Embedding Trust into Cars Secure Software Delivery and Installation

Size: px
Start display at page:

Download "Embedding Trust into Cars Secure Software Delivery and Installation"

Transcription

1 Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop on Embedded Security in Cars (escar 2005) Cologne, November 29, 2005

2 AGENDA System model and assumptions Design options for a security architecture Fulfillment of functional requirements Compatibility assessment Rights Enforcement Determination of installation target 1

3 AGENDA System model and assumptions Design options for a security architecture Fulfillment of functional requirements Compatibility assessment Rights Enforcement Determination of installation target 2

4 The system model contains five different roles which correspond to the current players in the automotive industry ROLES IN THE SYSTEM MODEL AND THEIR COUNTERPARTS IN THE AUTOMOTIVE INDUSTRY Non-trusted Trusted OEM* Develops and assembles the vehicle in cooperation with his suppliers Examples: car manufacturers such as Daimler Chrysler, GM, Toyota, etc. Maintenance service provider (MSP) Maintains the vehicle via HW* repair/replacement and SW installation using specific equipment Examples: car dealers, garages, road service teams, etc. Vehicle Vehicle Owner/User Owns/uses the vehicle which contains several HW components whose SW can be updated Examples: you and me Maintenance SW Licenses Software application programmer (SAP) Develops and distributes SW* components for the vehicle to be installed at and after assembly time Examples: suppliers such as Bosch, Delphi, Denso, Siemens, Visteon, etc. Additional role: trusted third party (TTP) License provider (LP) Generates licenses for SW components of the SAPs and distributes them to vehicle owners via the MSPs Examples: not existing, but might be assumed by joint ventures of OEMs and/or SAPs * OEM: overall equipment manufacturer, SW: software, HW: hardware 3

5 Each role in the system model has specific requirements regarding software installation REQUIREMENTS OF ALL ROLES IN THE SYSTEM MODEL Straightforward Advanced OEM Correctness Compatibility enforcement MSP clearance enforcement Integrity Maintenance service provider (MSP) Correctness Non-repudiation MSP clearance enforcement Non-discrimination Frame-proofness Vehicle Owner/User Correctness Non-repudiation Authenticity Software application programmer (SAP) All OEM requirements Rights enforcement Confidentiality Non-discrimination License provider (LP) Correctness Non-repudiation 4

6 There is an exemplary SW installation protocol that consists of four basic steps FOUR STEPS OF AN EXEMPLARY SW INSTALLATION V* MSP* 1 SW request: SWReq(k,m,r n ) σ req 2 SW delivery: SWDel(s enc, γ lic ) 3 Installation ExtInstConf(γ lic, ind) confirmation: σ inst σ conf SW delivered to vehicle 4 Acknowledgment of confirmation: σ ack ConfAck (σ conf ) Based on asymmetric cryptography * V: Vehicle, MSP: Maintenance Service Provider Source: Technical Report "Secure Software Delivery and Installation in Embedded Systems", 5

7 AGENDA System model and assumptions Design options for a security architecture Fulfillment of functional requirements Compatibility assessment Rights Enforcement Determination of installation target 6

8 We propose to enhance the existing vehicle electronics architecture with a trusted component v 0 and individual secrets shared between v 0 and the other components ENHANCEMENT OF THE EXISTING VEHICLE ELECTRONICS ARCHITECTURE WITH A TRUSTED COMPUTING BASE Non-trusted Trusted Existing vehicle architecture Adding a trusted computing base V V I/O v 0 I/O v 1 v 2 v n v 1 v 2 v n Diagnostic tester performs SW delivery and installation directly over the internal communication network* No or low tamper resistance of ECUs** Adversary can install SW** in any ECU Diagnostic tester connects to a trusted component v 0 that uses tamper-resistant hardware v 0 shares an individual secret with each ECU to secure internal communication Trust assumption on v i may depend on the value of its software * The internal communication network consists of data busses such as CAN, LIN and MOST. ** ECU: Electronic Control Unit, SW: software v 0 authenticates every flash process 7

9 An additional trusted component eases the workload of regular components and fits better with the trust model, but induces additional costs and modifications PROS AND CONS OF AN ADDITIONAL TRUSTED COMPONENT Pros Computationally demanding subroutines of delivery protocol reside in trusted component instead of in each component, e.g., asymmetric cryptography Trusted component stores the vehicle s identity, avoiding a secret shared between all components, e.g., a signature key Vehicle owner doesn t have to trust the diagnostic tester, e.g., with respect to generation of signatures on behalf of the owner Cons Additional costs for hardware in each vehicle and development of the trusted component s software Trusted component does not strengthen any of the weaker components Modification of all ECUs* is still necessary in order to embed and protect the shared secret * ECU: electronic control unit 8

