About the Author and This Research
Mirko De Vincentiis published this thesis-level research on arXiv in 2025, focusing on the systemic challenges of cybersecurity management in the automotive domain. His work spans intrusion detection on CAN bus networks, the application of traditional and quantum machine learning algorithms for threat identification, and the design of risk assessment models that align with international automotive security standards. While the research is presented as academic work with in-vitro experimental validation, its value to industry practitioners lies in its systematic literature review—which rigorously documents the fragmentation problem that plagues current automotive cybersecurity research and practice—and in the modular framework it proposes as a solution.
The timing of this publication is notable. In 2025, CISA and the U.S. Coast Guard issued advisory AA25-212A identifying persistent cyber hygiene weaknesses across critical infrastructure organizations, echoing De Vincentiis's finding that most existing security implementations address only one phase of the security lifecycle rather than an integrated whole. For Taiwanese automotive suppliers preparing for TISAX assessments or ISO/SAE 21434 audits, this convergence of academic and regulatory signals is a strong indicator that holistic security management frameworks are no longer optional.
ANDURIL: A Five-Dimensional Framework That Unifies Detection, Response, and Prevention
The central contribution of this research is the ANDURIL (Automotive Network Defense Unified Response Intrusion Limitation) model, which addresses a structural gap that has persisted in automotive cybersecurity research for years: the tendency to optimize for a single security phase while neglecting the other two.
Finding 1: The Three-Phase Integration Gap Is the Industry's Foundational Problem
Through a systematic literature review, De Vincentiis demonstrates that the overwhelming majority of automotive cybersecurity research focuses on one of three phases—Detection, Response, or Prevention—without integrating all three. Most published work concentrates on improving the accuracy of intrusion detection algorithms for CAN bus traffic, with far less attention paid to post-detection incident response procedures or proactive risk prevention frameworks. This finding has direct implications for Taiwanese suppliers: purchasing an intrusion detection system does not constitute compliance with ISO/SAE 21434's requirements for continuous cybersecurity activities, which explicitly require ongoing threat monitoring, incident response capability, and periodic risk reassessment throughout the vehicle lifecycle.
Finding 2: The ANDURIL Framework Offers a Modular Path to Integrated Compliance
The ANDURIL framework is structured around five dimensions, each encompassing Detection, Response, and Prevention operational units. Key technical components include: (1) traditional machine learning algorithms for CAN bus anomaly detection; (2) quantum machine learning (Quantum ML) algorithms benchmarked against traditional methods for detection speed and model accuracy; (3) a Security Operation Center (SOC)-based incident response model; (4) an attack risk assessment model designed to interface with the Threat Analysis and Risk Assessment (TARA) methodology required by ISO/SAE 21434; and (5) a web application to support decision-making during active attack scenarios. The modular design is deliberately scalable, allowing suppliers of different sizes to prioritize which dimensions to implement first based on available resources and the most pressing compliance deadlines.
Finding 3: Quantum ML Benchmarking Points to a Medium-Term Technology Roadmap
One of the more forward-looking elements of this research is its systematic comparison of traditional machine learning and quantum machine learning algorithms for CAN bus threat identification, evaluated on both detection time and model accuracy. This is among the first comparative studies of its kind in the automotive cybersecurity domain. For OEM manufacturers and Tier 1 suppliers developing technology roadmaps for 2026–2030, this benchmarking data provides an early-stage reference point for assessing when quantum computing-enhanced security tools might become operationally viable. The author honestly acknowledges that all experiments were conducted in vitro (laboratory conditions) and that in vivo validation on real embedded components remains necessary—a critical caveat that practitioners should weigh carefully when assessing the framework's current deployment readiness.
Strategic Implications for Taiwan's Automotive Supply Chain
The ANDURIL framework's publication intersects with several concurrent regulatory and market developments that are directly affecting Taiwan's automotive supplier ecosystem.
First, ISO/SAE 21434's continuous cybersecurity activity requirements cannot be satisfied by point solutions. Clauses 5 through 15 of ISO/SAE 21434 mandate ongoing threat monitoring, incident response, and risk reassessment across the vehicle lifecycle. The three-phase integration logic of ANDURIL maps directly onto this requirement, providing a structured rationale for why suppliers must invest in all three security phases rather than treating initial certification as the endpoint.
Second, UNECE WP.29 R155 requires CSMS coverage of post-production phases, which is the area most commonly neglected by Taiwanese suppliers. R155 explicitly requires OEMs and their supply chains to demonstrate cybersecurity management across development, production, and post-production stages. ANDURIL's SOC-oriented response model and attack risk assessment component directly address this post-production gap, providing a practical architecture for the ongoing monitoring and response capabilities that R155 auditors will scrutinize.
