Embedding Trust into Cars Secure Software Delivery and Installation
|
|
|
- Patrick Wiggins
- 10 years ago
- Views:
Transcription
1 Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop on Embedded Security in Cars (escar 2005) Cologne, November 29, 2005
2 AGENDA System model and assumptions Design options for a security architecture Fulfillment of functional requirements Compatibility assessment Rights Enforcement Determination of installation target 1
3 AGENDA System model and assumptions Design options for a security architecture Fulfillment of functional requirements Compatibility assessment Rights Enforcement Determination of installation target 2
4 The system model contains five different roles which correspond to the current players in the automotive industry ROLES IN THE SYSTEM MODEL AND THEIR COUNTERPARTS IN THE AUTOMOTIVE INDUSTRY Non-trusted Trusted OEM* Develops and assembles the vehicle in cooperation with his suppliers Examples: car manufacturers such as Daimler Chrysler, GM, Toyota, etc. Maintenance service provider (MSP) Maintains the vehicle via HW* repair/replacement and SW installation using specific equipment Examples: car dealers, garages, road service teams, etc. Vehicle Vehicle Owner/User Owns/uses the vehicle which contains several HW components whose SW can be updated Examples: you and me Maintenance SW Licenses Software application programmer (SAP) Develops and distributes SW* components for the vehicle to be installed at and after assembly time Examples: suppliers such as Bosch, Delphi, Denso, Siemens, Visteon, etc. Additional role: trusted third party (TTP) License provider (LP) Generates licenses for SW components of the SAPs and distributes them to vehicle owners via the MSPs Examples: not existing, but might be assumed by joint ventures of OEMs and/or SAPs * OEM: overall equipment manufacturer, SW: software, HW: hardware 3
5 Each role in the system model has specific requirements regarding software installation REQUIREMENTS OF ALL ROLES IN THE SYSTEM MODEL Straightforward Advanced OEM Correctness Compatibility enforcement MSP clearance enforcement Integrity Maintenance service provider (MSP) Correctness Non-repudiation MSP clearance enforcement Non-discrimination Frame-proofness Vehicle Owner/User Correctness Non-repudiation Authenticity Software application programmer (SAP) All OEM requirements Rights enforcement Confidentiality Non-discrimination License provider (LP) Correctness Non-repudiation 4
6 There is an exemplary SW installation protocol that consists of four basic steps FOUR STEPS OF AN EXEMPLARY SW INSTALLATION V* MSP* 1 SW request: SWReq(k,m,r n ) σ req 2 SW delivery: SWDel(s enc, γ lic ) 3 Installation ExtInstConf(γ lic, ind) confirmation: σ inst σ conf SW delivered to vehicle 4 Acknowledgment of confirmation: σ ack ConfAck (σ conf ) Based on asymmetric cryptography * V: Vehicle, MSP: Maintenance Service Provider Source: Technical Report "Secure Software Delivery and Installation in Embedded Systems", 5
7 AGENDA System model and assumptions Design options for a security architecture Fulfillment of functional requirements Compatibility assessment Rights Enforcement Determination of installation target 6
8 We propose to enhance the existing vehicle electronics architecture with a trusted component v 0 and individual secrets shared between v 0 and the other components ENHANCEMENT OF THE EXISTING VEHICLE ELECTRONICS ARCHITECTURE WITH A TRUSTED COMPUTING BASE Non-trusted Trusted Existing vehicle architecture Adding a trusted computing base V V I/O v 0 I/O v 1 v 2 v n v 1 v 2 v n Diagnostic tester performs SW delivery and installation directly over the internal communication network* No or low tamper resistance of ECUs** Adversary can install SW** in any ECU Diagnostic tester connects to a trusted component v 0 that uses tamper-resistant hardware v 0 shares an individual secret with each ECU to secure internal communication Trust assumption on v i may depend on the value of its software * The internal communication network consists of data busses such as CAN, LIN and MOST. ** ECU: Electronic Control Unit, SW: software v 0 authenticates every flash process 7
9 An additional trusted component eases the workload of regular components and fits better with the trust model, but induces additional costs and modifications PROS AND CONS OF AN ADDITIONAL TRUSTED COMPONENT Pros Computationally demanding subroutines of delivery protocol reside in trusted component instead of in each component, e.g., asymmetric cryptography Trusted component stores the vehicle s identity, avoiding a secret shared between all components, e.g., a signature key Vehicle owner doesn t have to trust the diagnostic tester, e.g., with respect to generation of signatures on behalf of the owner Cons Additional costs for hardware in each vehicle and development of the trusted component s software Trusted component does not strengthen any of the weaker components Modification of all ECUs* is still necessary in order to embed and protect the shared secret * ECU: electronic control unit 8
