China’s homegrown Advanced Driver Assistance Systems (ADAS) developed on the mimic defense theory showed strong safety performance in the 4th QIANGWANG International Elite Challenge on Cyber Mimic Defense in Nanjing City.
The "QIANGWANG" (cyberspace power) competition held from November 9 to 12 attracted 48 teams of Chinese and foreign "white hat hackers" -- computer specialists who use hacker techniques to test computer and cybersecurity.
The competition’s ADAS event featured 15 systems used by major domestic and foreign carmakers as well as an original system based on mimic defense theory.
All 15 commercial ADAS systems were quickly found to have attack vulnerabilities that can directly affect driving safety. Some participants just used 30 minutes to remotely controlled a car to turn, accelerate, put on the brake or open the door. Such scenarios reveal the real threat of connected car hijacking and the urgency to ensure the safety.
In comparison, the original system detected and blocked all attacks in the competition, demonstrating a reliable safety performance and a new approach to promote the healthy development of the connected car industry.
The mimic defense system features an ever-changing software environment, which makes conventional hacker attacks difficult to locate a target.
Wu Jiangxing, an academician of the Chinese Academy of Engineering, said digital economy is flourishing in China and new information technologies are deeply reshaping traditional industries such as automobiles. This also means the definition and content of cyber security is changing and expanding beyond conventional thinking.
Academician of the Chinese Academy of Engineering Wu Jiangxing
Wu also said it’s important to pay more attention to cyber security because of its evolving nature as well as significance to people’s life, society and national governance.
The China-proposed mimic defense theory provides an integrated solution to the safety problems, according to Wu. Results from the challenge in four years have fully demonstrated that the theory and its technology can achieve security and technical self-reliance in cyberspace.
Contact us at english@jschina.com.cn