10 For construction of the trusted component, we assume four hardware and software components to be available: tamper-resistant hardware, a secure operating system, insecure mass memory, and a trustworthy module ASSUMPTIONS ON AVAILABLE HARDWARE AND SOFTWARE COMPONENTS FOR BUILDING THE TRUSTED COMPONENT 1 Tamper-resistant hardware 2 Secure operating system (OS) Central processing unit (CPU), memory and communication channels between them are tamper-resistant Memory components have high cost per byte of memory due to protection measures OS provides a protected environment for applications Isolation of processes Monitoring of boot process May be based on microkernel architectures, e.g., PERSEUS 3 Insecure mass memory 4 Trustworthy module (TM) Memory components with high storage capacity, e.g., random access memory (RAM) or hard disk Memory components have low cost per byte of memory due to lack of protection measures Provides security functionalities to be used by the secure OS Attestation (Assessment of the current configuration of v i ) Sealing (Binding of cryptographic secrets to a specific configuration) Example: Trusted Platform Module* * For details, see specification of the Trusted Computing Group at 9

11 We show three exemplary architectures for the trusted component that differ in their trust assumptions, complexity and flexibility QUICK OVERVIEW OF THREE POSSIBLE ARCHITECTURES FOR THE TRUSTED COMPONENT EXAMPLES Non-trusted Trusted Independent component Integrated component using secure memory Integrated component with insecure memory v 0 s 0 s 1 s m s 0 s 1 s m Memory OS CPU Memory OS CPU Mass memory TM Pros and cons Neither secure OS nor TM needed High cost per byte of memory Cost of the CPU attributable only to v 0 Pros and cons Cost of CPU shared with other SW components High cost per byte of memory Needs a secure OS Pros and cons Low cost per byte of memory due to small tamper-resistant memory Flexibility, e.g., for OS updates (open system) Needs secure OS and TM 10

12 The independent component derives its security from its complete tamper resistance and the closedness of the system, which may lead to an unfavorable cost structure SECURITY OF INDEPENDENT COMPONENT THROUGH TAMPER RESISTANCE AND CLOSEDNESS Design guidelines CPU and memory need to be tamper-resistant Tampering with ECU may additionally be complicated by using a strong mechanical casing and seal HW and SW need to be certified by a trusted third party; only this party may flash v 0, and only partially* Discussion Typical example of a closed system: Corresponds to trust assumptions on consumer electronics devices such as pay TV decoders Only v 0 uses the HW, whose cost is therefore attributable only to v 0 No use of inexpensive mass memory, therefore high cost per byte of memory * For example, the TTP might sign an update of v 0. Then v 0 updates itself (partially) after signature verification. 11

13 The integrated component using secure memory derives its security from its physical tamper resistance and the closedness of the trusted computing base, including a secure OS SECURITY OF INTEGRATED COMPONENT THROUGH TAMPER RESISTANCE AND ISOLATION Non-trusted Trusted s 0 s 1 s m Memory OS CPU Existing multimedia or dashboard ECU as candidate for integration of s 0 Design guidelines (additional to previous) Additional SW components s i may be installed in the same HW Secure OS needs to provide isolation to protect s 0 from other s i Only the TCB* needs to be certified by a trusted third party, which alone may perform updates of this TCB Discussion TCB still a closed system: Corresponds to trust assumptions on a pay TV decoder that allows SW installation, but no OS updates HW cost is attributable to s 0 and the other s i, which leads to (relative) cost reduction Still no use of inexpensive mass memory, therefore high cost per byte of memory * TCB: Trusted computing base, includes s 0, OS, memory and CPU 12

14 The integrated component with insecure mass memory derives its security from the physical tamper resistance of the trusted HW components and sealing of all secrets with a trustworthy configuration of the trusted computing base SECURITY OF INTEGRATED COMPONENT THROUGH TAMPER RESISTANCE, ISOLATION AND SEALING Non-trusted Trusted s 0 s 1 s m Memory OS CPU Mass memory TM Existing multimedia or dashboard ECU as candidate for integration of s 0 Design guidelines (additional to previous) After encryption*, program code and application data may be stored in insecure mass memory; after reading from mass memory, integrity needs to be verified Again, the TCB** needs to be certified and exclusively updated by a trusted third party Security-critical data needs to be sealed with a valid configuration of the TCB Discussion TCB is now an open system: Corresponds to trust assumptions on a desktop PC with a TPM HW cost is attributable to s 0 and the other s i, which leads to (relative) cost reduction Use of inexpensive mass memory, therefore low cost per byte of memory * For acceptable performance, encryption may need to be implemented in hardware, e.g., using AES. ** TCB: Trusted computing base, includes s 0, OS, memory, CPU and TM 13

