ONEKEY invites you to their event

From Raw Firmware to Vulnerabilities: Demystifying AUTOSAR SBOM & Risk Mapping

About this event

Modern vehicles are increasingly software-defined β€” and AUTOSAR plays a central role in this ecosystem. Yet, analyzing AUTOSAR environments directly from raw firmware remains a major challenge for many organizations.

In this webinar, ONEKEY demonstrates how to extract AUTOSAR components directly from binary firmware, automatically generate a Software Bill of Materials (SBOM), and map identified components to known vulnerabilities using both public and private sources.

You will gain a practical understanding of how AUTOSAR components are structured, how they can be reliably detected at the binary level, and how to bridge the gap between embedded automotive software and modern vulnerability management using Package URLs (PURLs).

What you’ll learn in this 45-minute session

  • How AUTOSAR components are structured
  • Understand the architecture and key building blocks relevant for analysis
  • How to detect AUTOSAR components in binary firmware
  • Learn how component identification works without access to source code
  • How to generate SBOMs from firmware
  • See how software components can be extracted and structured into a usable SBOM
  • How to map components to vulnerabilities
  • Discover how identified components can be linked to known vulnerabilities using public and private sources
  • How PURLs enable scalable vulnerability management
  • Understand how Package URLs help standardize component identification across tools and databases

Who should attend?

  • Automotive cybersecurity teams
  • Product security & PSIRT teams
  • Embedded engineers & reverse engineers
  • Anyone working on SBOM, vulnerability management, or automotive compliance

Secure your spot!

This webinar is designed for professionals who want to better understand how to move from raw firmware to actionable security insights in AUTOSAR-based systems.

πŸ‘‰ Register now to secure your spot.

Can’t join live? No problem β€” register anyway and receive the on-demand recording after the session.

Hosted by

  • Team member
    T
    Alexander Hentschke Sales Manager @ ONEKEY GmbH

    Alexander specializes in IoT, Cybersecurity, CRA, SBOM, SaaS, and PaaS. He drives innovation and tech integration, ensuring secure and efficient environments. His expertise supports dynamic scaling and cyber resilience in digital transformation.

  • Team member
    T
    Quentin Kaiser Lead Security Researcher @ ONEKEY Gmbh

    Quentin Kaiser is an ex-penetration tester who turned binary analysis nerd. He's currently working as a security researcher at the ONEKEY Research Lab, where he focuses on binary exploitation of embedded devices and bug finding automation within large firmware.

ONEKEY

We automate software security & compliance of connected products at scale.

ONEKEY is a specialist for Product Cybersecurity for IoT & OT. Using automatically generated "Digital Twins" and "Software Bill of Materials" of devices, ONEKEY analyzes firmware for security vulnerabilities & compliance violations, without source code, device, or network access.