Safety and security related features in AUTOSAR

Size: px
Start display at page:

Download "Safety and security related features in AUTOSAR"

Transcription

1 Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security June, 2010, Stuttgart

2 Overview Background of safety and security in automotive E/E development Overview software architecture Safety related features Security related features 2 Safety and security related features in

3 Safety and Security in Automotive E/E Development Functional Safety Security E/E System Reliability Safety: With the trend of increasing complexity, software content and mechatronic implementation, there are increasing risks from systematic failures and random hardware failures. (ISO DIS Road vehicles Functional safety) Security: means protecting a system and its information and data from unauthorized access, use, disclosure, disruption, modification or destruction 3 Safety and security related features in

4 Functional Safety in Automotive E/E Development IEC Functional safety of electrical/electronic/ programmable electronic safety-related systems, 1998 Generic standard Adaptation to E/E systems in road-vehicles ISO DIS Road vehicles Functional safety, 2009 ISO 26262: provides an automotive safety lifecycle (management, development, production, operation, service, decommissioning) and supports tailoring the necessary activities during these lifecycle phases; provides an automotive specific risk-based approach for determining risk classes (Automotive Safety Integrity Levels, ASILs); uses ASILs for specifying the item's necessary safety requirements for achieving an acceptable residual risk; and provides requirements for validation and confirmation measures to ensure a sufficient and acceptable level of safety being achieved. 4 Safety and security related features in

5 Why Security in Automotive E/E Development? Political and Social Issues esafety Initiative EU esecurity Workgroup Product Liability Thatcham Legal regulations requiring additional security measures in vehicles (Regulation EC 692/2008) EU 5 / EU 6 Political and administrative workgroups realize the dependency between safety ( Betriebssicherheit ) and security ( IT Sicherheit ) resulting in new legal requirements regarding security in the automotive domain 5 Safety and security related features in

6 Overview Background of safety and security in automotive E/E development Overview software architecture Safety related features Security related features 6 Safety and security related features in

7 Vision aims to improve complexity management of integrated E/E architectures through increased reuse and exchangeability of SW modules between OEMs and suppliers. OEM b OEM a Platform b.1 Platform b.2 Platform b.n Exchangeability between suppliers OEM c solutions Platform a.1 Platform a.2 Platform a.n Exchangeability between manufacturers applications OEM f Platform f.1 Platform f.2 Platform f.n Supplier A Chassis Safety Body/ Comfort OEM e Supplier C Platform e.1 Platform e.2 Platform e.n Supplier B Chassis Safety Telematics Body/Comfort Powertrain Telematics Platform c.1 Platform c.2 Platform c.n OEM d Platform d.1 Platform d.2 Platform d.n Exchangeability between vehicle platforms 7 Safety and security related features in

8 Vision aims to standardize the software architecture of ECUs. paves the way for innovative electronic systems that further improve performance, safety and environmental friendliness. Yesterday Hardware Application Hardware standardized HW-specific Customer needs Adaptive Cruise Control Lane Departure Warning Advanced Front Lighting System.. Using standards Communication Stack OSEK Diagnostics CAN, FlexRay Hardware and software will be widely independent of each other. Development can be de-coupled by horizontal layers. This reduces development time and costs. The reuse of software increases at OEM as well as at suppliers. This enhances quality and efficiency. 8 Safety and security related features in

9 Core Partners and Members Status: May 6, Core Partner 11 Development Members 39 Premium Member 57 Associate Members 5 Attendees General OEM Generic Tier 1 Standard Tools and Services Semiconductors Up-to-date status see: 9 Safety and security related features in

10 9 Project Objectives and 3 Main Working Topics PO1: Implementation and standardization of basic system functions as an OEM wide Standard Core solution PO2: Scalability to different vehicle and platform variants PO3: Transferability of functions throughout network PO4: Integration of functional modules from multiple suppliers Application s Architecture Methodology PO5: Maintainability throughout the whole Product Life Cycle PO6: Increased use of Commercial off the shelf hardware PO7: updates and upgrades over vehicle lifetime PO8: Consideration of availability and safety requirements PO9: Redundancy activation 10 Safety and security related features in

11 Specifications vs. Products Core Partners, Premium, and Development Members Develop compliant products SW modules Tools ECUs Cars Members Partnership Cooperate on standards, compete on implementations. Standard Specifications Architecture Methodology Appl. s Releases R4.0, R3.1, R3.0, Build Apply 11 Core Partners, Premium, Development, and Associate Members Safety and security related features in

12 Architecture Overview of Layers Top View The Architecture distinguishes on the highest abstraction level between three software layers running on a microcontroller. The Application Layer The Run Time Environment (RTE) Basic (BSW) Application Layer RTE Basic (BSW) Microcontroller 12 Safety and security related features in

13 Basic Coarse View and Detailed View The Basic consists of the layers: Services, ECU, Microcontroller and Complex Drivers. The BSW layers are further divided into functional groups. Examples of Services are System Memory Communication Services Application Layer Application Layer RTE RTE Services Layer System Services Memory Services Communication Services I/O Hardware ECU Layer ECU Layer Microcontroller Layer Complex Drivers Onboard Device Microcontroller Drivers Memory Hardware Memory Drivers Communication Hardware Communication Drivers I/O Drivers Complex Drivers Microcontroller Microcontroller 13 Safety and security related features in