15 AGENDA System model and assumptions Design options for a security architecture Fulfillment of functional requirements Compatibility assessment Rights Enforcement Determination of installation target 14

16 In addition to security requirements, the trusted component would enable fulfillment of functional requirements such as compatibility assessment, rights enforcement and determination of the installation target EFFICIENT FULFILLMENT OF ADDITIONAL REQUIREMENTS USING THE TRUSTED COMPONENT v 0 Covered in previous sections Topic of this section Cryptographic functionality Security requirements Secure storage Verifiable boot Requirements on v 0 Isolated execution Compatibility assessment Functional requirements Rights enforcement Determination of installation target 15

17 As an alternative to current compatibility assessment that is based on vehicle software configurations and MSP* decisions, the trusted component could assess compatibility based on standardized properties COMPATIBILITY ASSESSMENT: ALTERNATIVE APPROACH USING PROPERTIES MAINTAINED BY THE TRUSTED COMPONENT From MSP* decisions based on the vehicle s SW* configuration Allowed configurations list to decisions by the trusted component based on properties SW property sheet Fjord Siesta 09/ /2004 Diesel, left-hand drive Gasoline, automatic transmission Haves Adaptive Cruise control Needs Speed control Brake control For each SW component to be installed, the MSP decides compatibility based on allowed SW configurations, derived from Vehicle model Production date Engine, etc. Assessment is a lookup in a compatibility table, which can easily grow large and may become outdated Trusted component v 0 maintains a list of properties (or functionalities) of each SW component, e.g., controllability of engine speed, measurability of distances Each new SW component comes with a list of haves and needs Compatibility is given if and only if the SW component provides the haves of its prior version and finds the needs * MSP: maintenance service provider, SW: software 16

18 Given a trusted component v 0, computationally demanding subroutines of the license delivery protocol might move from the individual components to v 0 RIGHTS ENFORCEMENT: REDUCED WORKLOAD ON REGULAR COMPONENTS DUE TO TRUSTED COMPONENT From direct license delivery to delivery of simple parameters LP* license receipt v i license LP v 0 v i receipt parameters acknowledgement asymmetric crypto asymmetric crypto shared secret LP directly delivers the license to the ECU that executes the SW To fulfill the non-repudiation requirement, an implementation is likely to involve asymmetric cryptography** All ECUs need to be capable of executing the protocol LP delivers the license to the trusted component v 0, SW* is parameterized v 0 translates the terms and conditions into simple parameters and authenticates them with the shared secret** Performance requirements on the components v i decrease * LP: license provider, SW: software ** For example, authentication may be achieved with symmetric message authentication codes (MACs). 17

19 With the announcement of an industry-wide standard for an electronics architecture, the trusted component may help to determine the target ECU of a SW installation at runtime based on the vehicle s configuration DETERMINATION OF INSTALLATION TARGET: VEHICLE CONFIGURATION MAINTAINED BY THE TRUSTED COMPONENT Current situation AUTOSAR** standards Proposed solution with v 0 SW requirements SW* ECU* Memory req. Location req. Proximity req. For each SW and vehicle, there is only one target ECU for installation Neither at production time nor during the lifecycle, SW functionality can move from one ECU to another Industry-wide standards for vehicle electronics architecture RTE* provides abstraction from SW versions and specification of interfaces Target ECU may depend on available memory, location, etc. Trusted component v 0 stores current vehicle configuration Free flash memory per ECU Physical location of ECUs Mapping functionalities ECUs At SW installation time, v 0 determines optimum target ECU based on SW requirements and vehicle configuration * SW: software, ECU: electronic control unit, RTE: run-time environment ** AUTOSAR: Automotive Open System Architecture, URL 18

20 CONTACT TO THE AUTHORS Ulrich Huber Ahmad-Reza Sadeghi Horst Görtz Institute for IT Security Ruhr Universität Bochum Universitätsstraße Bochum GERMANY Website: 19

Secure Software Delivery and Installation in Embedded Systems

Secure Software Delivery and Installation in Embedded Systems Secure Software Delivery and Installation in Embedded Systems André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi Horst-Görtz-Institute, Bochum, Germany ISPEC 2005 Presentation Singapore, April 13, 2005

More information

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded

More information

Secure Data Management in Trusted Computing

Secure Data Management in Trusted Computing 1 Secure Data Management in Trusted Computing Ulrich Kühn Deutsche Telekom Laboratories, TU Berlin Klaus Kursawe (KU Leuven) Stefan Lucks (U Mannheim) Ahmad-Reza Sadeghi (RU Bochum) Christian Stüble (RU

