The revolution of the automotive industry
connected cars will be on the roads by 2020
of data will be generated by an autonomous vehicle every 90 minutes
of today’s car owners will replace it with shared vehicles
market share of electric cars in 2030
Enigmatos provides solutions to the ever growing threat of vehicle hacking. We know that each car has its own unique digital dynamic signature. Two cars of the same model that rolled off the assembly line at the same time will have different signatures. By uploading all the vehicle’s communication data to our cloud and applying our proprietary machine learning algorithms we are able to generate each vehicle’s unique signature. We call it – Deep Car Identity Profiling™. We protect your car by allowing only valid and legal changes to the vehicle’s identity.
Enigmatos offers a dynamic, multilayered, behavior based detection and prevention system to protect the vehicle and its maintenance infrastructure from cyber security threats. Our solution addresses both existing and emerging vehicle architectures.
Enigmatos offers its customers variety of consulting services in the domain of automotive cyber security. Our top notch team of cyber security researchers and automotive experts harness their unique set of skills to challenge our customers’ infrastructure and vehicle’s architecture in order to assist them in building robust and secure vehicles.
Enigmatos in the news
- October 24, 2018 Meet Enigmatos: The Israeli startup defending your car from cyber attacks
- October 5, 2018 Enigmatos features on CCTV at the Paris Motor Show 2018
- October 8, 2018 La cybersécurité des véhicules, une priorité pour les constructeurs
- May 28, 2018 Siamo stati a Ecomotion 2018, la fiera israeliana sulla mobilità del futuro
- October 3, 2018 ועידת פריז: ספיד דייטינג במושב הקדמי
The Enigmatos Advantage
Uploading the vehicle’s communication data to our cloud provides us with the ability to map the vehicle’s topology. We are then able to detect any changes to this topology (including SW update) and ensure reliable and precise anomaly detection.
In order to protect the vehicle’s communication network, our in car rules engine – the CPD™ – is able to identify the source of each message. When combined with our ability to discover and map the vehicle’s topology, this patent pending technology allows only legal and valid messages, initiated through the ECU that is eligible to send them.
We at Enigmatos look at the bigger picture. In order to better protect vehicles we need to make sure that their maintenance ecosystem is protected as well and that its integrity is intact. Our ability to create a vehicle’s unique signature also provides us the means to create the required trust relationship between the vehicle and its maintenance ecosystem.
We investigate any event in the vehicle or a fleet of vehicles. All detected attack attempts are reported to the cloud for further forensic analysis by Security Operation Center (SOC) team. Our SOC team members use our proprietary analysis tools for further forensic investigation of the alarms and detection of patterns of massive threats.
A cyber solution needs to stay ahead of the hackers. The ability to update our detection policy based on new attacks discovered is essential to ensure the continuous safety of your vehicle. We use the inputs of our anomaly analysis and forensic analysis to update the detection policy of our in car rules engine.
Enigmatos founders believe the secret for success lies in the formation of a team of the top experts in cyber security, the automotive field (CAN BUS protocols, Ethernet, LIN BUS, FLEXRAY, etc. ), cloud management, algorithm development, Big Data analysis, statistics, electronics, communications, etc. This extraordinary team of highly experienced engineers and scientists is the key to devising our cutting edge technology solution.
13 Gan Rave Blvd., Yavne