14 Architecture Layered Architecture Application Layer Breakdown to / Implementation on ECU Runtime Environment (RTE) Services Layer ECU Layer Microcontroller Layer Hardware Complex Drivers Application Component ECU Architecture Actuator Component Sensor Componen t... Application Componen t Runtime Environment Operating System Services Basic Communication ECU Microcontr. Complex Device Drivers ECU-Hardware 14 Safety and security related features in

15 Development Methodology Principle ECU I SWC 1 SWC Description SWC 1 RTE Basic SWC 2 SWC 3... Virtual Functional Bus ECU Description SWC 3 SWC Description ECU II SWC Description ECU Description SWC 2 RTE Basic... SWC Description SWC n ECU m SWC n ECU Description RTE Basic description templates: SWC description: application software ECU description: ECU characteristics and configuration System description: network and assignment of SWCs to ECUs Descriptions for SWCs + ECUs + system description allow a tool-based deployment of SWCs to ECUs FlexRay Gateway CAN System Description 15 Safety and security related features in

16 Overview Background of safety and security in automotive E/E development Overview software architecture Safety related features Security related features 16 Safety and security related features in

17 methodology according to ISO26262 Functional Safety Concept 3-8 Specification of Technical Safety Requirements 4-6 SYSTEM Specification of SW Safety Requirements 6-6 SW architectural design Safety and security related features in

18 methodology according to ISO26262 Functional Safety Concept 3-8 Specification of Technical Safety Requirements 4-6 SYSTEM Supports safety by offering standard safety mechanisms Core Tests, Flash tests E2E protection Memory partitioning Specification of SW Safety Requirements REQ 6-6 architectural design 6-7 SW REQ SPECIFICATIONS REQ REQ Requirements (SRS) REQ REQ Specifications (SWS) REQ Some safety requirements in ISO26262 part6 are related to SW implementation BSWs BSWs Config SW-Cs Safety related CDDs SW implementation 18 Safety and security related features in

19 Safety Features Memory partitioning: separate software applications from each other in order to avoid any data corruption between applications Defensive behavior: prevent data corruption and wrong service calls in the basic software on microcontrollers having no hardware support for memory partitioning. End-to-end communication protection: protect applications against the effects of faults within the communication link Program flow monitoring: control the temporal and logical behavior of applications Time determinism and timing constraints modeling: model and implement proper and deterministic timing behavior synchronized time bases (i.e. a global time ) across ECU networks, synchronized execution and deterministic timing of application software components controlling the timing behavior and detection of timing violations at runtime timing constraints like end-to-end (e.g. sensor-to-actuator or communication) delays, minimum/ maximum execution times of runnable entities, or constraints on the triggering rate of events. Hardware testing and checking: basic software modules to test hardware (e.g. RAM-Test, Core-Test) and to check the integrity of stored data (e.g. EEPROM Manager) 19 Safety and security related features in

20 Release 4.0 Partitioning Partitions are used as fault containment regions Partitions can be terminated or restarted during run-time as a result of a detected error Partitions are configured in the ECU-C Partition 0 (No ASIL) Partition 1 (ASIL A) Partition 4 (ASIL D) Application Component Operating System Actuator Component Basic Sensor Component... Application Component Runtime Environment (RTE) with build-in protection layer Services Communication Partition 5 (ASIL D) ECU Microcontroller Complex Device Drivers ECU-Hardware 20 Safety and security related features in

21 Release 4.0 Example for Partitioning 1. A violation (error) has occurred in the system (e.g., memory or timing violation) 2. The partition is terminated by the OS, cleanup possible communication is stopped 3. The partition is restarting, initial environment for partition set up 4. The partition is restarted and up and running Partition 0 (No ASIL) Partition 1 (ASIL A) Partition 4 (ASIL D) Application Component Operating System Actuator Component Services Basic Sensor Component Stop ECU-Hardware... Application Component Runtime Environment (RTE) with build-in protection layer Communication Partition 5 (ASIL D) ECU Microcontroller Complex Device Drivers 21 Safety and security related features in

22 Release 4.0 Safety End to End (E2E) Communication Protection Libraries OS-Application 2 Receiver 1 OS-Application 1 Sender System Services SW IOC HW Runtime Environment (RTE) Memory Services Communication Services SW SW I/O Hardware CDD Typical sources of interferences causing errors Detected by E2E protection SW-related sources Onboard Device Memory Hardware Communication Hardware SW HW-related sources Microcontroller Drivers Memory Drivers Communication Drivers I/O Drivers HW HW Microcontroller 1 / ECU 1 Microcontroller 2 / ECU 2 22 Safety and security related features in

23 Release 4.0 Safety End to End (E2E) Communication Protection Libraries Direct function calls E2E Lib System Services SW OS-Application 2 Receiver 1 E2E protection wrapper IOC Onboard Device Microcontroller Drivers HW Runtime Environment (RTE) Memory Services Memory Hardware Memory Drivers Communication Services SW Communication Hardware Communication Drivers OS-Application 1 Sender E2E protection wrapper I/O Hardware SW SW I/O Drivers CDD HW RTE wrapper HW Typical sources of interferences causing errors Detected by E2E protection SW-related sources HW-related sources Microcontroller 1 / ECU 1 Microcontroller 2 / ECU 2 23 Safety and security related features in

