Photo by cottonbro studio on Pexels

Photo by cottonbro studio on Pexels

Inside Project Glasswing: Deploying Zero‑Trust Security for Autonomous Vehicles Without Sacrificing Real‑Time Performance

TECH Apr 10, 2026

Inside Project Glasswing: Deploying Zero-Trust Security for Autonomous Vehicles Without Sacrificing Real-Time Performance

Project Glasswing demonstrates that zero-trust principles can be embedded into automotive software without violating the stringent latency guarantees required for safe autonomous driving. By redefining trust boundaries at the component level, the system achieves robust protection against software-flaw induced crashes while maintaining <10 ms control-loop cycles. How Project Glasswing Enables GDPR‑Compliant AI...

70% of AI-driven car crashes stem from software flaws.

Zero-Trust Fundamentals Tailored for Autonomous Vehicle Software

  • Identity-centric access replaces static perimeter fences.
  • Least-privilege policies enforce minimal privileges for each module.
  • Continuous verification ensures trust is validated in real time.

Zero-trust in automotive diverges from legacy perimeter models by treating every internal bus - CAN, FlexRay, Ethernet - as a potential attack surface. Instead of a single shield, each component is authenticated through cryptographic identity tokens. This shift aligns with ISO 26262’s safety integrity levels, allowing safety and security to co-evolve.

Identity management is central. Every perception, planning, or control node carries a unique X.509 certificate signed by an on-board root of trust. Least-privilege manifests as fine-grained ACLs that restrict inter-module communication to the minimal set of topics required for operation. Continuous verification is achieved via runtime attestation, where each module signs its execution context before participating in a control cycle.

Mapping to ISO/SAE standards, zero-trust complements ISO 26262’s functional safety by providing a systematic way to prove that safety-critical modules cannot be compromised. ISO/PAS 21448 (SOTIF) further supports this by addressing unintended behavior, which zero-trust mitigates through rigorous identity checks.

Why Traditional Perimeter Security Fails in AI-Driven Cars

The 70% software-flaw crash statistic underscores the inadequacy of static network boundaries. Outdated perimeter defenses treat the vehicle as a monolithic host, allowing attackers to pivot once a single entry point is breached.

Case studies reveal lateral movement on CAN and Ethernet buses. A compromised infotainment unit can inject malicious frames that trick the perception stack, leading to misclassification of obstacles. Traditional firewalls, designed for IP networks, cannot enforce fine-grained policies on low-level bus protocols.

Quantitatively, the breach surface shrinks by 68% when zero-trust micro-segmentation is applied. By isolating perception, planning, and control into distinct zones, attackers are confined to a single domain, preventing cross-module contamination. This reduction directly translates to fewer safety-critical failures, as documented in the 2023 IEEE Transactions on Vehicular Technology study.


Project Glasswing Architecture: Micro-Segmentation, Identity-Based Access, and Secure Telemetry

Glasswing introduces a three-tier micro-segmentation model. The perception zone houses cameras, LiDAR, and sensor fusion nodes; the planning zone orchestrates trajectory generation; the control zone drives actuators. Each zone is a logical

Tags