Third, TISAX assessments consistently identify incident response and supplier management as high-failure areas. TISAX, based on the VDA ISA framework, evaluates information security management practices that European automotive OEMs require of their supply chain partners. The incident response procedures supported by ANDURIL's Response operational unit align with the Security Incident Management requirements in TISAX, where Taiwanese suppliers frequently lose points due to the absence of documented response procedures and drill records.
The broader context reinforces urgency: VicOne and Trend Micro's Pwn2Own Automotive 2025 competition uncovered 49 zero-day vulnerabilities across automotive systems, and American research has confirmed that the majority of vehicle manufacturers demonstrate inadequate privacy protection practices. The connected vehicle ecosystem's expanding attack surface makes the integrated management approach ANDURIL proposes not just academically interesting, but operationally necessary.
How Winners Consulting Services Co. Ltd. Supports Taiwan's Automotive Suppliers
Winners Consulting Services Co. Ltd. (積穗科研股份有限公司) supports Taiwan's automotive supply chain in achieving TISAX certification, implementing ISO/SAE 21434, and satisfying UNECE WP.29 R155 cybersecurity management system requirements. Based on the strategic directions identified in the ANDURIL framework, we recommend the following three concrete actions for Taiwanese suppliers:
- Conduct a Three-Phase Cybersecurity Maturity Assessment: Map your current security capabilities against ANDURIL's Detection, Response, and Prevention dimensions. Key diagnostic questions include: Does your organization have CAN bus monitoring or equivalent network monitoring for in-vehicle systems? Is there a documented, tested incident response procedure that satisfies ISO/SAE 21434 continuous cybersecurity activity requirements? Has a TARA been completed and maintained according to ISO/SAE 21434 Clause 15? The answers directly determine your organization's readiness for TISAX assessments and R155 type approval audits.
- Build a TARA Workflow That Integrates With Your Monitoring Infrastructure: The ANDURIL framework's risk assessment model emphasizes grounding threat evaluation in international standards—directly aligned with ISO/SAE 21434's TARA methodology. We recommend that suppliers complete at least one full TARA cycle before the end of 2025, integrating its outputs into both the CSMS documentation system and the detection rule sets governing any network monitoring tools in use. This creates the feedback loop—from detected event to TARA update to control measure adjustment—that constitutes genuine continuous cybersecurity activity.
- Plan Post-Production Security Monitoring Resources Proactively: CISA advisory AA25-212A and R155's post-production requirements both point to the same organizational gap: the lack of sustained monitoring capability after a product enters the market. We recommend that suppliers assess SOC capability options—whether in-house, outsourced, or shared-service models—as part of their 2025–2026 resource planning. Even a lightweight shared SOC arrangement can establish the compliance baseline needed to respond to OEM customer R155 audit requirements.
Winners Consulting Services Co. Ltd. offers a complimentary Automotive Cybersecurity Mechanism Diagnostic, helping Taiwan enterprises establish a TISAX-compliant management framework within 7 to 12 months.
Explore Automotive Cybersecurity (AUTO) Services → Request a Free Diagnostic →Frequently Asked Questions
- How does the ANDURIL framework's CAN bus detection component connect to the TARA process required by ISO/SAE 21434?
- ANDURIL's Detection dimension uses machine learning algorithms to identify anomalous CAN bus traffic patterns. ISO/SAE 21434 Clause 15 requires organizations to identify threat scenarios, assess their impact and feasibility, and assign risk values through the TARA process. The practical integration point is that TARA outputs—specifically the high-risk threat scenarios—should directly inform the detection rules and alert thresholds configured in any CAN bus monitoring system. Conversely, anomalous events detected at runtime should trigger a TARA review cycle to assess whether the threat model needs updating. Organizations that maintain this bidirectional feedback loop satisfy ISO/SAE 21434's continuous cybersecurity activity requirements in a way that a standalone detection tool cannot.
- What are the most common failure points for Taiwanese suppliers during TISAX assessments?
- Based on practical assessment experience, Taiwanese suppliers most frequently lose points in three TISAX (VDA ISA) areas: Security Incident Management—due to absent or untested incident response procedures; Supplier Management—due to cybersecurity requirements not being contractually specified for sub-suppliers; and Physical Security—due to access control and visitor management practices falling short of TISAX requirements. ANDURIL's Response operational unit addresses the first failure area most directly. Suppliers that develop documented incident response SOPs informed by the framework's SOC-oriented model will see measurable improvements in their TISAX assessment scores, particularly if those procedures are supported by evidence of at least one tabletop or live drill exercise.
- Does TISAX certification satisfy UNECE WP.29 R155 compliance requirements?