24 Overview Background of safety and security in automotive E/E development Overview software architecture Safety related features Security related features 24 Safety and security related features in

25 Security Use Case Examples Secure Programming of ECUs Programming only by authorized entities Programming only with original OEM approved software Application (in bootloader) uses standard cryptographic routines and services, e.g. hash, signature verification, and public key encryption (= asymmetric encryption) Electronic Immobilizer Protect the vehicle from any unauthorized driving Technical details are totally OEM dependent But: Immobilizer application always uses a specific set of cryptographic routines and services Electronic enabling of functions Only a specific subset shall be enabled for regular usage of the car Uses special data structures with cryptographic signature Secure diagnosis Only dedicated entities are allowed to use certain diagnostic services 25 Safety and security related features in

26 Security and Cryptographic Architecture Security Use Cases and corresponding security applications Each main security use case corresponds to a security application Secure Flashing Authentication & Signature Function Enabling SWC My Use Case myapp MD5 xxx-mac RSA MD5 RSA DES DH SHA-1 HMAC RSA AES basic cryptographic routines Each security application uses a different set of cryptographic services Communality of cryptographic routines may lead to slightly different crypto implementations or to duplicated code 26 Safety and security related features in

27 Security and Cryptographic Architecture Security Use Cases and corresponding security applications Separation of security application and cryptographic routines Secure Flashing Authentication & Signature Function Enabling SWC Crypto Module MD5 SHA-1 SHA-256 ECC RSA AES DES DH Crypto Module manages requests for cryptographic services from applications and dispatches to a pool of cryptographic basic routines Standard generic interface from above for applications Standard generic interface from below for basis routines (cryptographic services as plugins) Management of internal states Transparent access to crypto hardware devices 27 Safety and security related features in

28 Security and Cryptographic Architecture Security Use Cases and corresponding security applications Crypto Module exposes an interface for security applications to allow for a generic access to standardized cryptographic routines Secure Flashing Authentication & Signature Function Enabling SWC Generic Crypto Access Crypto Module Generic Crypto Plug-In MD5 SHA-1 SHA-256 ECC RSA AES DES DH Crypto Module exposes an interface for cryptographic routines to allow for arbitrary implementations to plug-in into crypto module and for use by security applications Cryptographic routines may be offered by different vendors each specified for certain technologies (RSA, ECC, ) Security application is not aware of special realization of crypto routine Crypto routine may be realized even in hardware without notice of application 28 Safety and security related features in

29 Security in Embedding of Crypto Module Appl. 1 Appl. 2 Application Layer Crypto service manager (CSM) in system services of service layer Driver (HW) * Runtime Environment (RTE) CSM Basic Crypto Routines (SW) Services Layer System Services configurable and common access to cryptographic methods Microcontroller Crypto Service Manager ECU Layer SPI- Driver Microcontroller Layer Optional (*): Support for cryptographic hardware Crypto HW * 29 Safety and security related features in

30 Summary has become a global standard for embedded automotive software, providing specifications for architecture Development methodology application interfaces Already former releases (R2.1, R3.0, R3.1) can be used for safety related systems. With the R4.0 and further releases safety related systems are more and more supported. Security in enables the use of state-of-the-art cryptography in the automotive domain with standardized interfaces is a key enabler for managing the growing E/E complexity First series cars with technology are on the road 30 Safety and security related features in

31 Thank you for your attention! Become a member and get exploitation rights for the standard. Published Releases For information only, see disclaimer. 31 Safety and security related features in

Safety and Security Features in AUTOSAR

Safety and Security Features in AUTOSAR Safety and Security Features in AUTOSAR Nagarjuna Rao Kandimala, Michal Sojka Czech Technical University in Prague 166 27 Praha 6, Czech Republic Thursday 15 th November, 2012 Contents 1 Introduction 2

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded

More information

Product Information Services for Embedded Software

Product Information Services for Embedded Software Product Information Services for Embedded Software Table of Contents 1 Technical Consulting/Engineering Services... 3 1.1 Overview of Advantages... 3 1.2 Application Areas... 3 2 Product- Services - Proficient

More information

AUTOSAR Software Architecture

AUTOSAR Software Architecture AUTOSAR Software Architecture Robert Warschofsky Hasso-Plattner-Institute für Softwaresystemtechnik Abstract. AUTOSAR supports the re-use of software and hardware components of automotive electronic systems.

