MobilSherpa+
ECU security from start to finish, even without security experts
Secure Boot · Diagnostics · OTA Update · FoD Subscription — All-in-one security platform for embedded controllers
What is MobilSherpa+?
Today's vehicles contain dozens of electronic control units (ECUs). From engine to brakes to airbags to infotainment — all controlled by software. But as software grows, so do attack surfaces. Vehicle cyber attacks are increasing every year, and automotive cybersecurity regulations are tightening worldwide.
The problem is that implementing proper security requires expertise in cryptography, embedded software, and automotive communication protocols. Most OEMs and Tier 1/2 suppliers don't have enough specialized personnel.
MobilSherpa+ was built to solve this problem. It provides all ECU security functions in a single package, enabling customers to meet regulations and build secure products without dedicated security experts. Just as a 'Sherpa' carries the burden for mountaineers, MobilSherpa carries the security burden for our customers.
Who Needs This
Vehicle development teams struggling with UNECE R155·R156 compliance
Secure Boot·Secure Flash·UDS·SecOC and more regulatory features in a single package
Developers who need to rewrite security code for every semiconductor platform
Hardware abstraction layer supporting NXP·Infineon·Renesas·Microchip multi-platform
Teams integrating security into AUTOSAR-based projects
Verified integration with Mobilgene·MicroSAR·Electrobit and other major AUTOSAR stacks
OEMs needing software subscription features for SDV transition
FoD (Feature on Demand) subscription verification·billing·activation security layer
MobilSherpa+ | Embedded Controller Security Platform
Security FBL
Bootloader
Security HSM
Crypto Operations · Key Mgmt
Security CDD
Secure Boot / Key Mgmt
OEM CDD
OEM Spec Compliance
ECU
Security Core
Security SecOC
Inter-ECU Communication Security
Security FoD
SW Security Update
Security UDS
Authentication Protocol
ECU
Security Core
Security HSM
Crypto Operations · Key Mgmt
Security CDD
Secure Boot / Key Mgmt
Security SecOC
Inter-ECU Communication Security
Security UDS
Authentication Protocol
Security FoD
SW Security Update
Security FBL
Bootloader
OEM CDD
OEM Spec Compliance
Problems We Solve
Security drivers must be rewritten for every semiconductor platform
Hardware abstraction layer supports NXP·Infineon·Renesas·Microchip multi-platform with a single codebase. Switch without redevelopment
UNECE R155 / ISO 21434 compliance scope is too broad
Secure Boot·Secure Flash·diagnostic security·key management·SecOC bundled in a single package. Minimized integration risk and certification burden
OEM-specific security requirements make customization difficult
Both standard Security CDD and OEM-specific CDD variants provided. Apply directly without separate customization
Product Structure — 7 Modules
Security HSM
Hardware Security Module
A hardware security foundation layer that performs cryptographic algorithm operations using HSM/HSE cores built into automotive MCU/SoCs. By executing crypto operations in a secure domain separated from the Host core, it provides both physical key/data protection and high-performance cryptographic processing.
| Feature | Description |
|---|---|
| Symmetric Key Crypto Operations | Dedicated processing of block cipher operations such as ARIA, AES within HSM/HSE. High-speed encryption/decryption without Host core overhead |
| Hash Operations | Hash function operations such as SHA-2, SHA-3 processed in HSM/HSE. Secure generation of hash values for integrity verification |
| MAC Generation & Verification | Message authentication codes (HMAC, CMAC, GMAC) generated and verified in HSM/HSE. Trust foundation for communication security including SecOC |
| Public Key Crypto Operations | Asymmetric key operations such as ECDSA, ECDH performed in HSM/HSE. Signature generation/verification and key exchange processing |
| Random Number Generation (RNG) | High-quality random number generation using hardware TRNG in HSM/HSE. Foundation for key generation and cryptographic protocols |
| Protected Key Storage | Keys stored within HSM/HSE secure domain. Architecture prevents direct key access from Host core, preventing key leakage |
Overall Architecture
Each MobilSherpa+ module operates in layers between the OEM Application and hardware layer, connected to MobilCrypto+ or built-in HSM/HSE Crypto through the Crypto Service Manager.
or CDD

HSM/HSE core
* HSM/HSE : Hardware Security Module / Hardware Security Engine
ECU Security Lifecycle — 5 Stages
Boot
FBL → Secure Boot
Flash boot loader verifies firmware signature → Chain of Trust establishment
Initialization
CDD → Key Mgmt / Secure Storage
HSM/HSE-based key generation/storage, security configuration lock
Operation
CDD + SecOC
Runtime integrity monitoring, access control, inter-ECU message authentication (MAC)
Update
FBL + UDS → Secure Flash
Signature verification-based update via diagnostic channel/OTA
Feature Extension
FoD → Subscription
Feature activation after software subscription/billing verification
Key Advantages
OEM Ready — Standard + OEM-Specific
Both standard Security CDD and OEM-specific CDD provided. Immediately address domestic and international OEM requirements without customization
Full Classic AUTOSAR Support
Verified integration with Mobilgene (Hyundai AutoEver), MicroSAR (Vector), Electrobit and other major Classic AUTOSAR stacks
Legacy & RTOS Support
Supports legacy embedded environments as well as FreeRTOS and SafeRTOS. Consistent security features regardless of OS environment
ECU Communication Security — SecOC
Secure Onboard Communication for message authentication and integrity between vehicle ECUs. Defends against CAN·Ethernet network tampering
Full UDS Standard Compliance
ISO 14229 DTC diagnostics and Secure Flash unified in a single UDS layer. Diagnostic channels safely used as secure update paths
FoD Subscription Security — SDV Revenue Trust
Security verification embedded throughout software subscription·billing·activation. Tampered activation attempts blocked at the source
Complete Update Chain with FBL
Signature verification applied from Flash Boot Loader through Secure Flash. Defends against rollback attacks and tampered firmware installation
Multi-Platform Support
NXP, Infineon, Renesas, Microchip and more supported through abstraction layer. Switch platforms without redevelopment
Full MobilCrypto+ Integration
Connected to FCrypto/SCrypto via Crypto Service Manager. KCMVP-verified cryptographic algorithms as the foundation for security functions
Supported Environments
| Category | Supported Environments |
|---|---|
| Classic AUTOSAR | Mobilgene (Hyundai AutoEver) · MicroSAR (Vector) · Electrobit |
| RTOS | FreeRTOS · SafeRTOS |
| Legacy | Non-AUTOSAR embedded environment support |
| Semiconductor Platforms | NXP · Infineon · Renesas · Microchip, etc. |
Compliance Standards
Delivery Format
Applications
Product Line Positioning
MobilSherpa+ executes ECU security functions on top of MobilCrypto+'s cryptographic foundation, and implements MobilContinuum+'s regulatory compliance results into actual systems as the middle layer.
Regulatory Compliance / CRA·TARA AI Orchestration
ECU Security Function Execution Layer
Cryptographic Foundation Layer (FCrypto / SCrypto)