More information

Patterns for Secure Boot and Secure Storage in Computer Systems

Patterns for Secure Boot and Secure Storage in Computer Systems Patterns for Secure Boot and Secure Storage in Computer Systems Hans Löhr, Ahmad-Reza Sadeghi, Marcel Winandy Horst Görtz Institute for IT Security, Ruhr-University Bochum, Germany {hans.loehr,ahmad.sadeghi,marcel.winandy}@trust.rub.de

More information

Safety and security related features in AUTOSAR

Safety and security related features in AUTOSAR Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

Property Based TPM Virtualization

Property Based TPM Virtualization Property Based Virtualization Marcel Winandy Joint work with: Ahmad Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security Chair for System Security Ruhr University Bochum, Germany Sirrix

More information

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

Vehicular Security Hardware The Security for Vehicular Security Mechanisms escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security

More information

Threat Model for Software Reconfigurable Communications Systems

Threat Model for Software Reconfigurable Communications Systems Threat Model for Software Reconfigurable Communications Systems Presented to the Management Group 6 March 007 Bernard Eydt Booz Allen Hamilton Chair, SDR Security Working Group Overview Overview of the

More information

Security in Vehicle Networks

Security in Vehicle Networks Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development

More information

Uni-directional Trusted Path: Transaction Confirmation on Just One Device

Uni-directional Trusted Path: Transaction Confirmation on Just One Device Uni-directional Trusted Path: Transaction Confirmation on Just One Device Atanas Filyanov 1, Jonathan M. McCune 2, Ahmad-Reza Sadeghi 3, Marcel Winandy 1 1 Ruhr-University Bochum, Germany 2 Carnegie Mellon

More information

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich [email protected] Fraunhofer Research Institution

More information

Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution

Lecture Embedded System Security Dynamic Root of Trust and Trusted Execution 1 Lecture Embedded System Security Dynamic Root of Trust and Execution Prof. Dr.-Ing. Ahmad-Reza Sadeghi System Security Lab Technische Universität Darmstadt (CASED) Germany Summer Term 2014 Dynamic Root

More information

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé

More information

Computer and Network Security

Computer and Network Security Computer and Network Security R. E. Newman Computer & Information Sciences & Engineering University Of Florida Gainesville, Florida 32611-6120 [email protected] Introduction to Computer and Network Security

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

How to Secure Infrastructure Clouds with Trusted Computing Technologies

How to Secure Infrastructure Clouds with Trusted Computing Technologies How to Secure Infrastructure Clouds with Trusted Computing Technologies Nicolae Paladi Swedish Institute of Computer Science 2 Contents 1. Infrastructure-as-a-Service 2. Security challenges of IaaS 3.

More information

Using BroadSAFE TM Technology 07/18/05

Using BroadSAFE TM Technology 07/18/05 Using BroadSAFE TM Technology 07/18/05 Layers of a Security System Security System Data Encryption Key Negotiation Authentication Identity Root Key Once root is compromised, all subsequent layers of security

More information

Building Blocks Towards a Trustworthy NFV Infrastructure

Building Blocks Towards a Trustworthy NFV Infrastructure Building Blocks Towards a Trustworthy NFV Infrastructure IRTF NFVRG Adrian L. Shaw Hewlett-Packard Laboratories / July 22 nd, 2015 1 Why security and trust? Big requirement for critical

More information

SHE Secure Hardware Extension

SHE Secure Hardware Extension SHE Secure Hardware Extension Data Security for Automotive Embedded Systems Workshop on Cryptography and Embedded Security Embedded World @ Nuremberg, February 2012 Content Data Security - What does it

More information

Digital Rights Management Demonstrator

Digital Rights Management Demonstrator Digital Rights Management Demonstrator Requirements, Analysis, and Design Authors: Andre Osterhues, Marko Wolf Institute: Ruhr-University Bochum Date: March 2, 2007 Abstract: This document describes a

More information

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation BitLocker Drive Encryption Hardware Enhanced Data Protection Shon Eizenhoefer, Program Manager Microsoft Corporation Agenda Security Background BitLocker Drive Encryption TPM Overview Building a BitLocker

More information

Hardware Virtualization for Pre-Silicon Software Development in Automotive Electronics

Hardware Virtualization for Pre-Silicon Software Development in Automotive Electronics Hardware Virtualization for Pre-Silicon Software Development in Automotive Electronics Frank Schirrmeister, Filip Thoen [email protected] Synopsys, Inc. Market Trends & Challenges Growing electronics

More information

IoT Security Concerns and Renesas Synergy Solutions

IoT Security Concerns and Renesas Synergy Solutions IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas

More information

Pervasive Computing und. Informationssicherheit

Pervasive Computing und. Informationssicherheit Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing

More information

IoT Security Platform

IoT Security Platform IoT Security Platform 2 Introduction Wars begin when the costs of attack are low, the benefits for a victor are high, and there is an inability to enforce law. The same is true in cyberwars. Today there

More information

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement certicom application notes Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS 140-2 security requirement THE PROBLEM How can vendors take advantage

More information

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of

More information

Using etoken for SSL Web Authentication. SSL V3.0 Overview

Using etoken for SSL Web Authentication. SSL V3.0 Overview Using etoken for SSL Web Authentication Lesson 12 April 2004 etoken Certification Course SSL V3.0 Overview Secure Sockets Layer protocol, version 3.0 Provides communication privacy over the internet. Prevents

More information

Start building a trusted environment now... (before it s too late) IT Decision Makers

Start building a trusted environment now... (before it s too late) IT Decision Makers YOU CAN T got HAP Start building a trusted environment now... IT Decision Makers (before it s too late) HAP reference implementations and commercial solutions are available now in the HAP Developer Kit.

More information

Trusted Platforms for Homeland Security

Trusted Platforms for Homeland Security Trusted Platforms for Homeland Security By Kevin Schutz, Product Manager Secure Products Summary Ongoing threats from hackers, viruses, and worms continue to make security a top priority for IT and business

More information

Presented by: Jens Svensson, Volvo 3P. Volvo Group

Presented by: Jens Svensson, Volvo 3P. Volvo Group Presented by: Jens Svensson, Volvo 3P Welcome to is one of the world's leading suppliers of transport solutions for commercial use. We also provide complete solutions for financing and service. Volvo Trucks

More information

Penetration Testing Windows Vista TM BitLocker TM

Penetration Testing Windows Vista TM BitLocker TM Penetration Testing BitLocker TM Drive Encryption Douglas MacIver Penetration Engineer System Integrity Group, Corporation Hack In The Box 2006/09/21 2006 Corporation. All rights reserved. Trustworthy

More information

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75

Plain English Guide To Common Criteria Requirements In The. Field Device Protection Profile Version 0.75 Plain English Guide To Common Criteria Requirements In The Field Device Protection Profile Version 0.75 Prepared For: Process Control Security Requirements Forum (PCSRF) Prepared By: Digital Bond, Inc.

More information

RSA Authentication for Secure Flashing of Automotive ECUs

RSA Authentication for Secure Flashing of Automotive ECUs RSA Authentication for Secure Flashing of Automotive ECUs Eduardo Ciniglio Emilio P. Mancini Umberto Villano November 17, 2010 Abstract In many embedded applications in the automotive field, there is the

More information

ISO 26262 Introduction

ISO 26262 Introduction ISO 26262 Introduction Prof. Christian Madritsch 2012 Table of Contents Structure of ISO 26262 Management of Functional Safety Product Development System Level Product Development Hardware Level Product

More information

Opal SSDs Integrated with TPMs

Opal SSDs Integrated with TPMs Opal SSDs Integrated with TPMs August 21, 2012 Robert Thibadeau, Ph.D. U.S. Army SSDs Must be Opal s We also Studied using the TPM (Trusted Platform Module) with an Opal SSD (Self-Encrypting Drive) 2 Security

More information

TÜ V Rheinland Industrie Service

TÜ V Rheinland Industrie Service TÜ V Rheinland Industrie Service Business Area: Automation / Functional Safety Contact Minsung Lee +82-2-860-9969 mailto : [email protected] Sales Account Manager for Functional Safety Fax +82-2-860-9862

More information

The Reduced Address Space (RAS) for Application Memory Authentication

The Reduced Address Space (RAS) for Application Memory Authentication The Reduced Address Space (RAS) for Application Memory Authentication David Champagne, Reouven Elbaz and Ruby B. Lee Princeton University, USA Introduction Background: TPM, XOM, AEGIS, SP, SecureBlue want

More information

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy

Secure Network Communications FIPS 140 2 Non Proprietary Security Policy Secure Network Communications FIPS 140 2 Non Proprietary Security Policy 21 June 2010 Table of Contents Introduction Module Specification Ports and Interfaces Approved Algorithms Test Environment Roles

More information

MovieLabs Specification for Enhanced Content Protection Version 1.0

MovieLabs Specification for Enhanced Content Protection Version 1.0 MovieLabs Specification for Enhanced Content Protection Version 1.0 Introduction Digital content distribution technologies are evolving and advancing at a rapid pace. Content creators are using these technologies