More information

Freescale Leadership in Driving Standards. Customer Relationships. Long-term Global Presence. Broadest Automotive MCU Product Portfolio

Freescale Leadership in Driving Standards. Customer Relationships. Long-term Global Presence. Broadest Automotive MCU Product Portfolio September 2013 Freescale Leadership in Driving Standards First semiconductor supplier to join the AUTOSAR partnership Active member of JASPAR Member of GENIVI Co-founded Open Alliance on Ethernet for Automotive

More information

User-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools

User-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools User-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools The simple CAN ECU is a thing of the past. Now, a typical ECU utilizes many functions of the AUTOSAR basic software to perform

More information

BMW Car IT GmbH. AUTOSAR - First Experiences and the Migration Strategy of the BMW Group

BMW Car IT GmbH. AUTOSAR - First Experiences and the Migration Strategy of the BMW Group BMW Car IT GmbH. - First Experiences and the Migration Strategy of the BMW Group Dr. Christian, BMW Car IT Page 2 - First Experiences. Overview. 1. Focus of this talk: Model based development under the

More information

Do AUTOSAR and functional safety rule each other out?

Do AUTOSAR and functional safety rule each other out? Software development Do AUTOSAR and functional safety rule each other out? While simplicity is a factor in safety-critical applications, AUTOSAR has over 6,000 configuration parameters and well over 100,000

More information

ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0

ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0 ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0 Dhanamjayan P.R. 1, Kuruvilla Jose 2, Manjusree S. 3 1 PG Scholar, Embedded Systems, 2 Specialist,

More information

AUTOSAR Configuration Process - How to handle 1000s of parameters

AUTOSAR Configuration Process - How to handle 1000s of parameters AUTOSAR Configuration Process - How to handle 1000s of parameters Webinar 2013-04-19 V2.0 2013-04-18 Agenda >Introduction AUTOSAR ECU Configuration Description ECU Configuration Workflow Multi-User Workflow

More information

Hardware-independent Software Development

Hardware-independent Software Development Hardware-independent Software Development with Stefan Bunzel, Khosrau Heidary(Continental); Simon Fürst, Andre Lajtkep (BMW Group); JürgenMössinger, Jürgen Cordes(Bosch); StefanSchmerler, ChristianKühn,

More information

AutoSAR Overview. FESA Workshop at KTH 2010 04 12. Prof. Jakob Axelsson Volvo Cars and Mälardalen University

AutoSAR Overview. FESA Workshop at KTH 2010 04 12. Prof. Jakob Axelsson Volvo Cars and Mälardalen University AutoSAR Overview FESA Workshop at KTH 2010 04 12 Prof. Jakob Axelsson Volvo Cars and Mälardalen University This presentation is based on a tutorial prepared by the AutoSAR Consortium AUTOSAR Members Status

More information

ISO 26262 Introduction

ISO 26262 Introduction ISO 26262 Introduction Prof. Christian Madritsch 2012 Table of Contents Structure of ISO 26262 Management of Functional Safety Product Development System Level Product Development Hardware Level Product

More information

AUTOSAR Handbook KPIT Technologies Ltd. CAN. Customizable HIS-MISRA. Configuration OSEK. Mode. Training ISO 14229. Management VCI

AUTOSAR Handbook KPIT Technologies Ltd. CAN. Customizable HIS-MISRA. Configuration OSEK. Mode. Training ISO 14229. Management VCI KPIT Technologies Ltd. Toolchain ASIL Decomposition ISO 14229 CAN Bootloader drivers R 3.x ARTOP Testing MCAL Migration enos Partner ECU R 4.x R 3.x R 3.x In-vehicle network Validation Tool chain Gateway

More information

Embedding Trust into Cars Secure Software Delivery and Installation

Embedding Trust into Cars Secure Software Delivery and Installation Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop

More information

Security in Vehicle Networks

Security in Vehicle Networks Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

Development of AUTOSAR Software Components within Model-Based Design

Development of AUTOSAR Software Components within Model-Based Design 2008-01-0383 Development of AUTOSAR Software Components within Model-Based Design Copyright 2008 The MathWorks, Inc. Guido Sandmann Automotive Marketing Manager, EMEA The MathWorks Richard Thompson Senior

More information

Intelligent development tools Design methods and tools Functional safety

Intelligent development tools Design methods and tools Functional safety Intelligent development tools Design methods and tools Functional safety Flanders DRIVE Index: Flanders DRIVE 1 Importance of functional safety 2 Functional safety for mechatronic systems 4 Global functional

More information

Safety compliance. Energy management. System architecture advisory services. Diagnostics. Network topologies. Physical and functional partitioning

Safety compliance. Energy management. System architecture advisory services. Diagnostics. Network topologies. Physical and functional partitioning Energy management Network topologies Physical and functional partitioning Safety compliance Diagnostics System architecture advisory services www.continental-corporation.com Why system architecture? 2

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

TÜ V Rheinland Industrie Service

TÜ V Rheinland Industrie Service TÜ V Rheinland Industrie Service Business Area: Automation / Functional Safety Contact Minsung Lee +82-2-860-9969 mailto : minsung.lee@kor.tuv.com Sales Account Manager for Functional Safety Fax +82-2-860-9862

More information

How to Upgrade SPICE-Compliant Processes for Functional Safety

How to Upgrade SPICE-Compliant Processes for Functional Safety How to Upgrade SPICE-Compliant Processes for Functional Safety Dr. Erwin Petry KUGLER MAAG CIE GmbH Leibnizstraße 11 70806 Kornwestheim Germany Mobile: +49 173 67 87 337 Tel: +49 7154-1796-222 Fax: +49

