How To Ensure Safety In An Automotive System

Size: px
Start display at page:

Download "How To Ensure Safety In An Automotive System"

Transcription

1 1 / 6 No Safety without Security Dr. Günther Heling, Vector Informatik GmbH Dr. Christof Ebert, Vector Consulting Services GmbH V

2 No Safety without Security Automotive Trends Vector Congress Electrification Hybrid concepts 2. Driver Assistance Lane control, collision avoidance 3. Connectivity Infotainment 2/28

3 No Safety without Security Automotive Trends Vector Congress Electrification Zero Emission (locally) 2. Driver Assistance Autonomous Driving 3. Connectivity Always Connected 3/28

4 No Safety without Security Meet Captain Crunch 1970s: Telephone Systems were 2014: Automotive Systems are Complex Complex Distributed Distributed Software Intensive Software Intensive Perceived as secure Perceived as secure Easy to manipulate.? 4/28

5 No Safety without Security Evolution of Security Challenges Increasing complexity, open interfaces Weaknesses, vulnerabilities Attacks, mistakes, accidents High follow-up costs, damage to reputation IT Infrastructure today Mobile Communication today Automotive 2010 today Medical implants today - Chip tuning - Privacy abuse in car2x communication - Compromised security certificates - Car-Jacking 5/28

6 No Safety without Security Software is the top driver for innovations Car connectivity enables a lot of value-added features (Car2X/V2V) Connected cars show comparable vulnerability as connected computers Risks to assets: Infringe of privacy Theft Cheating (e.g. for smart charging) Manipulation of program and/or data: mileage, calibration, configuration data financial loss functionality safety Influence on vehicle behavior (e.g. faked traffic jam via Car2X) 6/28

7 No Safety without Security Survey Industry Trends 2014 Results 60% 50% Important for own responsibility Efficiency improvement 40% 30% Distributed development Flexibility Cost reduction Innovation Robust products 20% Infrastructure Reuse Standardization 10% Important for Others own industry Big data 0% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Note: Sum > 100% because 3 answers per question were allowed Clear focus: Robust products in terms of security and safety 7/28

8 No Safety without Security Vector Stimulus Automotive Safety is well established and 1 well supported by ISO and AUTOSAR 2 Automotive Security is increasingly relevant and addressed by AUTOSAR 3 4 Security and Safety must be systematically aligned using best practices You should introduce Security Engineering in your organization and in your projects 8/28

9 No Safety without Security Automotive Safety is well established and 1 well supported by ISO and AUTOSAR /28

10 Automotive Safety General approach according ISO Driving Situations OEM 2. Hazards OEM 3. Risks and Safety Integrity Level OEM 4. Safety Goals Safety Requirements OEM 5. Technical Safety Concept OEM/Tier1 6. Safety Requirements ECU level OEM/Tier1 7. Software Safety Requirements Tier1/Vector 10/28

11 Automotive Safety Software Elements inherit ASIL from Software Safety Requirements Software Safety Requirements Software Elements ECU Software Mixed ASIL approach is often the basis of the ECU Safety Concept 11/28

12 Automotive Safety Safety architecture based on AUTOSAR ASIL Partition QM Partition SafeCom (E2E) SWC1 SWC2 SWC3 SWC4 SafeRTE RTE MICROSAR Safe supports Technical Safety Concept by Safe Watchdog Silent RTE BSW SafeBSW Safe Context (OS) BSW Core Test RxM Test MCAL MCAL Hardware 1. Protection of your Safety Software SafeContext FfI Memory SafeWatchdog FfI Time 2. Safe Communication a) between ECUs SafeCom FfI Communication b) within ECU SafeRTE with RTE Verify: BSW to be used in Safety Partitions SilentBSW without safety features 4. BSW with safety features SafeBSW /28

13 Automotive Safety Guidelines and standards complement each other ISO 26262: Guidelines Safety architecture methods process Project related top-down approach + AUTOSAR: Standards Reuse architecture methods architecture data methods formats & functionality data formats & functionality Combination & configuration of modules ( Safety Elements out of Context ) 13/28

14 1 Automotive Safety is well established and well supported by ISO and AUTOSAR 2 Automotive Security is increasingly relevant and addressed by AUTOSAR /28