10 For construction of the trusted component, we assume four hardware and software components to be available: tamper-resistant hardware, a secure operating system, insecure mass memory, and a trustworthy module ASSUMPTIONS ON AVAILABLE HARDWARE AND SOFTWARE COMPONENTS FOR BUILDING THE TRUSTED COMPONENT 1 Tamper-resistant hardware 2 Secure operating system (OS) Central processing unit (CPU), memory and communication channels between them are tamper-resistant Memory components have high cost per byte of memory due to protection measures OS provides a protected environment for applications Isolation of processes Monitoring of boot process May be based on microkernel architectures, e.g., PERSEUS 3 Insecure mass memory 4 Trustworthy module (TM) Memory components with high storage capacity, e.g., random access memory (RAM) or hard disk Memory components have low cost per byte of memory due to lack of protection measures Provides security functionalities to be used by the secure OS Attestation (Assessment of the current configuration of v i ) Sealing (Binding of cryptographic secrets to a specific configuration) Example: Trusted Platform Module* * For details, see specification of the Trusted Computing Group at 9
11 We show three exemplary architectures for the trusted component that differ in their trust assumptions, complexity and flexibility QUICK OVERVIEW OF THREE POSSIBLE ARCHITECTURES FOR THE TRUSTED COMPONENT EXAMPLES Non-trusted Trusted Independent component Integrated component using secure memory Integrated component with insecure memory v 0 s 0 s 1 s m s 0 s 1 s m Memory OS CPU Memory OS CPU Mass memory TM Pros and cons Neither secure OS nor TM needed High cost per byte of memory Cost of the CPU attributable only to v 0 Pros and cons Cost of CPU shared with other SW components High cost per byte of memory Needs a secure OS Pros and cons Low cost per byte of memory due to small tamper-resistant memory Flexibility, e.g., for OS updates (open system) Needs secure OS and TM 10
12 The independent component derives its security from its complete tamper resistance and the closedness of the system, which may lead to an unfavorable cost structure SECURITY OF INDEPENDENT COMPONENT THROUGH TAMPER RESISTANCE AND CLOSEDNESS Design guidelines CPU and memory need to be tamper-resistant Tampering with ECU may additionally be complicated by using a strong mechanical casing and seal HW and SW need to be certified by a trusted third party; only this party may flash v 0, and only partially* Discussion Typical example of a closed system: Corresponds to trust assumptions on consumer electronics devices such as pay TV decoders Only v 0 uses the HW, whose cost is therefore attributable only to v 0 No use of inexpensive mass memory, therefore high cost per byte of memory * For example, the TTP might sign an update of v 0. Then v 0 updates itself (partially) after signature verification. 11
13 The integrated component using secure memory derives its security from its physical tamper resistance and the closedness of the trusted computing base, including a secure OS SECURITY OF INTEGRATED COMPONENT THROUGH TAMPER RESISTANCE AND ISOLATION Non-trusted Trusted s 0 s 1 s m Memory OS CPU Existing multimedia or dashboard ECU as candidate for integration of s 0 Design guidelines (additional to previous) Additional SW components s i may be installed in the same HW Secure OS needs to provide isolation to protect s 0 from other s i Only the TCB* needs to be certified by a trusted third party, which alone may perform updates of this TCB Discussion TCB still a closed system: Corresponds to trust assumptions on a pay TV decoder that allows SW installation, but no OS updates HW cost is attributable to s 0 and the other s i, which leads to (relative) cost reduction Still no use of inexpensive mass memory, therefore high cost per byte of memory * TCB: Trusted computing base, includes s 0, OS, memory and CPU 12
14 The integrated component with insecure mass memory derives its security from the physical tamper resistance of the trusted HW components and sealing of all secrets with a trustworthy configuration of the trusted computing base SECURITY OF INTEGRATED COMPONENT THROUGH TAMPER RESISTANCE, ISOLATION AND SEALING Non-trusted Trusted s 0 s 1 s m Memory OS CPU Mass memory TM Existing multimedia or dashboard ECU as candidate for integration of s 0 Design guidelines (additional to previous) After encryption*, program code and application data may be stored in insecure mass memory; after reading from mass memory, integrity needs to be verified Again, the TCB** needs to be certified and exclusively updated by a trusted third party Security-critical data needs to be sealed with a valid configuration of the TCB Discussion TCB is now an open system: Corresponds to trust assumptions on a desktop PC with a TPM HW cost is attributable to s 0 and the other s i, which leads to (relative) cost reduction Use of inexpensive mass memory, therefore low cost per byte of memory * For acceptable performance, encryption may need to be implemented in hardware, e.g., using AES. ** TCB: Trusted computing base, includes s 0, OS, memory, CPU and TM 13