More information

Automotive Software Development Challenges Virtualisation and Embedded Security

Automotive Software Development Challenges Virtualisation and Embedded Security Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive

More information

ASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY

ASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY ASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY Dr. Qi Van Eikema Hommes SAE 2012 Government/Industry Meeting January 25, 2012 1 Outline ISO 26262 Overview Scope of the Assessment

More information

Herstellerinitiative Software (OEM Initiative Software)

Herstellerinitiative Software (OEM Initiative Software) Herstellerinitiative Software (OEM Initiative Software) Dr. Michael Daginnus Volkswagen AG Wolfsburg Dr. Dieter Marx Porsche AG Weissach Dr. Ralf Belschner Daimler AG Sindelfingen Kai Barbehön BMW AG München

More information

An introduction to AUTOSAR

An introduction to AUTOSAR An introduction to AUTOSAR AUTOSAR Consortium AUTOSAR What is AUTOSAR? AUTOSAR AUTomotive Open Systems ARchitecture Middleware and system-level standard, jointly developed by automobile manufacturers,

More information

Presented by: Jens Svensson, Volvo 3P. Volvo Group

Presented by: Jens Svensson, Volvo 3P. Volvo Group Presented by: Jens Svensson, Volvo 3P Welcome to is one of the world's leading suppliers of transport solutions for commercial use. We also provide complete solutions for financing and service. Volvo Trucks

More information

ISO 26262 Functional Safety Draft International Standard for Road Vehicles: Background, Status, and Overview

ISO 26262 Functional Safety Draft International Standard for Road Vehicles: Background, Status, and Overview ISO 26262 Functional Safety Draft International Standard for Road Vehicles: Background, Status, and Overview Barbara J. Czerny, Joseph D Ambrosio, Rami Debouk, General Motors Research and Development Kelly

More information

Principles of a Vehicle Infotainment Platform

Principles of a Vehicle Infotainment Platform Hans-Ulrich Michel BMW Group Forschung und Technik Principles of a Vehicle Infotainment Platform copyright 2004 by OSGi Alliance All rights reserved. Agenda Vehicle System Architecture Trends In Vehicle

More information

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé

More information

Automotive Software Engineering

Automotive Software Engineering Automotive Software Engineering List of Chapters: 1. Introduction and Overview 1.1 The Driver Vehicle Environment System 1.1.1 Design and Method of Operation of Vehicle Electronic 1.1.2 Electronic of the

More information

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions September 2013 Silicon Support & Professional Eng. Services Customer Experience Freescale Provided SW & Solutions Provide Valued Software, Support & Professional Engineering Services, Competitively 2 Customer

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

Mentor Embedded Automotive Solutions

Mentor Embedded Automotive Solutions Mentor Embedded Automotive Solutions Overview May 2013 mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered trademark

More information

AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems. Robert Leibinger 5 th June 2015

AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems. Robert Leibinger 5 th June 2015 AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems Robert Leibinger 5 th June 2015 Agenda Architecture requirements for ADAS ECU Overview of different architecture approaches Compare and contrast

More information

Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC

Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC 1 Public ETAS/ESC 2014-02-20 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, reproduction,

More information

Threat Model for Software Reconfigurable Communications Systems

Threat Model for Software Reconfigurable Communications Systems Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group Overview Overview of the

More information

Efficient and Faster PLC Software Development Process for Automotive industry. Demetrio Cortese IVECO Embedded Software Design

Efficient and Faster PLC Software Development Process for Automotive industry. Demetrio Cortese IVECO Embedded Software Design Efficient and Faster PLC Software Development Process for Automotive industry Demetrio Cortese IVECO Embedded Software Design 13-06-2013 Automotive OEM Mandatory Requirement Delivery the new vehicle in

More information

NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS

NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS André Groll, Jan Holle University of Siegen, Institute for Data Communications Systems {andre.groll,jan.holle}@uni-siegen.de

More information

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

Vehicular Security Hardware The Security for Vehicular Security Mechanisms escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security

More information

Software Components for Reliable Automotive Systems

Software Components for Reliable Automotive Systems Software Components for Reliable Automotive Systems H. Heinecke BMW Car IT GmbH Munich, Germany W. Damm, B. Josko, A. Metzner OFFIS Oldenburg, Germany A. Sangiovanni-Vincentelli Univ. of California Berkeley

More information

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

FIPS 140-2 Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0 FIPS 40-2 Non- Proprietary Security Policy McAfee SIEM Cryptographic Module, Version.0 Document Version.4 December 2, 203 Document Version.4 McAfee Page of 6 Prepared For: Prepared By: McAfee, Inc. 282

More information

EB Automotive Driver Assistance EB Assist Solutions. Damian Barnett Director Automotive Software June 5, 2015

EB Automotive Driver Assistance EB Assist Solutions. Damian Barnett Director Automotive Software June 5, 2015 EB Automotive Driver Assistance EB Assist Solutions Damian Barnett Director Automotive Software June 5, 2015 Advanced driver assistance systems Market growth The Growth of ADAS is predicted to be about