More information

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik

Cryptographic Modules, Security Level Enhanced. Endorsed by the Bundesamt für Sicherheit in der Informationstechnik Common Criteria Protection Profile Cryptographic Modules, Security Level Enhanced BSI-CC-PP-0045 Endorsed by the Foreword This Protection Profile - Cryptographic Modules, Security Level Enhanced - is issued

More information

Technical Brief Distributed Trusted Computing

Technical Brief Distributed Trusted Computing Technical Brief Distributed Trusted Computing Josh Wood Look inside to learn about Distributed Trusted Computing in Tectonic Enterprise, an industry-first set of technologies that cryptographically verify,

More information

Herstellerinitiative Software (OEM Initiative Software)

Herstellerinitiative Software (OEM Initiative Software) Herstellerinitiative Software (OEM Initiative Software) Dr. Michael Daginnus Volkswagen AG Wolfsburg Dr. Dieter Marx Porsche AG Weissach Dr. Ralf Belschner Daimler AG Sindelfingen Kai Barbehön BMW AG München

More information

Creating a More Secure Device with Windows Embedded Compact 7. Douglas Boling Boling Consulting Inc.

Creating a More Secure Device with Windows Embedded Compact 7. Douglas Boling Boling Consulting Inc. Creating a More Secure Device with Windows Embedded Compact 7 Douglas Boling Boling Consulting Inc. About Douglas Boling Independent consultant specializing in Windows Mobile and Windows Embedded Compact

More information

SPINS: Security Protocols for Sensor Networks

SPINS: Security Protocols for Sensor Networks SPINS: Security Protocols for Sensor Networks Adrian Perrig, Robert Szewczyk, J.D. Tygar, Victor Wen, and David Culler Department of Electrical Engineering & Computer Sciences, University of California

More information

Product Information Services for Embedded Software

Product Information Services for Embedded Software Product Information Services for Embedded Software Table of Contents 1 Technical Consulting/Engineering Services... 3 1.1 Overview of Advantages... 3 1.2 Application Areas... 3 2 Product- Services - Proficient

More information

Secure Hardware PV018 Masaryk University Faculty of Informatics

Secure Hardware PV018 Masaryk University Faculty of Informatics Secure Hardware PV018 Masaryk University Faculty of Informatics Jan Krhovják Vašek Matyáš Roadmap Introduction The need of secure HW Basic terminology Architecture Cryptographic coprocessors/accelerators

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

Offline HW/SW Authentication for Reconfigurable Platforms

Offline HW/SW Authentication for Reconfigurable Platforms Offline HW/SW Authentication for Reconfigurable Platforms Eric Simpson Virginia Tech [email protected] Patrick Schaumont Virginia Tech [email protected] Abstract Many Field-Programmable Gate Array (FPGA) based

More information

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft

Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht (info@eonline.de) V0.1draft Application Report Secure My-d TM and Mifare TM RFID reader system by using a security access module Erich Englbrecht ([email protected]) V0.1draft Embedded RF ABSTRACT This application report describes

More information

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0

Entrust Managed Services PKI. Getting started with digital certificates and Entrust Managed Services PKI. Document issue: 1.0 Entrust Managed Services PKI Getting started with digital certificates and Entrust Managed Services PKI Document issue: 1.0 Date of issue: May 2009 Copyright 2009 Entrust. All rights reserved. Entrust

More information

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography What Is Steganography? Steganography Process of hiding the existence of the data within another file Example:

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463

More information

M-Shield mobile security technology

M-Shield mobile security technology Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a

More information

Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC

Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC 1 Public ETAS/ESC 2014-02-20 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, reproduction,

More information

Secure web transactions system

Secure web transactions system Secure web transactions system TRUSTED WEB SECURITY MODEL Recently, as the generally accepted model in Internet application development, three-tier or multi-tier applications are used. Moreover, new trends

More information

Attestation and Authentication Protocols Using the TPM

Attestation and Authentication Protocols Using the TPM Attestation and Authentication Protocols Using the TPM Ariel Segall June 21, 2011 Approved for Public Release: 11-2876. Distribution Unlimited. c 2011. All Rights Reserved. (1/28) Motivation Almost all

More information

Efficient and Faster PLC Software Development Process for Automotive industry. Demetrio Cortese IVECO Embedded Software Design

Efficient and Faster PLC Software Development Process for Automotive industry. Demetrio Cortese IVECO Embedded Software Design Efficient and Faster PLC Software Development Process for Automotive industry Demetrio Cortese IVECO Embedded Software Design 13-06-2013 Automotive OEM Mandatory Requirement Delivery the new vehicle in