15 AGENDA System model and assumptions Design options for a security architecture Fulfillment of functional requirements Compatibility assessment Rights Enforcement Determination of installation target 14
16 In addition to security requirements, the trusted component would enable fulfillment of functional requirements such as compatibility assessment, rights enforcement and determination of the installation target EFFICIENT FULFILLMENT OF ADDITIONAL REQUIREMENTS USING THE TRUSTED COMPONENT v 0 Covered in previous sections Topic of this section Cryptographic functionality Security requirements Secure storage Verifiable boot Requirements on v 0 Isolated execution Compatibility assessment Functional requirements Rights enforcement Determination of installation target 15
17 As an alternative to current compatibility assessment that is based on vehicle software configurations and MSP* decisions, the trusted component could assess compatibility based on standardized properties COMPATIBILITY ASSESSMENT: ALTERNATIVE APPROACH USING PROPERTIES MAINTAINED BY THE TRUSTED COMPONENT From MSP* decisions based on the vehicle s SW* configuration Allowed configurations list to decisions by the trusted component based on properties SW property sheet Fjord Siesta 09/ /2004 Diesel, left-hand drive Gasoline, automatic transmission Haves Adaptive Cruise control Needs Speed control Brake control For each SW component to be installed, the MSP decides compatibility based on allowed SW configurations, derived from Vehicle model Production date Engine, etc. Assessment is a lookup in a compatibility table, which can easily grow large and may become outdated Trusted component v 0 maintains a list of properties (or functionalities) of each SW component, e.g., controllability of engine speed, measurability of distances Each new SW component comes with a list of haves and needs Compatibility is given if and only if the SW component provides the haves of its prior version and finds the needs * MSP: maintenance service provider, SW: software 16
18 Given a trusted component v 0, computationally demanding subroutines of the license delivery protocol might move from the individual components to v 0 RIGHTS ENFORCEMENT: REDUCED WORKLOAD ON REGULAR COMPONENTS DUE TO TRUSTED COMPONENT From direct license delivery to delivery of simple parameters LP* license receipt v i license LP v 0 v i receipt parameters acknowledgement asymmetric crypto asymmetric crypto shared secret LP directly delivers the license to the ECU that executes the SW To fulfill the non-repudiation requirement, an implementation is likely to involve asymmetric cryptography** All ECUs need to be capable of executing the protocol LP delivers the license to the trusted component v 0, SW* is parameterized v 0 translates the terms and conditions into simple parameters and authenticates them with the shared secret** Performance requirements on the components v i decrease * LP: license provider, SW: software ** For example, authentication may be achieved with symmetric message authentication codes (MACs). 17
19 With the announcement of an industry-wide standard for an electronics architecture, the trusted component may help to determine the target ECU of a SW installation at runtime based on the vehicle s configuration DETERMINATION OF INSTALLATION TARGET: VEHICLE CONFIGURATION MAINTAINED BY THE TRUSTED COMPONENT Current situation AUTOSAR** standards Proposed solution with v 0 SW requirements SW* ECU* Memory req. Location req. Proximity req. For each SW and vehicle, there is only one target ECU for installation Neither at production time nor during the lifecycle, SW functionality can move from one ECU to another Industry-wide standards for vehicle electronics architecture RTE* provides abstraction from SW versions and specification of interfaces Target ECU may depend on available memory, location, etc. Trusted component v 0 stores current vehicle configuration Free flash memory per ECU Physical location of ECUs Mapping functionalities ECUs At SW installation time, v 0 determines optimum target ECU based on SW requirements and vehicle configuration * SW: software, ECU: electronic control unit, RTE: run-time environment ** AUTOSAR: Automotive Open System Architecture, URL 18