More information

Automotive Software Engineering at Hella KGaA. Software Engineering for Software Intensive Systems, 21.11.2005

Automotive Software Engineering at Hella KGaA. Software Engineering for Software Intensive Systems, 21.11.2005 Engineering for Intensive s, 21.11.2005 Overview Automotive Engineering Hella body electronics The process of product development -Engineering of mechatronic/embedded systems Discussion 2 Ulrich Nickel,

More information

Using BroadSAFE TM Technology 07/18/05

Using BroadSAFE TM Technology 07/18/05 Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security

More information

Plug and Play Solution for AUTOSAR Software Components

Plug and Play Solution for AUTOSAR Software Components Plug and Play Solution for AUTOSAR Software Components The interfaces defined in the AUTOSAR standard enable an easier assembly of the ECU application out of components from different suppliers. However,

More information

Safety Issues in Automotive Software

Safety Issues in Automotive Software Safety Issues in Automotive Software Paolo Panaroni, Giovanni Sartori INTECS S.p.A. SAFEWARE 1 INTECS & Safety A very large number of safety software development, V&V activities and research project on

More information

Seminar Automotive Open Systems Architecture

Seminar Automotive Open Systems Architecture Seminar Automotive Open Systems Architecture Modeling and Development of AUTOSAR Systems using SystemDesk Sebastian Wätzoldt Hasso-Plattner-Institut for IT Systems Engineering at the University of Potsdam

More information

Application of Software Watchdog as a Dependability Software Service for Automotive Safety Relevant Systems

Application of Software Watchdog as a Dependability Software Service for Automotive Safety Relevant Systems Application of Software Watchdog as a Dependability Software Service for Automotive Safety Relevant Systems Xi Chen Juejing Feng Martin Hiller Vera Lauer RWTH Aachen University Volvo Technology Aachen,

More information

Vehicle Electronics. Services and Solutions to Manage the Complexity

Vehicle Electronics. Services and Solutions to Manage the Complexity Vehicle Electronics Services and Solutions to Manage the Complexity INNOVATIONS & DEVELOPMENT CYCLES Commercial vehicle manufacturers are experiencing a technological change. In addition to the rising

More information

Standardized software components will help in mastering the. software should be developed for FlexRay were presented at

Standardized software components will help in mastering the. software should be developed for FlexRay were presented at Embedded Software for FlexRay Systems Special aspects and benefits of implementing modularized software Standardized software components will help in mastering the growing complexity of the interplay of

More information

Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software

Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software 133 Hitachi Review Vol. 63 (2014), No. 2 Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software Yoshinobu Fukano, Dr. Sci. Kosei Goto Masahiro Matsubara

More information

Keeping Up with the Data & Security Demands of the Automotive IoT

Keeping Up with the Data & Security Demands of the Automotive IoT Keeping Up with the Data & Security Demands of the Automotive IoT AESIN 2015 Robert Moran Automotive Systems Engineering O C T O B E R 2 0 1 5 External Use Keeping Up with the Data & Security Demands of

More information

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2 BlackBerry Enterprise Service 10 BlackBerry Device Service Solution Version: 10.2 Security Technical Overview Published: 2014-09-10 SWD-20140908123239883 Contents 1 About BlackBerry Device Service solution

More information

Vragen. Architecture presentations in practice. Some terms (from IEEE standard)

Vragen. Architecture presentations in practice. Some terms (from IEEE standard) Vragen Architecture presentations in practice Waarom is software architectuur belangrijk? Waarom schiet de volgende definitie tekort? The architecture of a software system defines that system in terms

More information

SHE Secure Hardware Extension

SHE Secure Hardware Extension SHE Secure Hardware Extension Data Security for Automotive Embedded Systems Workshop on Cryptography and Embedded Security Embedded World @ Nuremberg, February 2012 Content Data Security - What does it

More information

Secure Software Delivery and Installation in Embedded Systems

Secure Software Delivery and Installation in Embedded Systems Secure Software Delivery and Installation in Embedded Systems André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi Horst-Görtz-Institute, Bochum, Germany ISPEC 2005 Presentation Singapore, April 13, 2005

More information

Hardware Virtualization for Pre-Silicon Software Development in Automotive Electronics

Hardware Virtualization for Pre-Silicon Software Development in Automotive Electronics Hardware Virtualization for Pre-Silicon Software Development in Automotive Electronics Frank Schirrmeister, Filip Thoen fschirr@synopsys.com Synopsys, Inc. Market Trends & Challenges Growing electronics

More information

M-Shield mobile security technology

M-Shield mobile security technology Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a

More information

www.imprezer.tk Introduction to www.union88.tk RACE FUELS Hans-Christian von der Wense Munich, Germany

www.imprezer.tk Introduction to www.union88.tk RACE FUELS Hans-Christian von der Wense Munich, Germany Introduction to Hans-Christian von der Wense Munich, Germany Overview Progress in Automotive Electronics and it s Impacts on Networking LIN Consortium LIN Concept Physical Layer Data Link Layer LIN Network

More information

Software in safety critical systems

Software in safety critical systems Software in safety critical systems Software safety requirements Software safety integrity Budapest University of Technology and Economics Department of Measurement and Information Systems Definitions

More information

Local Interconnect Network Training. Local Interconnect Network Training. Overview

Local Interconnect Network Training. Local Interconnect Network Training. Overview Overview Local Interconnect Network Training History and introduction Technical features The ISO/OSI reference model and LIN Frames Message Frames Communication concept of LIN Command Frames and Extended

More information

Over-the-Air Software Updates: Deployment Strategies

Over-the-Air Software Updates: Deployment Strategies Over-the-Air Software Updates: Deployment Strategies John Cain Head of Business Development Arynga, Inc. September, 2014 Topics Covered What is OTA/FOTA/SOTA? How does it work? How and who does it benefit?

