{"id":17771,"date":"2025-03-17T15:32:02","date_gmt":"2025-03-17T14:32:02","guid":{"rendered":"https:\/\/immune.institute\/?post_type=proyecto&#038;p=17771"},"modified":"2025-10-07T10:24:29","modified_gmt":"2025-10-07T08:24:29","slug":"revolve-ciberseguridad-avanzada-vehiculos-conectados","status":"publish","type":"proyectos","link":"https:\/\/immune.institute\/en\/proyectos\/revolve-ciberseguridad-avanzada-vehiculos-conectados\/","title":{"rendered":"Revolve: Advanced cybersecurity for connected vehicles"},"content":{"rendered":"<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-f72ede8d wp-block-columns-is-layout-flex\" style=\"margin-top:0;margin-bottom:0\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"wp-block-paragraph\">Cybersecurity tends to focus on digital devices for work or leisure, such as computers or mobile phones, but it needs to go beyond that. The automotive industry is becoming increasingly connected and reliant on new technologies, so it also needs protection against attacks and fraud.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The increasing complexity of in-vehicle systems, coupled with their constant connection to the internet, has given rise to new cybersecurity threats. Revolve is working to detect and combat them through advanced technological solutions.<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"card card-light wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-accent-1-color\">Carried out by<\/mark><\/strong> <a href=\"https:\/\/www.linkedin.com\/in\/fernandoramirezg\/?utm_source=share&amp;utm_campaign=share_via&amp;utm_content=profile&amp;utm_medium=ios_app\" target=\"_blank\" rel=\"noopener\">Fernando Ramirez<\/a><\/p>\n\n\n\n<p class=\"card card-light wp-block-paragraph\"><strong>Programme<\/strong> <a href=\"Cybertalent: Programa de emprendimiento en Ciberseguridad | En colaboraci\u00f3n con el Instituto Nacional de Ciberseguridad (INCIBE)\"><\/a><a href=\"https:\/\/cybertalent.immune.institute\/\">Cybertalent: Cybersecurity Entrepreneurship Programme<\/a> | In collaboration with the National Institute for Cybersecurity (INCIBE)<\/p>\n\n\n\n<p class=\"card card-light wp-block-paragraph\"><strong>Technologies<\/strong> Threat Scanner | Antivirus | Remote Access<\/p>\n<\/div>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\">What is the motivation? <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">La incorporaci\u00f3n de nuevas tecnolog\u00edas en los veh\u00edculos mejora la comodidad, pero tambi\u00e9n abre puertas a ciberataques. Revolve se especializa en proteger estos sistemas y mitigar los riesgos para sus clientes.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Program aims <\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Evitar accesos no autorizados<\/strong> a sistemas internos que puedan obtener datos personales y amenazar la privacidad de los ocupantes del veh\u00edculo.<\/li>\n\n\n\n<li><strong>Proteger los sistemas de accesos remotos <\/strong>por parte de atacantes que pueden derivar en la p\u00e9rdida de control del veh\u00edculo sin posibilidad de recuperarlo.<\/li>\n\n\n\n<li><strong>Lograr que los sistemas de conducci\u00f3n aut\u00f3noma funcionen<\/strong> de manera correcta, evitando que se confundan o que pongan en riesgo a los ocupantes.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"861\" height=\"400\" src=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-095729.png\" alt=\"\" class=\"wp-image-17795\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-095729.png 861w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-095729-256x119.png 256w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-095729-512x238.png 512w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-095729-768x357.png 768w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-17-095729-18x8.png 18w\" sizes=\"(max-width: 861px) 100vw, 861px\" \/><\/figure>\n<\/div>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<h2 class=\"wp-block-heading\">Development <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">The process of addressing these problems includes the creation of three levels of protection:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Threat scanner<\/strong>It is dedicated to a constant analysis of the vehicle. If it detects a threat, it activates an antivirus to protect the systems.<\/li>\n\n\n\n<li><strong>Second line of defence<\/strong>In case the threat is not detected or the antivirus fails to stop it, a two-stage security measure is activated. During the first phase, the user will be able to access the system via a mobile device, which will allow him to identify the threat and safely disable the car. In the second phase, all external inputs will be blocked, maintaining only the basic driving functionality of the vehicle.<\/li>\n\n\n\n<li><strong>Additional layers of security<\/strong>A vehicle has many individual elements that require specific treatment. All those with known vulnerabilities, such as third-party applications, electronic key fobs or even the brake circuitry, have protections specially designed for them.<\/li>\n<\/ul>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Results <\/h2>\n\n\n\n<p class=\"wp-block-paragraph\">La protecci\u00f3n en tiempo real evita que los clientes sean v\u00edctimas de ciberataques que les puedan poner en peligro mientras el veh\u00edculo est\u00e1 en funcionamiento, as\u00ed como de ataques m\u00e1s habituales como robos de datos o accesos no permitidos.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" width=\"1024\" height=\"562\" src=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-14-140630-1024x562.png\" alt=\"\" class=\"wp-image-17781\" srcset=\"https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-14-140630-1024x562.png 1024w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-14-140630-256x140.png 256w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-14-140630-512x281.png 512w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-14-140630-768x421.png 768w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-14-140630-1536x843.png 1536w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-14-140630-18x10.png 18w, https:\/\/immune.institute\/wp-content\/uploads\/2025\/03\/Captura-de-pantalla-2025-03-14-140630.png 1885w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\" style=\"margin-top:var(--wp--preset--spacing--50);margin-bottom:var(--wp--preset--spacing--50)\">\n<p class=\"wp-block-paragraph\">Los veh\u00edculos conectados introducen retos como la conducci\u00f3n aut\u00f3noma, que exige protecciones en tiempo real. Revolve garantiza esta seguridad para que los clientes solo se preocupen de disfrutar de su coche.<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Internet-connected devices are no longer just mobiles and computers, but vehicles have joined this group. Revolve proposes its protection so that customers only have to enjoy their vehicle and leave cybersecurity in the hands of experts.<\/p>","protected":false},"featured_media":17811,"menu_order":0,"template":"","area":[245,247],"class_list":["post-17771","proyectos","type-proyectos","status-publish","has-post-thumbnail","hentry","area-cyber","area-emprendimiento"],"acf":[],"_links":{"self":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos\/17771","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos"}],"about":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/types\/proyectos"}],"version-history":[{"count":0,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/proyectos\/17771\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media\/17811"}],"wp:attachment":[{"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/media?parent=17771"}],"wp:term":[{"taxonomy":"area","embeddable":true,"href":"https:\/\/immune.institute\/en\/wp-json\/wp\/v2\/area?post=17771"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}