20 CONTACT TO THE AUTHORS Ulrich Huber Ahmad-Reza Sadeghi Horst Görtz Institute for IT Security Ruhr Universität Bochum Universitätsstraße Bochum GERMANY Website: 19
Secure Software Delivery and Installation in Embedded Systems
Secure Software Delivery and Installation in Embedded Systems André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi Horst-Görtz-Institute, Bochum, Germany ISPEC 2005 Presentation Singapore, April 13, 2005
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Secure Data Management in Trusted Computing
1 Secure Data Management in Trusted Computing Ulrich Kühn Deutsche Telekom Laboratories, TU Berlin Klaus Kursawe (KU Leuven) Stefan Lucks (U Mannheim) Ahmad-Reza Sadeghi (RU Bochum) Christian Stüble (RU
Patterns for Secure Boot and Secure Storage in Computer Systems
Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de
Safety and security related features in AUTOSAR
Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
Property Based TPM Virtualization
Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix
Vehicular Security Hardware The Security for Vehicular Security Mechanisms
escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security
Threat Model for Software Reconfigurable Communications Systems
Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group Overview Overview of the
Security in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
Uni-directional Trusted Path: Transaction Confirmation on Just One Device
Uni-directional Trusted Path: Transaction Confirmation on Just One Device Atanas Filyanov 1, Jonathan M. McCune 2, Ahmad-Reza Sadeghi 3, Marcel Winandy 1 1 Ruhr-University Bochum, Germany 2 Carnegie Mellon
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich [email protected] Fraunhofer Research Institution
Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution
1 Lecture Embedded System Security Dynamic Root of Trust and Execution Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2014 Dynamic Root
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé
Computer and Network Security
Computer and Network Security R. E. Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 [email protected] Introduction to Computer and Network Security
Vehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
How to Secure Infrastructure Clouds with Trusted Computing Technologies
How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.
Using BroadSAFE TM Technology 07/18/05
Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security
Building Blocks Towards a Trustworthy NFV Infrastructure
Building Blocks Towards a Trustworthy NFV Infrastructure IRTF NFVRG Adrian L. Shaw Hewlett-Packard Laboratories / July 22 nd, 2015 1 Why security and trust? Big requirement for critical
SHE Secure Hardware Extension
SHE Secure Hardware Extension Data Security for Automotive Embedded Systems Workshop on Cryptography and Embedded Security Embedded World @ Nuremberg, February 2012 Content Data Security - What does it
Digital Rights Management Demonstrator
Digital Rights Management Demonstrator Requirements, Analysis, and Design Authors: Andre Osterhues, Marko Wolf Institute: Ruhr-University Bochum Date: March 2, 2007 Abstract: This document describes a
BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation
BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker
Hardware Virtualization for Pre-Silicon Software Development in Automotive Electronics
Hardware Virtualization for Pre-Silicon Software Development in Automotive Electronics Frank Schirrmeister, Filip Thoen [email protected] Synopsys, Inc. Market Trends & Challenges Growing electronics
IoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
Pervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
IoT Security Platform
IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there
Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement
certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
Using etoken for SSL Web Authentication. SSL V3.0 Overview
Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents
Start building a trusted environment now... (before it s too late) IT Decision Makers
YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.
Trusted Platforms for Homeland Security
Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business
Presented by: Jens Svensson, Volvo 3P. Volvo Group
Presented by: Jens Svensson, Volvo 3P Welcome to is one of the world's leading suppliers of transport solutions for commercial use. We also provide complete solutions for financing and service. Volvo Trucks
Penetration Testing Windows Vista TM BitLocker TM
Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy
Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75
Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.
