Automotive Semiconductor Cybersecurity: UN R155, ISO/SAE 21434, TARA, HSM

Discover how UN R155, ISO/SAE 21434, TARA, and Hardware Security Modules (HSM) are shaping the future of automotive semiconductor cybersecurity.

1. Paradigm Shift in Automotive Semiconductor Cybersecurity

Today, cars are no longer simple mechanical devices. Whereas vehicles once relied mainly on engines and mechanical parts, they have now become IT platforms on wheels centered on numerous ECUs and software. As connected cars and autonomous driving proliferate, vehicles are continuously linked to external networks via wireless communication, offering new conveniences to drivers and passengers.

This connectivity, however, simultaneously creates new opportunities for attackers. In the past, hacking a vehicle typically required direct access via the OBD-II port; now, remote attacks are possible through wireless channels such as cellular, Wi-Fi, and V2X. Attackers can even target specific models at scale and threaten critical control functions like braking or steering. Consequently, cybersecurity at the semiconductor level is no longer optional—it is essential.

2. Regulatory Environment and Its Industry Impact

In response, strong regulations have emerged across the global automotive industry. Chief among them is UN R155, which since 2022 has been a mandatory condition for new-vehicle type approval in major markets such as Europe, Japan, and Korea. This regulation requires OEMs to establish a Cybersecurity Management System (CSMS) and to manage threats throughout the vehicle lifecycle.

A notable characteristic is that the regulation does not target only OEMs. Through a “regulatory cascade” across the supply chain, semiconductor companies must also certify their own security processes to participate in the market. In other words, cybersecurity has been elevated from an individual feature to a criterion for business eligibility in the automotive sector.

In parallel, the international standard ISO/SAE 21434 has been introduced. If UN R155 defines what must be done, ISO/SAE 21434 explains how to do it. It provides a framework for managing cybersecurity across the entire vehicle lifecycle—from design to decommissioning— guiding organizations to perform security activities suited to their products through a risk-based approach rather than prescribing specific technologies.

3. The Role of TARA (Threat Analysis and Risk Assessment)

A core activity in ISO/SAE 21434 is TARA. Rather than merely listing threats, TARA systematically analyzes which assets may be attacked, the potential impacts if an attack succeeds, and the likelihood of success.

TARA Workflow

Step

Key Activities

Deliverables

Asset Identification

Catalog data, functions, and resources that must be protected

Asset inventory

Threat Scenarios

Derive threats using methods such as STRIDE

Threat scenario list

Impact Assessment

Analyze impacts on safety, financials, operations, and privacy

Impact ratings

Attack Path Analysis

Define the steps an attacker could take

Attack path diagrams

Likelihood Assessment

Evaluate time, knowledge, equipment, and opportunity

Likelihood ratings

Risk Determination

Assess risk = impact × likelihood

Risk register

Risk Treatment

Decide on mitigation, avoidance, transfer, or acceptance

Cybersecurity goals

 

Through this process, organizations move beyond the vague notion that “security is needed” to concretely identify which functions must be protected and what technical measures are required.
For example, if TARA confirms that an attacker could manipulate the CAN bus to control the steering ECU, a corresponding cybersecurity goal would be: “Unauthorized messages must be blocked.” During development, this goal is then decomposed into implementable requirements.

Thus, TARA serves as the compass for security development and underpins all subsequent activities.

4. The Need for a Secure Development Lifecycle (SDLC)

In the past, security was often added after development, but retrofitting vulnerabilities late in the process incurs far greater time and cost. The Secure Development Lifecycle (SDLC) addresses this by integrating security from the earliest stages—often referred to as a shift-left approach.

  • Requirements: Reflect TARA outcomes as explicit security requirements

  • Design: Apply principles such as least privilege and defense-in-depth

  • Implementation: Follow safe coding standards (e.g., MISRA C) and use static analysis tools

  • Testing: Employ fuzzing and penetration testing to uncover unforeseen vulnerabilities

  • Post-release: Maintain OTA updates, vulnerability management, and incident response

Security does not end at vehicle launch. New threats must be addressed via OTA, and vulnerability/incident processes must be operated continuously. In short, SDLC is a lifecycle-long approach to managing cybersecurity.

5. Hardware Root of Trust and HSM

Security cannot rely on software alone. Software can contain bugs and is susceptible to physical attacks. Therefore, ensuring security at the semiconductor level requires a Hardware Root of Trust (RoT).

This role is provided by the Hardware Security Module (HSM), which creates an isolated security domain within the chip to securely store cryptographic keys, accelerate cryptographic operations, and support secure boot so that only trusted code runs at startup.

Not every ECU requires the same security level. The EVITA project classifies HSMs into three tiers: Full, Medium, and Light. Gateways and V2X modules that interface with external networks should use Full HSM; internal domains such as powertrain and chassis can adopt Medium; and simple ECUs for sensors/actuators can use Light. This approach balances cost and performance.

6. Security Strategies of Leading Semiconductor Companies

The automotive semiconductor cybersecurity market is led by a few global players.

Overview Table

Company

Key Products

Security Features

Strengths

N Corp

S32G, EdgeLock

“4+1” security framework; HSE built-in

ISO/SAE 21434 process certification

I Corp

AURIX TC4x

EVITA Full HSM; integrated functional safety & security

First to obtain ISO/SAE 21434 certification

R Corp

RH850, R-Car

Scalable ICU-HSM

TÜV-based CSMS operations

 

N Corp proposes a “4+1” security framework that provides layered defense from external vehicle communications to internal ECU security. The S32G processors integrate an HSE security engine enabling secure boot, key management, and accelerated network security, while the EdgeLock portfolio delivers security services across the device lifecycle.

I Corp is well known for its AURIX microcontroller series, meeting both functional safety and cybersecurity requirements and being the industry’s first to secure ISO/SAE 21434 process certification. With EVITA Full HSM on-chip, it enables secure key management and cryptographic acceleration.

R Corp offers scalable solutions centered on RH850 MCUs and R-Car SoCs, applicable across diverse ECUs. Its in-house ICU-HSM supports secure boot, communication security, and software update security, with reliability reinforced by a TÜV-certified CSMS.

7. Strategy Going Forward

Automotive semiconductor cybersecurity is no longer a technical option but a baseline requirement for market participation. Compliance with UN R155 and ISO/SAE 21434 is essential, supported by TARA-based risk analysis, SDLC-driven security by design, and hardware-anchored protections such as HSM.

Without close collaboration among OEMs, Tier-1 suppliers, and semiconductor companies, survival in the market will be difficult. In the future, semiconductors without built-in security will have no place, and semiconductor-level security will be both the starting point of vehicle cybersecurity and a core competitive advantage.

Conclusion

Automotive semiconductor cybersecurity has become a core determinant of competitiveness across the industry, going beyond mere regulatory compliance or safety assurance. UN R155 and ISO/SAE 21434, TARA-based risk analysis, SDLC integration, hardware roots of trust, and the latest security solutions from leading semiconductor companies are all part of the same goal: delivering safe and trustworthy future vehicles.

Hermes Solution walks this path with you—helping organizations navigate complex regulations and technical demands. Beyond basic compliance, we partner with you to build tangible cybersecurity capabilities and become a leader in the era of future mobility.

Share this article:

Facebook
Twitter
LinkedIn
WhatsApp