More information

ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL

ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL 61508-3 ª IEC: 1997 1 Version 12.0 05/12/97 COMMISSION CEI ELECTROTECHNIQUE IEC INTERNATIONALE 61508-3 INTERNATIONAL ELECTROTECHNICAL COMMISSION Functional safety of electrical/electronic/ programmable

More information

Simple and error-free startup of the communication cluster. as well as high system stability over long service life are

Simple and error-free startup of the communication cluster. as well as high system stability over long service life are Network Management for FlexRay New network topologies tested in practice Simple and error-free startup of the communication cluster as well as high system stability over long service life are required

More information

JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development

JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development ROADMAP TO AUTOMATED DRIVING Autonomous Driving (Chauffeured Driving) Increasing Capability

More information

Impact of Safety Standards to Processes and Methodologies. Dr. Herbert Eichfeld

Impact of Safety Standards to Processes and Methodologies. Dr. Herbert Eichfeld Impact of Safety Standards to Processes and Methodologies Dr. Herbert Eichfeld Impact to Processes, Methodologies, Products Processes + New/changed role descriptions (e.g. safety manager) + Assignments

More information

Embedded OS. Product Information

Embedded OS. Product Information Product Information Table of Contents 1 Operating Systems for ECUs... 3 2 MICROSAR.OS The Real-Time Operating System for the AUTOSAR Standard... 3 2.1 Overview of Advantages... 3 2.2 Properties... 4 2.3

More information

Introducing etoken. What is etoken?

Introducing etoken. What is etoken? Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant

More information

Software House Embedded Systems

Software House Embedded Systems Software House Embedded Systems Contacts: E-mobility, chassis, driver assistance and body electronics: Martin Richter +49 5371 805-1041 Infotainment, radio and instrument cluster: Sven Lochau +49 30 39978-7631

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of ncipher nshield Family of Hardware Security Modules Firmware Version 2.33.60 Issued by: Communications Security Establishment Canada Certification Body Canadian

More information

A Case Study of Application Development and Production Code Generation for a Telematics ECU with Full Unified Diagnostics Services

A Case Study of Application Development and Production Code Generation for a Telematics ECU with Full Unified Diagnostics Services A Case Study of Application Development and Production Code Generation for a Telematics ECU with Full Unified Diagnostics Services Plan A little about Embed and our Ethos Description of the telematics

More information

Open Source Software

Open Source Software Open Source Software Title Experiences and considerations about open source software for standard software components in automotive environments 2 Overview Experiences Project Findings Considerations X-by-wire

More information

ProSyst Software AG. for a smarter world. EuroCargo 2004 Joachim Ritter. Technical Consultant, ProSyst Software

ProSyst Software AG. for a smarter world. EuroCargo 2004 Joachim Ritter. Technical Consultant, ProSyst Software ProSyst Software AG for a smarter world. EuroCargo 2004 Joachim Ritter Technical Consultant, ProSyst Software 1 Overview Telematic Services Driver-Centric Services Safety (Curve warning) Efficiency (Predictive

More information

Secure Key Management A Key Feature for Modern Vehicle Electronics

Secure Key Management A Key Feature for Modern Vehicle Electronics 13AE-0069 Secure Key Management A Key Feature for Modern Vehicle Electronics Christian Schleiffer, Marko Wolf, André Weimerskirch, and Lars Wolleschensky ESCRYPT Copyright 2012 SAE International ABSTRACT

More information

Configuration management in AUTOSAR

Configuration management in AUTOSAR Configuration management in AUTOSAR The need for efficient process tools for Automotive System Engineering V0.01 2008-11-02 Introduction AUTOSAR will influence the ECU SW Architecture and also the way

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing

More information

siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office.

siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office. siemens.com/tolling Back-office system Server Supplies all front-end data. Suitable for any GNSS tolling back-office. Server: The universal back-office for efficient and effective toll collection Server

More information

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage

More information

IEC 61508 Functional Safety Assessment. Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter.