RSA Authentication for Secure Flashing of Automotive ECUs
RSA Authentication for Secure Flashing of Automotive ECUs Eduardo Ciniglio Emilio P. Mancini Umberto Villano November 17, 2010 Abstract In many embedded applications in the automotive field, there is the
ISO 26262 Introduction
ISO 26262 Introduction Prof. Christian Madritsch 2012 Table of Contents Structure of ISO 26262 Management of Functional Safety Product Development System Level Product Development Hardware Level Product
Opal SSDs Integrated with TPMs
Opal SSDs Integrated with TPMs August 21, 2012 Robert Thibadeau, Ph.D. U.S. Army SSDs Must be Opal s We also Studied using the TPM (Trusted Platform Module) with an Opal SSD (Self-Encrypting Drive) 2 Security
TÜ V Rheinland Industrie Service
TÜ V Rheinland Industrie Service Business Area: Automation / Functional Safety Contact Minsung Lee +82-2-860-9969 mailto : [email protected] Sales Account Manager for Functional Safety Fax +82-2-860-9862
The Reduced Address Space (RAS) for Application Memory Authentication
The Reduced Address Space (RAS) for Application Memory Authentication David Champagne, Reouven Elbaz and Ruby B. Lee Princeton University, USA Introduction Background: TPM, XOM, AEGIS, SP, SecureBlue want
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy
Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles
MovieLabs Specification for Enhanced Content Protection Version 1.0
MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies
Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik
Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued
Technical Brief Distributed Trusted Computing
Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,
Herstellerinitiative Software (OEM Initiative Software)
Herstellerinitiative Software (OEM Initiative Software) Dr. Michael Daginnus Volkswagen AG Wolfsburg Dr. Dieter Marx Porsche AG Weissach Dr. Ralf Belschner Daimler AG Sindelfingen Kai Barbehön BMW AG München
Creating a More Secure Device with Windows Embedded Compact 7. Douglas Boling Boling Consulting Inc.
Creating a More Secure Device with Windows Embedded Compact 7 Douglas Boling Boling Consulting Inc. About Douglas Boling Independent consultant specializing in Windows Mobile and Windows Embedded Compact
SPINS: Security Protocols for Sensor Networks
SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California
Product Information Services for Embedded Software
Product Information Services for Embedded Software Table of Contents 1 Technical Consulting/Engineering Services... 3 1.1 Overview of Advantages... 3 1.2 Application Areas... 3 2 Product- Services - Proficient
Secure Hardware PV018 Masaryk University Faculty of Informatics
Secure Hardware PV018 Masaryk University Faculty of Informatics Jan Krhovják Vašek Matyáš Roadmap Introduction The need of secure HW Basic terminology Architecture Cryptographic coprocessors/accelerators
Embedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
Offline HW/SW Authentication for Reconfigurable Platforms
Offline HW/SW Authentication for Reconfigurable Platforms Eric Simpson Virginia Tech [email protected] Patrick Schaumont Virginia Tech [email protected] Abstract Many Field-Programmable Gate Array (FPGA) based
Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft
Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes
Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0
Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography
Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC
Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC 1 Public ETAS/ESC 2014-02-20 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, reproduction,
Secure web transactions system
Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends
Attestation and Authentication Protocols Using the TPM
Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all
Efficient and Faster PLC Software Development Process for Automotive industry. Demetrio Cortese IVECO Embedded Software Design
Efficient and Faster PLC Software Development Process for Automotive industry Demetrio Cortese IVECO Embedded Software Design 13-06-2013 Automotive OEM Mandatory Requirement Delivery the new vehicle in
Principles of a Vehicle Infotainment Platform
Hans-Ulrich Michel BMW Group Forschung und Technik Principles of a Vehicle Infotainment Platform copyright 2004 by OSGi Alliance All rights reserved. Agenda Vehicle System Architecture Trends In Vehicle
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge
Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in
Embedded Trusted Computing on ARM-based systems
1 / 26 Embedded Trusted Computing on ARM-based systems Martin Schramm, M.Eng. 10.04.2014 Agenda 2 of 26 [email protected] Embedded computing platforms have become omnipresent intend to alleviate
User-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools
User-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools The simple CAN ECU is a thing of the past. Now, a typical ECU utilizes many functions of the AUTOSAR basic software to perform
Using AES 256 bit Encryption
Using AES 256 bit Encryption April 16 2014 There are many questions on How To Support AES256 bit encryption in an Industrial, Medical or Military Computer System. Programmable Encryption for Solid State
Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken
Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis
Introducing etoken. What is etoken?
Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant
OMAP platform security features
SWPT008 - July 2003 White Paper OMAP platform security features By Harini Sundaresan Applications Engineer, OMAP Security Texas Instruments, Wireless Terminal Business Unit This white paper introduces
Software in safety critical systems
Software in safety critical systems Software safety requirements Software safety integrity Budapest University of Technology and Economics Department of Measurement and Information Systems Definitions
IBM Crypto Server Management General Information Manual
CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.
Secure Key Management A Key Feature for Modern Vehicle Electronics
13AE-0069 Secure Key Management A Key Feature for Modern Vehicle Electronics Christian Schleiffer, Marko Wolf, André Weimerskirch, and Lars Wolleschensky ESCRYPT Copyright 2012 SAE International ABSTRACT
Side Channel Analysis and Embedded Systems Impact and Countermeasures
Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side
ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0
ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0 Dhanamjayan P.R. 1, Kuruvilla Jose 2, Manjusree S. 3 1 PG Scholar, Embedded Systems, 2 Specialist,
Innovations in Digital Signature. Rethinking Digital Signatures
Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance
Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu
UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi
Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public
A Draft Framework for Designing Cryptographic Key Management Systems
A Draft Framework for Designing Cryptographic Key Management Systems Elaine Barker Dennis Branstad Santosh Chokhani Miles Smid IEEE Key Management Summit May 4, 2010 Purpose of Presentation To define what
Standardized software components will help in mastering the. software should be developed for FlexRay were presented at
Embedded Software for FlexRay Systems Special aspects and benefits of implementing modularized software Standardized software components will help in mastering the growing complexity of the interplay of
Trustworthy Computing
Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with
Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication
01PC-422 Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication Pascal Jost IAS, University of Stuttgart, Germany Stephan Hoffmann Vector CANtech Inc., USA Copyright
siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office.
siemens.com/tolling Back-office system Server Supplies all front-end data. Suitable for any GNSS tolling back-office. Server: The universal back-office for efficient and effective toll collection Server
Secure Containers. Jan 2015 www.imgtec.com. Imagination Technologies HGI Dec, 2014 p1
Secure Containers Jan 2015 www.imgtec.com Imagination Technologies HGI Dec, 2014 p1 What are we protecting? Sensitive assets belonging to the user and the service provider Network Monitor unauthorized
Chapter 1: Introduction
Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure
Cornerstones of Security
Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to
High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago
High-speed cryptography and DNSCurve D. J. Bernstein University of Illinois at Chicago Stealing Internet mail: easy! Given a mail message: Your mail software sends a DNS request, receives a server address,
Safety and Security Features in AUTOSAR
Safety and Security Features in AUTOSAR Nagarjuna Rao Kandimala, Michal Sojka Czech Technical University in Prague 166 27 Praha 6, Czech Republic Thursday 15 th November, 2012 Contents 1 Introduction 2
Pulse Secure, LLC. January 9, 2015
Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May
Credential Management for Cloud Computing
Credential Management for Cloud Computing Workshop Cloud Security, 16.07.2014 Dr. Johannes Luyken Page 1 Security breaches increase in their impact by exploiting online access to confidential data that
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission
Secure Communications Product Brochure 01.01 R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission R&S MKS9680 Modular Encryption Device At a glance The R&S MKS9680 is a highly
SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter
SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems
Fastboot Techniques for x86 Architectures Marcus Bortel Field Application Engineer QNX Software Systems Agenda Introduction BIOS and BIOS boot time Fastboot versus BIOS? Fastboot time Customizing the boot
Overview. SSL Cryptography Overview CHAPTER 1
CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure
Index. BIOS rootkit, 119 Broad network access, 107
Index A Administrative components, 81, 83 Anti-malware, 125 ANY policy, 47 Asset tag, 114 Asymmetric encryption, 24 Attestation commercial market, 85 facts, 79 Intel TXT conceptual architecture, 85 models,
