Part 2 — Automotive Software Security: Beyond Compliance, Toward Proof

Follow-up to Part 1: Translating regulation into runtime evidence. If you haven't read that yet, visit here.

Mahesh Babu
November 12, 2025
November 12, 2025

0 min read

Compliance
Part 2 — Automotive Software Security: Beyond Compliance, Toward Proof

From Checklists to Context

Regulations define what must exist.

Runtime intelligence proves whether it actually works.

Kodem’s research focuses on bridging that divide.

The Compliance Baseline

The next stage of maturity is runtime validation of each control.

Runtime Evidence as Compliance Currency

Kodem research across production fleets shows that most teams cannot differentiate between potential vulnerabilities and executed ones.

Using eBPF-based observability and memory correlation, runtime telemetry can demonstrate:

  • Which vulnerable functions actually executed
  • Which ECUs invoked unsafe calls
  • Whether an update introduced exploitable behavior
  • The mean remediation time from detection to deployment

Runtime data converts compliance from static documentation into verifiable proof.

Control Mapping, Revisited

From Secure Development to Executed Securely

Evidence-based security requires three data layers:

  1. Static and Reachability Analysis – identifies exposed code paths
  2. Runtime Analysis – confirms execution in production
  3. Exploit Intelligence – maps observed behavior to adversary TTPs

Together they form a continuous validation loop for automotive software integrity.

Readiness Benchmarks for 2025

  • TARA coverage for every ECU and connected service
  • 100 % of updates cryptographically signed and telemetry-verified
  • Vulnerabilities tracked until runtime confirmation of remediation
  • Supplier modules continuously monitored within the CSMS boundary
  • Unified evidence trail spanning safety and security systems

Research Directions

Current Kodem research focuses on:

  • Efficient kernel-level sensors for embedded automotive OSs
  • Cross-ECU exploit-chain reconstruction and memory forensics
  • Automated compliance evidence pipelines aligned to R155 audits

SUMS adversarial simulation frameworks for OTA security testing

Conclusion

Regulation established the baseline.

Runtime proof defines leadership.

Kodem continues to investigate how runtime telemetry and exploit intelligence can provide measurable assurance that vehicle software executes securely.

References

  • European Commission. (2024). Cyber Resilience Act: Product cybersecurity requirements for digital elements.
  • International Organization for Standardization. (2021). ISO/SAE 21434: Road vehicles – Cybersecurity engineering.
  • International Organization for Standardization. (2023). ISO 24089: Road vehicles – Software update engineering.
  • National Highway Traffic Safety Administration. (2022). Cybersecurity best practices for the safety of modern vehicles (Report DOT HS 813 417).
  • United Nations Economic Commission for Europe. (2021). UN Regulation No. 155: Cybersecurity and cybersecurity management system requirements.
  • United Nations Economic Commission for Europe. (2021). UN Regulation No. 156: Software update processes and management systems.
  • Verband der Automobilindustrie (VDA). (2023). Trusted Information Security Assessment Exchange (TISAX) Assessment Levels Guide.
  • Kodem Research Team. (2025). Runtime intelligence and exploit-chain validation in connected automotive systems.
Table of contents

Related blogs

AppSec for Healthcare Providers: Securing Hospitals & Health Systems in a Cloud-Driven Era

Healthcare providers are at the forefront of delivering critical care, but increasingly depend on digital systems, from EHR platforms to telehealth portals, to operate effectively. As hospitals and health systems modernize IT landscapes, the attack surface has expanded dramatically, with cloud apps, SaaS infrastructure, and interoperability mandates introducing both opportunity and risk. AppSec isn’t just a technical concern, it's foundational to patient trust, regulatory compliance and clinical continuity.

February 9, 2026

2

AppSec for Health SaaS & Health Tech Companies: Building Trust with Secure Platforms

Health SaaS and Health Tech vendors are powering the digital transformation of care delivery, administrative workflows, revenue cycles, and patient engagement. However, with great reach comes great risk: every SaaS application holds sensitive health data and must navigate both market expectations and strict regulations. Building AppSec into your product isn’t optional, it’s a market differentiator and a trust signal.

February 9, 2026

1

AppSec for Payers: Insurance & Healthcare Payers Must Secure the Ecosystem

Healthcare payers, insurance companies and health plans, sit at the nexus of clinical services, member data, and financial risk. As digital tools take on more responsibility for claims processing, provider network management, and member engagement, payer platforms become high-value targets for attackers. AppSec for payers isn’t just about securing code; it’s about protecting financial integrity, member data and regulatory compliance while enabling agile plan operations.

February 9, 2026

1

Stop the waste.
Protect your environment with Kodem.

Get a personalized demo
Get a personalized demo

A Primer on Runtime Intelligence

See how Kodem's cutting-edge sensor technology revolutionizes application monitoring at the kernel level.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

Platform Overview Video

Watch our short platform overview video to see how Kodem discovers real security risks in your code at runtime.

5.1k
Applications covered
1.1m
False positives eliminated
4.8k
Triage hours reduced

The State of the Application Security Workflow

This report aims to equip readers with actionable insights that can help future-proof their security programs. Kodem, the publisher of this report, purpose built a platform that bridges these gaps by unifying shift-left strategies with runtime monitoring and protection.

Get real-time insights across the full stack…code, containers, OS, and memory

Watch how Kodem’s runtime security platform detects and blocks attacks before they cause damage. No guesswork. Just precise, automated protection.

Combined author
Mahesh Babu
Publish date

0 min read

Compliance