More information

Principles of a Vehicle Infotainment Platform

Principles of a Vehicle Infotainment Platform Hans-Ulrich Michel BMW Group Forschung und Technik Principles of a Vehicle Infotainment Platform copyright 2004 by OSGi Alliance All rights reserved. Agenda Vehicle System Architecture Trends In Vehicle

More information

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge

Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Secure Embedded Systems eine Voraussetzung für Cyber Physical Systems und das Internet der Dinge Mitgliederversammlung EIKON e.v. 26. Februar 2014 Prof. Dr.-Ing. Georg Sigl Lehrstuhl für Sicherheit in

More information

Embedded Trusted Computing on ARM-based systems

Embedded Trusted Computing on ARM-based systems 1 / 26 Embedded Trusted Computing on ARM-based systems Martin Schramm, M.Eng. 10.04.2014 Agenda 2 of 26 [email protected] Embedded computing platforms have become omnipresent intend to alleviate

More information

User-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools

User-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools User-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools The simple CAN ECU is a thing of the past. Now, a typical ECU utilizes many functions of the AUTOSAR basic software to perform

More information

Using AES 256 bit Encryption

Using AES 256 bit Encryption Using AES 256 bit Encryption April 16 2014 There are many questions on How To Support AES256 bit encryption in an Industrial, Medical or Military Computer System. Programmable Encryption for Solid State

More information

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken

Bypassing Local Windows Authentication to Defeat Full Disk Encryption. Ian Haken Bypassing Local Windows Authentication to Defeat Full Disk Encryption Ian Haken Who Am I? Currently a security researcher at Synopsys, working on application security tools and Coverity s static analysis

More information

Introducing etoken. What is etoken?

Introducing etoken. What is etoken? Introducing etoken Nirit Bear September 2002 What is etoken? Small & portable reader-less Smartcard Standard USB connectivity Logical and physical protection Tamper evident (vs. tamper proof) Water resistant

More information

OMAP platform security features

OMAP platform security features SWPT008 - July 2003 White Paper OMAP platform security features By Harini Sundaresan Applications Engineer, OMAP Security Texas Instruments, Wireless Terminal Business Unit This white paper introduces

More information

Software in safety critical systems

Software in safety critical systems Software in safety critical systems Software safety requirements Software safety integrity Budapest University of Technology and Economics Department of Measurement and Information Systems Definitions

More information

IBM Crypto Server Management General Information Manual

IBM Crypto Server Management General Information Manual CSM-1000-0 IBM Crypto Server Management General Information Manual Notices The functions described in this document are IBM property, and can only be used, if they are a part of an agreement with IBM.

More information

Secure Key Management A Key Feature for Modern Vehicle Electronics

Secure Key Management A Key Feature for Modern Vehicle Electronics 13AE-0069 Secure Key Management A Key Feature for Modern Vehicle Electronics Christian Schleiffer, Marko Wolf, André Weimerskirch, and Lars Wolleschensky ESCRYPT Copyright 2012 SAE International ABSTRACT

More information

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Side Channel Analysis and Embedded Systems Impact and Countermeasures Side Channel Analysis and Embedded Systems Impact and Countermeasures Job de Haas Agenda Advances in Embedded Systems Security From USB stick to game console Current attacks Cryptographic devices Side

More information

ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0

ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0 ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0 Dhanamjayan P.R. 1, Kuruvilla Jose 2, Manjusree S. 3 1 PG Scholar, Embedded Systems, 2 Specialist,

More information

Innovations in Digital Signature. Rethinking Digital Signatures

Innovations in Digital Signature. Rethinking Digital Signatures Innovations in Digital Signature Rethinking Digital Signatures Agenda 2 Rethinking the Digital Signature Benefits Implementation & cost issues A New Implementation Models Network-attached signature appliance

More information

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu UT DALLAS Erik Jonsson School of Engineering & Computer Science Overview of Cryptographic Tools for Data Security Murat Kantarcioglu Pag. 1 Purdue University Cryptographic Primitives We will discuss the

More information

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi Purpose This paper is intended to describe the benefits of smart card implementation and it combination with Public

More information

A Draft Framework for Designing Cryptographic Key Management Systems

A Draft Framework for Designing Cryptographic Key Management Systems A Draft Framework for Designing Cryptographic Key Management Systems Elaine Barker Dennis Branstad Santosh Chokhani Miles Smid IEEE Key Management Summit May 4, 2010 Purpose of Presentation To define what

More information

Standardized software components will help in mastering the. software should be developed for FlexRay were presented at

Standardized software components will help in mastering the. software should be developed for FlexRay were presented at Embedded Software for FlexRay Systems Special aspects and benefits of implementing modularized software Standardized software components will help in mastering the growing complexity of the interplay of