15 Automotive Security Relevant access points Smart Charging Off-Board Tester Connectivity 3G/LTE WiFi / Car2X Gateway (or Backbone) Vehicle Dynamics Assistance & Protection SD USB Head Unit Body Control EMS Radar Airbag ESP Camera Camera 15/28 Powertrain / Chassis ADAS avoid & Safety misuse of services Infotainment offered by the Body vehicle avoid unintended modification of vehicle software CAN LIN FlexRay Ethernet/IP

16 Automotive Security Available solutions based on MICROSAR 1. ECU diagnostics and reprogramming Cryptographic routines for authorization and authentication Data encryption/decryption 2. Smart charging TLS (Transport Layer Security) secured communication 3. Secured in-vehicle communication Signal encryption and decryption (per AUTOSAR SWC) 16/28

17 Automotive Security AUTOSAR supports security AUTOSAR defines a. abstract interfaces for cryptographic routines: CSM - Crypto Service Manager (Service) CAL - Crypto Abstraction Layer (Library) OS OS SYS CSM RTE COM LIBS CAL b. modules to implement cryptographic routines (without specifying the content) CRY for CSM - hardware support possible (SHE, HSM) CPL for CAL CRY DRV MCAL Microcontroller CPL AUTOSAR supports security methods Not covered: - handling of certificates and keys - cryptographic algorithms itself - intrusion detection,... New AUTOSAR working group just started 17/28

18 Automotive Security Summary - security methods used today 1. Establish a secure communication Goal: - ensure authenticity ( right partner? ) Method: - distribution of certificates - verification by asymmetric encryption (private key and public key) 2. Secure Communication with a trusted partner Goal: - protect communication (modification and eavesdropping) Method: - exchange keys (for one session) - symmetric encryption (often hardware supported) 3. Firewall 4. Intrusion detection system 18/28

19 No Safety without Security 1 Automotive Safety is well established and well supported by ISO and AUTOSAR 2 Automotive Security is increasingly relevant and addressed by AUTOSAR 3 Security and Safety must be systematically aligned using best practices 4 19/28

20 Security and Safety must be Aligned Safety and Security must be addressed in parallel New functionality... Fail-safe and fail-operational behaviors Complex feature interaction High data volume External interfaces (V2X; vehicle as IP node)... Drives new challenges New safety concepts (architectures with more redundancy) Support of high-performance micro-controllers Support of high-performance software development Safety functions have to be secured against attacks > Avoid misuse of services and functions > Prevent unintended change of functions Cost-effective evolution and support over the entire life-cycle Learn from other industries to cost-effectively implement security 20/28

21 The Automotive world has to catch up 1. Take benefit from security experience in other critical domains Apply cybersecurity principles and methods to harden distributed embedded systems Adopt the IT standard Common Criteria for automotive IT infrastructure usage 2. Align the approaches for safety and security engineering to stay cost-effective Apply threat modelling as part of hazard and risk analysis Use security levels in relation to safety integrity levels > Different security aspects, e.g. authenticity, integrity, confidentiality > Relevance of assets and access options, e.g. attack intensity Align underlying development methods and processes > Architecture design and evaluation, security design, coding rules, hardening, robustness and misuse testing, life-cycle robustness > Tool support for combined safety and security engineering and consistency across the entire life-cycle 21/28

22 Security and Safety must be Aligned Example: Common Criteria Initiative of so far 26 countries Goal Consistent security evaluation and certification of products and protection profiles Applicability Operating systems, key management systems, ICs, smart cards, crypto libraries,... Common criteria have been adopted for different critical systems, such as automation, aerospace, defense, Approach 7 Evaluation Assurance Levels (EAL) Automotive experiences Many automotive players so far have unclear security targets and thus no consistent consideration in architecture and life-cycle processes Unnecessary high risk and cost due to overdoing in one area and failing on others Tailored subset of Common Criteria together with safety/security engineering help in providing a thorough yet cost-effective solution 22/28

23 Security and Safety must be Aligned Activities to Leverage Security Engineering Activity Adapt mature development processes to factor in security engineering. Benefit Security engineering activities are known, scheduled, and executed within normal development Security techniques in the life-cycle are combined with safety engineering Elicit security requirements in the beginning of the project. Assets to be protected are clearly identified Traceability is maintained to ensure consistency over the life-cycle Test cases for security validation are derived from requirements Review or test every security relevant artefact, use analysis and test tools. Use security competencies. Identification of issues at the earliest possible time Automated tools increase confidence and reduce effort Specific embedded security expertise available when necessary Economic and engineering trade-off analysis Systematically implement security engineering. 23/28

