THE CHALLENGE
Modern vehicles integrate millions of lines of code across multiple ECUs (in some instances, more than 70 ECUs in a single vehicle), making software provenance, vulnerability response, and audit readiness difficult to manage at scale. The OEM needed a more robust way to trace software components, build environments, and security status across the vehicle platform, while preparing for increasingly stringent regulatory expectations – these also include the prevention of contributions from individual contributors & partners located in specific regions deemed as adversarial.
THE SOLUTION
The OEM adopted an SPDX 3.0-based architecture to represent the vehicle software stack as a structured, machine-readable system rather than a set of static SBOM files. This approach allows proving due diligence while responding to compliance audit requests by governmental entities, through improved traceability across software components, build metadata, vulnerability information, and assets used in the development.
Key implementation elements included:
Core Profile: linked the software stack to the vehicle identity and supported end-to-end traceability.
Build Profile: captured cryptographically guaranteed contributor info (commit signing), compiler toolchains, build environments, and build location data to strengthen provenance records; import & include SBOM & compliance statements from tier 1 suppliers.
Security Profile: provided up-to-date exploitability status to respond to legal requirements and help teams prioritize relevant vulnerabilities.
AI/Dataset Profile: documented model lineage and training data provenance for ADAS-related functions.
HIGH-RISK AREAS
Communications (ICTS): Data sovereignty and the risk of foreign adversarial exploit injection are the primary concerns. SPDX 3.0 provides full build-path transparency from supplier to vehicle.
Zonal controllers (CRA): Safety-critical software demands faster visibility into security and patch status.
Infotainment (ICTS, CRA): Foreign adversarial exploit injection and open-source dependency complexity require full build-path transparency from supplier to vehicle.
OTA updates (ICTS): Foreign adversarial exploit injection is the key risk. SPDX 3.0 ensures that over-the-air software updates are validated as secure before deployment.
ADAS AI models (CRA): Model integrity and provenance require full traceability for datasets and model artifacts.
A STORY OF SUCCESS
The new approach reduced manual compliance effort by replacing fragmented reporting with machine-readable compliance data, providing a path to ensure mandated legal compliance. It also shortened vulnerability impact analysis from weeks to minutes and improved the OEM's ability to demonstrate traceability and security-by-design practices during audits.
