenario as depicted in Figure 2, where a remote wireless penetration testing specialist is working with a local test engineer to control a software-defined radio connected to the cloud and capture communication between the key fob and the car in addition to any vehicle network messages. The specialist then proceeds to study and decode the traffic, create scripts to attack the communication, and work together with the local test engineer to validate findings. In this case, without physical access to the vehicle and a local partner to perform tasks, it would have been very difficult to perform a meaningful penetration test against the vehicle’s wireless entry system.

Figure 2. The remote test engineer can access either a fully remote testing platform with access to multiple test beds or work collaboratively with an in-lab (i.e., local to the lab) test engineer for tests that require hands-on support. This Partner Pentesting method enables the technical specialist to focus on their testing strategies while leaving the hardware setup and physical controls to the lab technician/local test engineer.Figure 2. The remote test engineer can access either a fully remote testing platform with access to multiple test beds or work collaboratively with an in-lab (i.e., local to the lab) test engineer for tests that require hands-on support. This Partner Pentesting method enables the technical specialist to focus on their testing strategies while leaving the hardware setup and physical controls to the lab technician/local test engineer.

Side-channel analysis. On the other hand, we have other benches in the lab can be tested with little to no user interactions. For these targets, fully remote networklevel penetration test with a test bench setup can achieve results on-par with on-site engagements. However, we found that more hands-on penetration testing procedures such as hardware analysis and side channel attacks are still very difficult to perform without having an onsite specialist. As a result, while acceptable for many scenarios, fully remote penetration testing remains very limited for certain configurations due to manual activation required for physical interfaces and required hardware and tooling interaction for certain procedures. However, we are able to make progress with a Partner Pentesting setup that provides assistance from onsite personnel and achieves comparable outcomes as a fully onsite engagement.

Authors:

(1) Sekar Kulandaivel, Robert Bosch LLC — Research and Technology Center;

(2) Wenjuan Lu, Block Harbor Cybersecurity;

(3) Brandon Barry, Block Harbor Cybersecurity;

(4) Jorge Guajardo, Robert Bosch LLC — Research and Technology Center.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article Apple launches new Surveyor app to help improve Apple Maps
Next Article Say Cheese! 5 Reasons Why Digital Cameras Are Trendy (Again)
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Samsung BESPOKE Smart Refrigerators Can Now Recognise Different Voices
Software
Popular Freeview TV channel warns viewers over big change coming in DAYS
News
visionOS 26 widgets are also a hint at Apple’s next home product – 9to5Mac
News
Here’s What Leaks Reveal About the Features and Specifications
Mobile

You Might also Like

Computing

Li Auto shares surge after teasing its first all-electric SUV with new picture · TechNode

1 Min Read
Computing

9 Best Instagram Reels Editing Apps on the Market in 2025

1 Min Read
Computing

How AI Is Changing Social Media Marketing and How Brands Should Adapt

17 Min Read
Computing

Behind the Scenes of Self-Hosting a Language Model at Scale | HackerNoon

28 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?