24 No Safety without Security 1 Automotive Safety is well established and well supported by ISO and AUTOSAR 2 Automotive Security is increasingly relevant and addressed by AUTOSAR 3 4 Security and Safety must be systematically aligned using best practices You should introduce Security Engineering in your organization and in your projects 24/28

25 Introduce Security Engineering Safety and Security Impacts: Complexity and Competences 25/28 Increasing number and complexity of functions Rising safety requirements and liability risks Inefficient processes Lack of safety / security competence Electronic fuel injection Cruise control Gearbox control Traction control Anti lock brakes Electronic fuel injection Cruise control Airbags Electronic stability control Active body control Adaptive gearbox control Adaptive cruise control Emergency call Gearbox control Traction control Anti lock brakes Electronic fuel injection Cruise control Adaptive Headlights Steer-by-wire Lane Assistant Stop and Go Parking Distance Control Emergency Break Assist Curve-Warning Hybrid Drive Road Trains Electronic Brake Control Telediagnostics Car-2-car Communication Online Software Updates Airbags Electronic stability control Active body control Adaptive gearbox control Adaptive cruise control Emergency call Gearbox control Traction control Anti lock brakes Electronic fuel injection Cruise control

26 Introduce Security Engineering Safety and Security An Odd Couple In many aspects safety and security are comparable It is not only about technical solutions and processes it is also about culture A joint approach including OEM, ECU supplier and provider of basic SW and HW is needed A failure can mean severe image problems... but Security is a bit special: Complex and expensive to cover the whole system and its lifecycle Probabilities don t matter, it is always 100% Necessary competences and methods not yet available in E/E departments Security Safety ISO It needs the ability to think like a Criminal and preemptively act as an Engineer 26/28

27 Introduce Security Engineering Benefit from our Portfolio on Automotive Safety and Security Standard Software Technical measures to protect hardware and software security Examples: Robustness and Hardening in AUTOSAR, Security adjusted to safety integrity needs Tools Consistent approach for all development activities. Examples: Threat and Hazard analysis during concept definition, consistent modeling in PREEvision Consulting Support for methods and skills as well as the necessary cultural changes. Examples: Security engineering, culture change, hazard analysis Security Culture needs to address products, processes and people 27/28

28 For more information about Vector and our products please visit Author: Dr. Christof Ebert, Dr. Günther Heling, with Dr. Dominik Lieckfeldt, Armin Happel, Jonas Wolf Vector Informatik GmbH Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V

Security in Vehicle Networks

Security in Vehicle Networks Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development

More information

Functional Safety with ISO 26262 Principles and Practice Dr. Christof Ebert, Dr. Arnulf Braatz Vector Consulting Services

Functional Safety with ISO 26262 Principles and Practice Dr. Christof Ebert, Dr. Arnulf Braatz Vector Consulting Services Functional Safety with ISO 26262 Principles and Practice Dr. Christof Ebert, Dr. Arnulf Braatz Vector Consulting Services Welcome to the Webinar Functional Safety with ISO 26262 Webinar Part 1, Principles

More information

Safety and security related features in AUTOSAR

Safety and security related features in AUTOSAR Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22

More information

Automotive Software Development Challenges Virtualisation and Embedded Security

Automotive Software Development Challenges Virtualisation and Embedded Security Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé

More information

From Signal Routing to complete AUTOSAR compliant CAN design with PREEvision (II)

From Signal Routing to complete AUTOSAR compliant CAN design with PREEvision (II) From Signal Routing to complete AUTOSAR compliant CAN design with PREEvision (II) RELEASED V0.01 2014-12-02 Agenda PREEvision AUTOSAR Webinar Part I AUTOSAR System and Software Design with PREEvision The

More information

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions September 2013 Silicon Support & Professional Eng. Services Customer Experience Freescale Provided SW & Solutions Provide Valued Software, Support & Professional Engineering Services, Competitively 2 Customer