- TISAX and UNECE WP.29 R155 address related but distinct compliance domains. TISAX, based on VDA ISA, evaluates information security management with emphasis on data protection and IT security practices. R155 mandates a Cybersecurity Management System (CSMS) specifically for vehicle cybersecurity, covering the development, production, and post-production lifecycle. R155 directly constrains OEM manufacturers seeking type approval in markets including the EU, Japan, and South Korea, with compliance obligations flowing down to supply chain partners through contractual requirements. TISAX certification demonstrates strong information security governance but does not substitute for a CSMS built to ISO/SAE 21434. Suppliers that have achieved TISAX AL2 certification should assess whether their existing documentation can be extended to support an ISO/SAE 21434-aligned CSMS, as significant structural overlap exists but critical gaps typically remain in TARA methodology and post-production monitoring.
- What is the realistic timeline and resource investment for building an ISO/SAE 21434-compliant security management system?
- For a mid-sized Taiwanese automotive supplier with 200–500 employees, building a foundational ISO/SAE 21434-compliant cybersecurity management system typically requires 9 to 18 months. Organizations with an existing ISO 27001 or IATF 16949 management system baseline can typically compress this timeline to 7 to 12 months. Resource requirements generally include 1 to 2 dedicated or part-time cybersecurity management personnel, external consulting support for TARA methodology design and documentation framework development, and tool investments for threat monitoring infrastructure. External consulting fees typically represent 40–60% of total initial investment, with the remainder allocated to internal personnel time and tooling. TISAX assessment fees are separate and vary by assessment level: AL2, the most common requirement for Taiwanese suppliers, involves third-party assessment costs that should be budgeted as part of the overall program plan.
- Why engage Winners Consulting Services Co. Ltd. for Automotive Cybersecurity matters?
- Winners Consulting Services Co. Ltd. (積穗科研股份有限公司) provides integrated advisory capability across ISO/SAE 21434, TISAX, and UNECE WP.29 R155—three frameworks that Taiwanese automotive suppliers must navigate simultaneously. Our team addresses both the technical layer (TARA methodology design, CAN bus security assessment, control measure specification) and the management layer (CSMS documentation, TISAX assessment preparation, gap analysis against R155 requirements). We support clients through a structured engagement path from diagnostic to certification, with a target timeline of 7 to 12 months for TISAX-compliant framework establishment. Our complimentary Automotive Cybersecurity Mechanism Diagnostic gives prospective clients a clear picture of their current compliance gaps and prioritized action items before committing to a full engagement—ensuring resources are allocated to the highest-impact areas from the outset.
積穗科研股份有限公司(Winners Consulting Services Co. Ltd.)は、2025年に発表されたANDURILフレームワークが、自動車のサイバーセキュリティ管理における「検知・対応・予防」の三段階を初めて統合的に扱う五次元モデルであることを指摘し、ISO/SAE 21434およびUNCE WP.29 R155、TISAXへの対応を進める台湾の自動車サプライヤーにとって、具体的な管理体制構築の青写真となると評価しています。
論文出典:Security Management in Automotive Environment(DE VINCENTIIS, MIRKO,arXiv,2025)
原文リンク:https://core.ac.uk/download/661333726.pdf
Source Paper
Security Management in Automotive Environment(DE VINCENTIIS, MIRKO,arXiv,2025)
Read Original Paper →FAQ
- ANDURIL 框架中的 CAN 匯流排入侵偵測,與 ISO/SAE 21434 的 TARA 流程如何實際銜接?
- ANDURIL 框架的偵測維度以機器學習演算法識別 CAN 匯流排異常流量為核心,而 ISO/SAE 21434 第 15 章的威脅分析與風險評鑑(TARA)則要求企業在設計階段識別威脅情境並評估其衝擊。兩者的銜接點在於:TARA 的輸出結果(高風險威脅情境)可直接作為 CAN 匯流排監控規則的設計依據,而監控系統偵測到的異常事件也應回饋至 TARA 的持續更新流程。台灣企業在建置偵測系統時,若能同步建立「偵測事件→ TARA 更新→控制措施調整」的回饋迴路,才能真正符合 ISO/SAE 21434 對持續性網路安全活動的要求,而非將偵測系統視為獨立工具。
- 台灣汽車零件廠導入 TISAX 時,最常在哪些項目失分?
