Part 2 — Automotive Software Security: Beyond Compliance, Toward Proof
Follow-up to Part 1: Translating regulation into runtime evidence. If you haven't read that yet, visit here.
From Checklists to Context
Regulations define what must exist.
Runtime intelligence proves whether it actually works.
Kodem’s research focuses on bridging that divide.
The Compliance Baseline
The next stage of maturity is runtime validation of each control.
Runtime Evidence as Compliance Currency
Kodem research across production fleets shows that most teams cannot differentiate between potential vulnerabilities and executed ones.
Using eBPF-based observability and memory correlation, runtime telemetry can demonstrate:
- Which vulnerable functions actually executed
- Which ECUs invoked unsafe calls
- Whether an update introduced exploitable behavior
- The mean remediation time from detection to deployment
Runtime data converts compliance from static documentation into verifiable proof.
Control Mapping, Revisited
From Secure Development to Executed Securely
Evidence-based security requires three data layers:
- Static and Reachability Analysis – identifies exposed code paths
- Runtime Analysis – confirms execution in production
- Exploit Intelligence – maps observed behavior to adversary TTPs
Together they form a continuous validation loop for automotive software integrity.
Readiness Benchmarks for 2025
- TARA coverage for every ECU and connected service
- 100 % of updates cryptographically signed and telemetry-verified
- Vulnerabilities tracked until runtime confirmation of remediation
- Supplier modules continuously monitored within the CSMS boundary
- Unified evidence trail spanning safety and security systems
Research Directions
Current Kodem research focuses on:
- Efficient kernel-level sensors for embedded automotive OSs
- Cross-ECU exploit-chain reconstruction and memory forensics
- Automated compliance evidence pipelines aligned to R155 audits
SUMS adversarial simulation frameworks for OTA security testing
Conclusion
Regulation established the baseline.
Runtime proof defines leadership.
Kodem continues to investigate how runtime telemetry and exploit intelligence can provide measurable assurance that vehicle software executes securely.
References
- European Commission. (2024). Cyber Resilience Act: Product cybersecurity requirements for digital elements.
- International Organization for Standardization. (2021). ISO/SAE 21434: Road vehicles – Cybersecurity engineering.
- International Organization for Standardization. (2023). ISO 24089: Road vehicles – Software update engineering.
- National Highway Traffic Safety Administration. (2022). Cybersecurity best practices for the safety of modern vehicles (Report DOT HS 813 417).
- United Nations Economic Commission for Europe. (2021). UN Regulation No. 155: Cybersecurity and cybersecurity management system requirements.
- United Nations Economic Commission for Europe. (2021). UN Regulation No. 156: Software update processes and management systems.
- Verband der Automobilindustrie (VDA). (2023). Trusted Information Security Assessment Exchange (TISAX) Assessment Levels Guide.
- Kodem Research Team. (2025). Runtime intelligence and exploit-chain validation in connected automotive systems.
More blogs
Kai at Work: A Day in the Life of an AI AppSec Engineer
Kai, Kodem’s secure-by-design AI AppSec Engineer, is integrated directly into the platform to deliver contextualized and actionable answers precisely when AppSec teams need them. By converting your existing security data into conversational intelligence, Kai eliminates the need for hours of manual investigation and context-switching. You can now ask questions as you would to a senior, humble, and tireless engineer.

CVE-2025-55182: Remote Code Execution in React Server Components
On December 3, 2025, the React and Vercel teams disclosed CVE-2025-55182, a critical remote-code-execution (RCE) vulnerability (CVSS 10) affecting React Server Components (RSC) as used in the Flight protocol implementation.
Shai Hulud 2.0: What We Know About the Ongoing NPM Supply Chain Attack
A new wave of supply chain compromise is unfolding across the open-source ecosystem. Multiple security vendors, including Aikido Security and Wiz have confirmed that the threat actor behind the earlier Shai Hulud malware campaign has resurfaced. This time, compromising NPM accounts, GitHub repositories and widely-used packages associated with Zapier and the ENS (Ethereum Name Service).
A Primer on Runtime Intelligence
See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.
Platform Overview Video
Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.
The State of the Application Security Workflow
This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.
.png)
Get real-time insights across the full stack…code, containers, OS, and memory
Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

Stay up-to-date on Audit Nexus
A curated resource for the many updates to cybersecurity and AI risk regulations, frameworks, and standards.