More information

AUTOSAR Configuration Process - How to handle 1000s of parameters

AUTOSAR Configuration Process - How to handle 1000s of parameters AUTOSAR Configuration Process - How to handle 1000s of parameters Webinar 2013-04-19 V2.0 2013-04-18 Agenda >Introduction AUTOSAR ECU Configuration Description ECU Configuration Workflow Multi-User Workflow

More information

Security risk analysis approach for on-board vehicle networks

Security risk analysis approach for on-board vehicle networks 1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle

More information

The relevance of cyber-security to functional safety of connected and automated vehicles

The relevance of cyber-security to functional safety of connected and automated vehicles The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction

More information

Automotive and Industrial Data Security

Automotive and Industrial Data Security André Weimerskirch Cybersecurity for Cyber-Physical Systems Workshop April 23-24, 2012 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions Communication

More information

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded

More information

IoT Security Concerns and Renesas Synergy Solutions

IoT Security Concerns and Renesas Synergy Solutions IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas

More information

The research area of SET group is software engineering, and model-based software engineering in particular:

The research area of SET group is software engineering, and model-based software engineering in particular: Introduction The research area of SET group is software engineering, and model-based software engineering in particular: Given the high-tech software-intensive industry in the Eindhoven region, we consider

More information

Safety compliance. Energy management. System architecture advisory services. Diagnostics. Network topologies. Physical and functional partitioning

Safety compliance. Energy management. System architecture advisory services. Diagnostics. Network topologies. Physical and functional partitioning Energy management Network topologies Physical and functional partitioning Safety compliance Diagnostics System architecture advisory services www.continental-corporation.com Why system architecture? 2

More information

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing

More information

Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software

Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software 133 Hitachi Review Vol. 63 (2014), No. 2 Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software Yoshinobu Fukano, Dr. Sci. Kosei Goto Masahiro Matsubara

More information

Embedding Trust into Cars Secure Software Delivery and Installation

Embedding Trust into Cars Secure Software Delivery and Installation Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop

More information

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process By Andreas Lindenthal and Franz Walkembach, Wind River The concept of autonomous vehicles or unmanned

More information

Do AUTOSAR and functional safety rule each other out?

Do AUTOSAR and functional safety rule each other out? Software development Do AUTOSAR and functional safety rule each other out? While simplicity is a factor in safety-critical applications, AUTOSAR has over 6,000 configuration parameters and well over 100,000

More information

Development of AUTOSAR Software Components within Model-Based Design

Development of AUTOSAR Software Components within Model-Based Design 2008-01-0383 Development of AUTOSAR Software Components within Model-Based Design Copyright 2008 The MathWorks, Inc. Guido Sandmann Automotive Marketing Manager, EMEA The MathWorks Richard Thompson Senior

More information

JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development

JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development ROADMAP TO AUTOMATED DRIVING Autonomous Driving (Chauffeured Driving) Increasing Capability

More information

Embedded OS. Product Information

Embedded OS. Product Information Product Information Table of Contents 1 Operating Systems for ECUs... 3 2 MICROSAR.OS The Real-Time Operating System for the AUTOSAR Standard... 3 2.1 Overview of Advantages... 3 2.2 Properties... 4 2.3

More information

AutoSAR Overview. FESA Workshop at KTH 2010 04 12. Prof. Jakob Axelsson Volvo Cars and Mälardalen University

AutoSAR Overview. FESA Workshop at KTH 2010 04 12. Prof. Jakob Axelsson Volvo Cars and Mälardalen University AutoSAR Overview FESA Workshop at KTH 2010 04 12 Prof. Jakob Axelsson Volvo Cars and Mälardalen University This presentation is based on a tutorial prepared by the AutoSAR Consortium AUTOSAR Members Status

More information

Safety and Security Features in AUTOSAR

Safety and Security Features in AUTOSAR Safety and Security Features in AUTOSAR Nagarjuna Rao Kandimala, Michal Sojka Czech Technical University in Prague 166 27 Praha 6, Czech Republic Thursday 15 th November, 2012 Contents 1 Introduction 2

More information

Introduction CHAPTER 1

Introduction CHAPTER 1 CHAPTER 1 Introduction Ever since the development of the first integrated circuits in the late 1950s the complexity of such devices doubled every 20 months. A development which has been anticipated by