- 根據實務輔導經驗,台灣供應商在 TISAX(VDA ISA)評鑑中最常失分的三大領域是:(1)資安事件管理(Incident Management)——缺乏書面化的事件回應程序與演練紀錄;(2)供應商管理(Supplier Management)——對下游供應商的資安要求未書面化納入採購合約;(3)實體安全(Physical Security)——針對研發機密的門禁管控與訪客管理未達 TISAX 要求。ANDURIL 框架的回應維度恰好對應第一個失分項目,企業若能參考其 SOC 導向的回應模型建立事件回應 SOP,將在 TISAX 評鑑中取得顯著加分。此外,ISO/SAE 21434 的文件體系建立也有助於支撐 TISAX 的多項合規證明。
- UNECE WP.29 R155 對台灣汽車供應商的實際約束力為何? TISAX 認證能否替代?
- UNECE WP.29 R155 法規的直接約束對象是在歐盟、日本、韓國等採行該法規市場銷售車輛的 OEM 廠商,台灣零件供應商並非直接受法規約束的主體。然而,OEM 客戶為取得車型認證,必須要求其整個供應鏈符合 R155 的 CSMS 要求,因此台灣供應商通常透過客戶合約條款間接受到約束。TISAX 認證與 R155 合規性是不同層次的要求:TISAX 主要評鑑資訊安全管理(偏向資料保護與 IT 安全),而 R155 聚焦於車輛網路安全管理系統(CSMS)。兩者可互補但不能相互替代。建議已取得 TISAX 認證的台灣供應商,進一步評估是否需要依 ISO/SAE 21434 建立獨立的 CSMS,以回應 OEM 客戶的 R155 審計要求。
- 建立符合 ISO/SAE 21434 的汽車資安管理機制,實際需要多長時間與多少資源投入?
- 依企業現有 ISO 管理系統基礎與人員規模,建立符合 ISO/SAE 21434 基本要求的汽車資安管理機制,通常需要 9 至 18 個月。若企業已有 ISO 27001 或 IATF 16949 管理系統基礎,導入週期可縮短至 7 至 12 個月。資源投入方面,中型供應商(員工 200–500 人)通常需要指定 1 至 2 名全職或兼職的資安管理負責人,並配合外部顧問協助 TARA 方法論建立與文件體系設計。初期導入成本中,外部顧問費用通常佔總投入的 40–60%,其餘為內部人力與工具建置成本。取得 TISAX 認證的額外評鑑費用則依評鑑等級(AL1/AL2/AL3)而異,台灣企業最常見的需求是 AL2 等級。
- 為什麼找積穗科研協助汽車網路安全(AUTO)相關議題?
- 積穗科研股份有限公司(Winners Consulting Services Co. Ltd.)專注於台灣汽車供應鏈的資安合規輔導,具備 ISO/SAE 21434、TISAX 與 UNECE WP.29 R155 三大框架的整合輔導能力,是台灣少數能同時處理技術層面(TARA 方法論、CAN 匯流排安全評估)與管理層面(CSMS 建置、TISAX 評鑑準備)的專業顧問團隊。我們協助企業在 7 至 12 個月內完成從現況診斷、機制設計到評鑑準備的完整路徑,並提供免費的汽車資安機制診斷服務,讓企業在正式導入前先了解自身的合規缺口與優先行動項目,避免資源浪費在錯誤的起點上。
Was this article helpful?
Related Services & Further Reading
Related Services
Risk Glossary
- ▶
Data Processing
「資料處理」指對任何資訊或數據集執行的一系列操作,包括收集、記錄、組織、儲存、使用與刪除。在車聯網與數位化營運中,合規的資料處理是企業遵循個資法規、降低數據洩露風險、維持客戶信任與確保營運連續性的核心基礎。
- ▶
Unauthorized Computer Access
指未經合法授權或超出授權範圍,故意存取他人電腦系統或資訊的行為。此行為對企業構成重大資安威脅,可能導致資料外洩、營運中斷與法律制裁。企業需建立嚴格的存取控制機制以防範此類風險,確保營運持續性。
- ▶
Law and Economics
法律經濟學是運用經濟學理論分析法律規範的學科。在車聯網領域,它協助企業評估網路安全法規(如UNECE R155)的成本效益,設計最佳誘因機制,以最有效率的方式降低法律責任風險,並優化合規投資。
- ▶
ex-ante safety regulations
指在產品(如車輛)進入市場前,由主管機關強制要求實施的預防性安全措施。在汽車網路安全領域,此類法規要求車廠必須建立並驗證有效的管理系統,以主動應對潛在威脅,確保產品生命週期內的安全性。
- ▶
ex-post liability
「事後賠償責任」指損害事件(如網路攻擊)發生後,才根據因果關係與損害程度來決定法律責任與賠償金額的原則。對車用產業而言,此原則驅動企業必須建立完善的事件應變與鑑識能力,以在事故後釐清責任歸屬,管理潛在的鉅額財務與法律風險。
Want to apply these insights to your enterprise?
Get a Free Assessment