More information

Trustworthy Computing

Trustworthy Computing Stefan Thom Senior Software Development Engineer and Security Architect for IEB, Microsoft Rob Spiger, Senior Security Strategist Trustworthy Computing Agenda Windows 8 TPM Scenarios Hardware Choices with

More information

Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication

Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication 01PC-422 Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication Pascal Jost IAS, University of Stuttgart, Germany Stephan Hoffmann Vector CANtech Inc., USA Copyright

More information

siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office.

siemens.com/tolling Back-office system Sitraffic Sensus Server Supplies all front-end data. Suitable for any GNSS tolling back-office. siemens.com/tolling Back-office system Server Supplies all front-end data. Suitable for any GNSS tolling back-office. Server: The universal back-office for efficient and effective toll collection Server

More information

Secure Containers. Jan 2015 www.imgtec.com. Imagination Technologies HGI Dec, 2014 p1

Secure Containers. Jan 2015 www.imgtec.com. Imagination Technologies HGI Dec, 2014 p1 Secure Containers Jan 2015 www.imgtec.com Imagination Technologies HGI Dec, 2014 p1 What are we protecting? Sensitive assets belonging to the user and the service provider Network Monitor unauthorized

More information

Chapter 1: Introduction

Chapter 1: Introduction Chapter 1 Introduction 1 Chapter 1: Introduction 1.1 Inspiration Cloud Computing Inspired by the cloud computing characteristics like pay per use, rapid elasticity, scalable, on demand self service, secure

More information

Cornerstones of Security

Cornerstones of Security Internet Security Cornerstones of Security Authenticity the sender (either client or server) of a message is who he, she or it claims to be Privacy the contents of a message are secret and only known to

More information

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago

High-speed cryptography and DNSCurve. D. J. Bernstein University of Illinois at Chicago High-speed cryptography and DNSCurve D. J. Bernstein University of Illinois at Chicago Stealing Internet mail: easy! Given a mail message: Your mail software sends a DNS request, receives a server address,

More information

Safety and Security Features in AUTOSAR

Safety and Security Features in AUTOSAR Safety and Security Features in AUTOSAR Nagarjuna Rao Kandimala, Michal Sojka Czech Technical University in Prague 166 27 Praha 6, Czech Republic Thursday 15 th November, 2012 Contents 1 Introduction 2

More information

Pulse Secure, LLC. January 9, 2015

Pulse Secure, LLC. January 9, 2015 Pulse Secure Network Connect Cryptographic Module Version 2.0 Non-Proprietary Security Policy Document Version 1.1 Pulse Secure, LLC. January 9, 2015 2015 by Pulse Secure, LLC. All rights reserved. May

More information

Credential Management for Cloud Computing

Credential Management for Cloud Computing Credential Management for Cloud Computing Workshop Cloud Security, 16.07.2014 Dr. Johannes Luyken Page 1 Security breaches increase in their impact by exploiting online access to confidential data that

More information

Data Protection: From PKI to Virtualization & Cloud

Data Protection: From PKI to Virtualization & Cloud Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security

More information

R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission

R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission Secure Communications Product Brochure 01.01 R&S MKS9680 Modular Encryption Device Secure voice, fax and data transmission R&S MKS9680 Modular Encryption Device At a glance The R&S MKS9680 is a highly

More information

SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter

SP 800-130 A Framework for Designing Cryptographic Key Management Systems. 5/25/2012 Lunch and Learn Scott Shorter SP 800-130 A Framework for Designing Cryptographic Key Management Systems 5/25/2012 Lunch and Learn Scott Shorter Topics Follows the Sections of SP 800-130 draft 2: Introduction Framework Basics Goals

More information

Chapter 17. Transport-Level Security

Chapter 17. Transport-Level Security Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics

More information

Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems

Fastboot Techniques for x86 Architectures. Marcus Bortel Field Application Engineer QNX Software Systems Fastboot Techniques for x86 Architectures Marcus Bortel Field Application Engineer QNX Software Systems Agenda Introduction BIOS and BIOS boot time Fastboot versus BIOS? Fastboot time Customizing the boot

More information

Overview. SSL Cryptography Overview CHAPTER 1

Overview. SSL Cryptography Overview CHAPTER 1 CHAPTER 1 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features in this chapter apply to IPv4 and IPv6 unless otherwise noted. Secure

More information

Index. BIOS rootkit, 119 Broad network access, 107

Index. BIOS rootkit, 119 Broad network access, 107 Index A Administrative components, 81, 83 Anti-malware, 125 ANY policy, 47 Asset tag, 114 Asymmetric encryption, 24 Attestation commercial market, 85 facts, 79 Intel TXT conceptual architecture, 85 models,

More information