More information

NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS

NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS André Groll, Jan Holle University of Siegen, Institute for Data Communications Systems {andre.groll,jan.holle}@uni-siegen.de

More information

Product Information Services for Embedded Software

Product Information Services for Embedded Software Product Information Services for Embedded Software Table of Contents 1 Technical Consulting/Engineering Services... 3 1.1 Overview of Advantages... 3 1.2 Application Areas... 3 2 Product- Services - Proficient

More information

Program Automotive Security and Privacy

Program Automotive Security and Privacy Program Automotive Security and Privacy FFI Board Funded Program 2015 10 02 Abstract This document describes the FFI board funded program Automotive Security and Privacy. This document is prepared by the

More information

Beschleunigen Sie die Entwicklung Ihrer Embedded Software mit Dienstleistungen von Vector

Beschleunigen Sie die Entwicklung Ihrer Embedded Software mit Dienstleistungen von Vector Beschleunigen Sie die Entwicklung Ihrer Embedded Software mit Dienstleistungen von Vector Vector Embedded Software 2013 V1.3.0 2013-04-04 Your Presenters Today Michael Buck Manager Product Services / Technical

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

Challenges for the European Automotive Software Industry

Challenges for the European Automotive Software Industry Challenges for the European Automotive Software Industry Viewpoint of a safety supplier 28 th April 2010 Franck Lesbroussart What Trends do we see? Integration of functions Functionalities are expanding

More information

EBERSPÄCHER ELECTRONICS automotive bus systems

EBERSPÄCHER ELECTRONICS automotive bus systems EBERSPÄCHER ELECTRONICS automotive bus systems YOUR PARTNER FOR IN-VEHICLE NETWORKING DRIVING THE MOBILITY OF TOMORROW 2 AUTOmotive bus systems EBERSPÄCHER ELECTRONICS: THE EXPERTS IN AUTOMOTIVE BUS SYSTEMS

More information

TOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT

TOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT TOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT Go beyond error detection to ensure safety and security TABLE OF CONTENTS The Three Biggest Challenges...4 Ensure compliance

More information

FlexRay A Communications Network for Automotive Control Systems

FlexRay A Communications Network for Automotive Control Systems FlexRay A Communications Network for Automotive Control Systems WFCS 2006 Rainer Makowitz Automotive Systems Engineering, EMEA Freescale and the Freescale logo are trademarks of Freescale Semiconductor,

More information

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

Vehicular Security Hardware The Security for Vehicular Security Mechanisms escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Cost Effective Updating of Software in Cars From IVIs, TCUs and Domain Controllers to the Entire Vehicle. White Paper

Cost Effective Updating of Software in Cars From IVIs, TCUs and Domain Controllers to the Entire Vehicle. White Paper Cost Effective Updating of Software in Cars From IVIs, TCUs and Domain Controllers to the Entire Vehicle White Paper Published February 2015 Copyright 1999-2015 Redbend. All Rights Reserved. This Software

More information

Plug and Play Solution for AUTOSAR Software Components

Plug and Play Solution for AUTOSAR Software Components Plug and Play Solution for AUTOSAR Software Components The interfaces defined in the AUTOSAR standard enable an easier assembly of the ECU application out of components from different suppliers. However,

More information

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh

Developing an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh Developing an Architectural Framework towards achieving Cyber Resiliency Presented by Deepak Singh Presentation Content Cyber Threat Landscape Cyber Attack and Threat Profile Cyber Threat Map Cyber Security

More information

Mentor Embedded Automotive Solutions

Mentor Embedded Automotive Solutions Mentor Embedded Automotive Solutions Overview May 2013 mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered trademark

More information

In networking ECUs in heavy-duty vehicles, it is the J1939 protocol that. plays a key role. J1939 networks are based on the CAN bus (high-speed

In networking ECUs in heavy-duty vehicles, it is the J1939 protocol that. plays a key role. J1939 networks are based on the CAN bus (high-speed Networking Heavy-Duty Vehicles Based on SAE J1939 From Parameter Group to plug-and-play Application In networking ECUs in heavy-duty vehicles, it is the J1939 protocol that plays a key role. J1939 networks

More information

Configuration management in AUTOSAR

Configuration management in AUTOSAR Configuration management in AUTOSAR The need for efficient process tools for Automotive System Engineering V0.01 2008-11-02 Introduction AUTOSAR will influence the ECU SW Architecture and also the way