IEC 61508 Functional Safety Assessment. Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter. 61508 SIL 3 CAPABLE IEC 61508 Functional Safety Assessment Project: K-TEK Corporation AT100, AT100S, AT200 Magnetostrictive Level Transmitter Customer: K-TEK Corporation Prairieville, LA USA Contract No.:

More information

PrivyLink Cryptographic Key Server *

PrivyLink Cryptographic Key Server * WHITE PAPER PrivyLink Cryptographic Key * Tamper Resistant Protection of Key Information Assets for Preserving and Delivering End-to-End Trust and Values in e-businesses September 2003 E-commerce technology

More information

Safe-E. Safe-E Introduction. Coordination: Andreas ECKEL TTTech Computertechnik AG andreas.eckel@tttech.com

Safe-E. Safe-E Introduction. Coordination: Andreas ECKEL TTTech Computertechnik AG andreas.eckel@tttech.com Introduction Coordination: Andreas ECKEL TTTech Computertechnik AG andreas.eckel@tttech.com The Eurostars Project within the ITEA-2 Safe Project Eurostars : what is it and why?: Eurostars is an Eureka

More information

Functional Safety with ISO 26262 Principles and Practice Dr. Christof Ebert, Dr. Arnulf Braatz Vector Consulting Services

Functional Safety with ISO 26262 Principles and Practice Dr. Christof Ebert, Dr. Arnulf Braatz Vector Consulting Services Functional Safety with ISO 26262 Principles and Practice Dr. Christof Ebert, Dr. Arnulf Braatz Vector Consulting Services Welcome to the Webinar Functional Safety with ISO 26262 Webinar Part 1, Principles

More information

IT Architecture Review. ISACA Conference Fall 2003

IT Architecture Review. ISACA Conference Fall 2003 IT Architecture Review ISACA Conference Fall 2003 Table of Contents Introduction Business Drivers Overview of Tiered Architecture IT Architecture Review Why review IT architecture How to conduct IT architecture

More information

Software Production. Industrialized integration and validation of TargetLink models for series production

Software Production. Industrialized integration and validation of TargetLink models for series production PAGE 24 EB AUTOMOTIVE Industrialized integration and validation of TargetLink models for series production Continuous Software Production The complexity of software systems in vehicles is increasing at

More information

ipad in Business Security

ipad in Business Security ipad in Business Security Device protection Strong passcodes Passcode expiration Passcode reuse history Maximum failed attempts Over-the-air passcode enforcement Progressive passcode timeout Data security

More information

Managed Portable Security Devices

Managed Portable Security Devices Managed Portable Security Devices www.mxisecurity.com MXI Security leads the way in providing superior managed portable security solutions designed to meet the highest security and privacy standards of

More information

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128 SPC5 Software Cryptography Library Data brief SHA-512 Random engine based on DRBG-AES-128 RSA signature functions with PKCS#1v1.5 ECC (Elliptic Curve Cryptography): Key generation Scalar multiplication

More information

Value Paper Author: Edgar C. Ramirez. Diverse redundancy used in SIS technology to achieve higher safety integrity

Value Paper Author: Edgar C. Ramirez. Diverse redundancy used in SIS technology to achieve higher safety integrity Value Paper Author: Edgar C. Ramirez Diverse redundancy used in SIS technology to achieve higher safety integrity Diverse redundancy used in SIS technology to achieve higher safety integrity Abstract SIS

More information

Elektrobit (EB) Automotive Consulting Manage challenging automotive software projects

Elektrobit (EB) Automotive Consulting Manage challenging automotive software projects www.elektrobit.com Elektrobit (EB) Automotive Consulting Manage challenging automotive software projects EB Automotive Consulting Manage challenging automotive software projects The automotive industry

More information

BroadSAFE Enhanced IP Phone Networks

BroadSAFE Enhanced IP Phone Networks White Paper BroadSAFE Enhanced IP Phone Networks Secure VoIP Using the Broadcom BCM11xx IP Phone Technology September 2005 Executive Summary Voice over Internet Protocol (VoIP) enables telephone calls

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

Beschleunigen Sie die Entwicklung Ihrer Embedded Software mit Dienstleistungen von Vector

Beschleunigen Sie die Entwicklung Ihrer Embedded Software mit Dienstleistungen von Vector Beschleunigen Sie die Entwicklung Ihrer Embedded Software mit Dienstleistungen von Vector Vector Embedded Software 2013 V1.3.0 2013-04-04 Your Presenters Today Michael Buck Manager Product Services / Technical

More information

ISO 26262:2011 Functional Safety Assessment Report. Texas Instruments Richardson, TX USA. Project: TDA2X ADAS SoC. Customer:

ISO 26262:2011 Functional Safety Assessment Report. Texas Instruments Richardson, TX USA. Project: TDA2X ADAS SoC. Customer: ISO 26262:2011 Functional Safety Report Project: TDA2X ADAS SoC Customer: Texas Instruments Richardson, TX USA Contract No.: Q13/09-037 Report No.: TI 13-09-037 R002 Version V1, Revision R1, January 23,

More information

Pulse Secure, LLC. January 9, 2015

Pulse Secure, LLC. January 9, 2015 Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May

More information

PRIME IDENTITY MANAGEMENT CORE

PRIME IDENTITY MANAGEMENT CORE PRIME IDENTITY MANAGEMENT CORE For secure enrollment applications processing and workflow management. PRIME Identity Management Core provides the foundation for any biometric identification platform. It

More information

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST

Safeguarding Data Using Encryption. Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST Safeguarding Data Using Encryption Matthew Scholl & Andrew Regenscheid Computer Security Division, ITL, NIST What is Cryptography? Cryptography: The discipline that embodies principles, means, and methods

More information