WESETH® Architecture
WESETH®’s high-security standards allow fully autonomous requirements verification as well as the integration of human experts in the loop for penetration testing.
Customer’s hardware remains with Customer ECU, vehicle, sub-system, Hardware in the Loop systems …
Customer attaches Weseth® remote Box to target hardware which shall be tested / validated Physical connection via CAN/CANFD/ETHERNET, Bluetooth, WI-FI, USB, streaming of video, multiple Digital IOS
Cloud Based server manages the secure integration between System Under Tests and remote Users Test scripts are stored in a safe environment and are automatically loaded on the Boxes when needed.
Test Engineers describe the System Under Test; based on this, Scripts are automatically selected and loaded on the respective Box for automatic execution. Remote Users can access the System Under Test to perform penetration tests, emulate attacks, verify requirements and collect data.
WESETH® Use Cases
WESETH® implements a wide variety of use cases including:
Automated verification of cyber and functional requirements;
Remote security Assessment through Penetration Test;
Cooperative vulnerabilities fixing;
Simulation of attacks