More information

Telematics Workshop: Remote 2-Way Communication Meeting Results

Telematics Workshop: Remote 2-Way Communication Meeting Results March 31, 2016 Telematics Workshop: Remote 2-Way Communication Meeting Results ASAM Members and Non-Members primarily from the North American On-Road/Off-Road Commercial Vehicle Market met to discuss the

More information

SHE Secure Hardware Extension

SHE Secure Hardware Extension SHE Secure Hardware Extension Data Security for Automotive Embedded Systems Workshop on Cryptography and Embedded Security Embedded World @ Nuremberg, February 2012 Content Data Security - What does it

More information

Hardware Security Modules for Protecting Embedded Systems

Hardware Security Modules for Protecting Embedded Systems Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &

More information

Encryption Doesn t Always Protect Your Data. Presented by: Joe Sturonas PKWARE

Encryption Doesn t Always Protect Your Data. Presented by: Joe Sturonas PKWARE Encryption Doesn t Always Protect Your Data Presented by: Joe Sturonas PKWARE Agenda Threat Landscape Security Risks Public/Private Keys Digital Signing and Authentication Use Case Q&A Threat Landscape

More information

Information Security Services

Information Security Services Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual

More information

ELEC 5260/6260/6266 Embedded Computing Systems

ELEC 5260/6260/6266 Embedded Computing Systems ELEC 5260/6260/6266 Embedded Computing Systems Spring 2016 Victor P. Nelson Text: Computers as Components, 3 rd Edition Prof. Marilyn Wolf (Georgia Tech) Course Topics Embedded system design & modeling

More information

ANSYS SCADE Model-Based Development Solutions for AUTOMOTIVE. Critical Systems & Software Development Solutions

ANSYS SCADE Model-Based Development Solutions for AUTOMOTIVE. Critical Systems & Software Development Solutions ANSYS SCADE Model-Based Development Solutions for AUTOMOTIVE Critical Systems & Software Development Solutions Embedded Systems and Software Challenges in Automotive Production-Proven International and

More information

ISO 26262 Introduction

ISO 26262 Introduction ISO 26262 Introduction Prof. Christian Madritsch 2012 Table of Contents Structure of ISO 26262 Management of Functional Safety Product Development System Level Product Development Hardware Level Product

More information

Standardized software components will help in mastering the. software should be developed for FlexRay were presented at

Standardized software components will help in mastering the. software should be developed for FlexRay were presented at Embedded Software for FlexRay Systems Special aspects and benefits of implementing modularized software Standardized software components will help in mastering the growing complexity of the interplay of

More information

Secure software updates for ITS communications devices

Secure software updates for ITS communications devices Secure software updates for ITS communications devices - International Standardization Activity in ITU-T SG17 - Masashi Eto, Senior researcher, Cybersecurity laboratory, Network security research institute,

More information

Software House Embedded Systems

Software House Embedded Systems Software House Embedded Systems Contacts: E-mobility, chassis, driver assistance and body electronics: Martin Richter +49 5371 805-1041 Infotainment, radio and instrument cluster: Sven Lochau +49 30 39978-7631

More information

Certification Report

Certification Report Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification

More information

Vehicle Electronics. Services and Solutions to Manage the Complexity

Vehicle Electronics. Services and Solutions to Manage the Complexity Vehicle Electronics Services and Solutions to Manage the Complexity INNOVATIONS & DEVELOPMENT CYCLES Commercial vehicle manufacturers are experiencing a technological change. In addition to the rising

More information

Keeping Up with the Data & Security Demands of the Automotive IoT

Keeping Up with the Data & Security Demands of the Automotive IoT Keeping Up with the Data & Security Demands of the Automotive IoT AESIN 2015 Robert Moran Automotive Systems Engineering O C T O B E R 2 0 1 5 External Use Keeping Up with the Data & Security Demands of

More information

AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems. Robert Leibinger 5 th June 2015

AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems. Robert Leibinger 5 th June 2015 AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems Robert Leibinger 5 th June 2015 Agenda Architecture requirements for ADAS ECU Overview of different architecture approaches Compare and contrast

