About this event
Modern vehicles are increasingly software-defined β and AUTOSAR plays a central role in this ecosystem. Yet, analyzing AUTOSAR environments directly from raw firmware remains a major challenge for many organizations.
In this webinar, ONEKEY demonstrates how to extract AUTOSAR components directly from binary firmware, automatically generate a Software Bill of Materials (SBOM), and map identified components to known vulnerabilities using both public and private sources.
You will gain a practical understanding of how AUTOSAR components are structured, how they can be reliably detected at the binary level, and how to bridge the gap between embedded automotive software and modern vulnerability management using Package URLs (PURLs).
What youβll learn in this 45-minute session
Who should attend?
Secure your spot!
This webinar is designed for professionals who want to better understand how to move from raw firmware to actionable security insights in AUTOSAR-based systems.
π Register now to secure your spot.
Canβt join live? No problem β register anyway and receive the on-demand recording after the session.
Hosted by
Alexander specializes in IoT, Cybersecurity, CRA, SBOM, SaaS, and PaaS. He drives innovation and tech integration, ensuring secure and efficient environments. His expertise supports dynamic scaling and cyber resilience in digital transformation.
Quentin Kaiser is an ex-penetration tester who turned binary analysis nerd. He's currently working as a security researcher at the ONEKEY Research Lab, where he focuses on binary exploitation of embedded devices and bug finding automation within large firmware.
ONEKEY is a specialist for Product Cybersecurity for IoT & OT. Using automatically generated "Digital Twins" and "Software Bill of Materials" of devices, ONEKEY analyzes firmware for security vulnerabilities & compliance violations, without source code, device, or network access.