More information

Automotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car

Automotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car Automotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car Authors: Dr. Joerg Borchert, VP of Chip Card and Security ICs, Infineon North America Shawn Slusser, VP of Automotive,

More information

Safe Automotive software architecture (SAFE)

Safe Automotive software architecture (SAFE) Safe Automotive software architecture (SAFE) 01-03-2012, ARTEMIS Technology Conference 2012 Stefan Voget Continental Automotive Content Motivation Project Organization Work Packages Approach for Interoperability

More information

Safety Issues in Automotive Software

Safety Issues in Automotive Software Safety Issues in Automotive Software Paolo Panaroni, Giovanni Sartori INTECS S.p.A. SAFEWARE 1 INTECS & Safety A very large number of safety software development, V&V activities and research project on

More information

Secure Software Delivery and Installation in Embedded Systems

Secure Software Delivery and Installation in Embedded Systems Secure Software Delivery and Installation in Embedded Systems André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi Horst-Görtz-Institute, Bochum, Germany ISPEC 2005 Presentation Singapore, April 13, 2005

More information

Safe-E. Safe-E Introduction. Coordination: Andreas ECKEL TTTech Computertechnik AG andreas.eckel@tttech.com

Safe-E. Safe-E Introduction. Coordination: Andreas ECKEL TTTech Computertechnik AG andreas.eckel@tttech.com Introduction Coordination: Andreas ECKEL TTTech Computertechnik AG andreas.eckel@tttech.com The Eurostars Project within the ITEA-2 Safe Project Eurostars : what is it and why?: Eurostars is an Eureka

More information

New Methodologies in Smart Card Security Design. Y.GRESSUS Methodology and Secure ASIC development manager, Bull CP8

New Methodologies in Smart Card Security Design. Y.GRESSUS Methodology and Secure ASIC development manager, Bull CP8 New Methodologies in Smart Card Security Design Y.GRESSUS Methodology and Secure ASIC development manager, Bull CP8 Japan Security Conference Page 2 Trends Opportunities New methodologies Summary Concurrent

More information

NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA

NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH Arthur Carter, Frank Barickman, NHTSA Electronic Systems Safety Research Division Electronic Systems Safety (ESS) Research Division conducts research to ensure

More information

A Survey Report by Horst Hientz Hans-Jürgen Kugler

A Survey Report by Horst Hientz Hans-Jürgen Kugler A Survey Report by Horst Hientz Hans-Jürgen Kugler Bonifaz Maag Dominik Strube 1 Content Survey framework Results Trends & Drivers Impact on business models Impact on automotive industry Impact on automotive

More information

Secure Key Management A Key Feature for Modern Vehicle Electronics

Secure Key Management A Key Feature for Modern Vehicle Electronics 13AE-0069 Secure Key Management A Key Feature for Modern Vehicle Electronics Christian Schleiffer, Marko Wolf, André Weimerskirch, and Lars Wolleschensky ESCRYPT Copyright 2012 SAE International ABSTRACT

More information

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:

Compliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's: Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services

More information

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257

Wireless Sensor Network Security. Seth A. Hellbusch CMPE 257 Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy

More information

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored

More information

User-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools

User-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools User-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools The simple CAN ECU is a thing of the past. Now, a typical ECU utilizes many functions of the AUTOSAR basic software to perform

More information

EB Automotive Driver Assistance EB Assist Solutions. Damian Barnett Director Automotive Software June 5, 2015

EB Automotive Driver Assistance EB Assist Solutions. Damian Barnett Director Automotive Software June 5, 2015 EB Automotive Driver Assistance EB Assist Solutions Damian Barnett Director Automotive Software June 5, 2015 Advanced driver assistance systems Market growth The Growth of ADAS is predicted to be about

More information

Crucial Role of ICT for the Reinvention of the Car

Crucial Role of ICT for the Reinvention of the Car Joint EC / EPoSS / ERTRAC Expert Workshop 2011 Electric Vehicle System Integration and Architecture Crucial Role of ICT for the Reinvention of the Car Karl-Josef Kuhn Siemens Corporate Research and Technologies

More information

SCSK s Automotive Software Business

SCSK s Automotive Software Business SCSK s Automotive Software Business Syoichi Kondou Executive Officer Automotive Systems Business Div. Manufacturing Systems Business Group SCSK Corporation May 20, 2015 Copyright(c) SCSK Corporation Page

More information

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution

More information

System Security Solutions for the connected world. www.infineon.com/ccs

System Security Solutions for the connected world. www.infineon.com/ccs System Security Solutions for the connected world www.infineon.com/ccs Solutions for rising security demands The right balance between hardware-based and software-based security mechanisms allows you to

More information

Intelligent development tools Design methods and tools Functional safety

Intelligent development tools Design methods and tools Functional safety Intelligent development tools Design methods and tools Functional safety Flanders DRIVE Index: Flanders DRIVE 1 Importance of functional safety 2 Functional safety for mechatronic systems 4 Global functional

More information

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of

More information

ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0

ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0 ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0 Dhanamjayan P.R. 1, Kuruvilla Jose 2, Manjusree S. 3 1 PG Scholar, Embedded Systems, 2 Specialist,

More information

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services

Managing Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult

More information

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014

SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security

More information

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A

More information

Convenient Charging of Electric Vehicles

Convenient Charging of Electric Vehicles Technical Article Convenient Charging of Electric Vehicles Smart Charging with MICROSAR IP enables flexible charging processes and easy payment Compared to conventionally powered vehicles, electric vehicles

More information

Testing the Internet of Things

Testing the Internet of Things Presentation to TMF Testing the Internet of Things Test and Verification Solutions Delivering Tailored Solutions for Hardware Verification and Software Testing What is the IoT? Wikipedia The Internet of

More information

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014 Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security

More information

Network Security in Building Networks

Network Security in Building Networks Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content

More information

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work

Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture

More information

ASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY

ASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY ASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY Dr. Qi Van Eikema Hommes SAE 2012 Government/Industry Meeting January 25, 2012 1 Outline ISO 26262 Overview Scope of the Assessment

More information

Certification Report

Certification Report Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of

More information

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency

The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011

More information

Frost & Sullivan Cybersecurity Presentation

Frost & Sullivan Cybersecurity Presentation Frost & Sullivan Cybersecurity Presentation 2015 will be the Year of Security, Prognostics & Evolution of OEM Vehicle Automation Strategies Praveen Narayanan Research Manager Feb 2015 Key Trends Impacting

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

VELOCITY LAB TM Embedded Development Ecosystem

VELOCITY LAB TM Embedded Development Ecosystem VELOCITY LAB TM Embedded Development Ecosystem 0C05B Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2013 32-bit 8/16-bit 1200

More information

automotive.elektrobit.com Driver assistance software EB Assist solutions

automotive.elektrobit.com Driver assistance software EB Assist solutions automotive.elektrobit.com Driver assistance software EB Assist solutions From driver assistance systems to automated driving Automated driving leads to more comfortable driving and makes the road safer

More information

Functional Safety and Automotive SW - Engineering Introduction ISO 26262 @ Daimler

Functional Safety and Automotive SW - Engineering Introduction ISO 26262 @ Daimler Functional Safety and Automotive SW - Engineering Introduction ISO 26262 @ Daimler Dr. Juergen Schwarz Senior Manager Functional Safety & E/E - Processes WOCS 2012 September 27, 2012, Tokyo, Japan Overview

More information

CYBERSECURITY FOR THE AUTOMOBILE IS THE CAR OF THE FUTURE STILL A CAR?

CYBERSECURITY FOR THE AUTOMOBILE IS THE CAR OF THE FUTURE STILL A CAR? CYBERSECURITY FOR THE AUTOMOBILE IS THE CAR OF THE FUTURE STILL A CAR? Alberto Sangiovanni-Vincentelli The Edgar L. and Harold H. Buttner Chair of EECS University of California at Berkeley Co-Founder,

More information

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui

VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463

More information

The Problem: Automotive safety recalls, Control Systems Diagnostics, Stability Control, Traction Control, Anti-lock Braking, Adaptive Cruise Control

The Problem: Automotive safety recalls, Control Systems Diagnostics, Stability Control, Traction Control, Anti-lock Braking, Adaptive Cruise Control AUTOPLUG: Remote Diagnostics Automotive Architecture for Control Software Safety Rahul Mangharam, Yash V. Pant and Truong X. Nghiem Department of Electrical & Systems Engineering University of Pennsylvania

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information