How To Ensure Safety In An Automotive System
|
|
- Terence Pierce
- 3 years ago
- Views:
Transcription
1 1 / 6 No Safety without Security Dr. Günther Heling, Vector Informatik GmbH Dr. Christof Ebert, Vector Consulting Services GmbH V
2 No Safety without Security Automotive Trends Vector Congress Electrification Hybrid concepts 2. Driver Assistance Lane control, collision avoidance 3. Connectivity Infotainment 2/28
3 No Safety without Security Automotive Trends Vector Congress Electrification Zero Emission (locally) 2. Driver Assistance Autonomous Driving 3. Connectivity Always Connected 3/28
4 No Safety without Security Meet Captain Crunch 1970s: Telephone Systems were 2014: Automotive Systems are Complex Complex Distributed Distributed Software Intensive Software Intensive Perceived as secure Perceived as secure Easy to manipulate.? 4/28
5 No Safety without Security Evolution of Security Challenges Increasing complexity, open interfaces Weaknesses, vulnerabilities Attacks, mistakes, accidents High follow-up costs, damage to reputation IT Infrastructure today Mobile Communication today Automotive 2010 today Medical implants today - Chip tuning - Privacy abuse in car2x communication - Compromised security certificates - Car-Jacking 5/28
6 No Safety without Security Software is the top driver for innovations Car connectivity enables a lot of value-added features (Car2X/V2V) Connected cars show comparable vulnerability as connected computers Risks to assets: Infringe of privacy Theft Cheating (e.g. for smart charging) Manipulation of program and/or data: mileage, calibration, configuration data financial loss functionality safety Influence on vehicle behavior (e.g. faked traffic jam via Car2X) 6/28
7 No Safety without Security Survey Industry Trends 2014 Results 60% 50% Important for own responsibility Efficiency improvement 40% 30% Distributed development Flexibility Cost reduction Innovation Robust products 20% Infrastructure Reuse Standardization 10% Important for Others own industry Big data 0% 0% 5% 10% 15% 20% 25% 30% 35% 40% 45% 50% Note: Sum > 100% because 3 answers per question were allowed Clear focus: Robust products in terms of security and safety 7/28
8 No Safety without Security Vector Stimulus Automotive Safety is well established and 1 well supported by ISO and AUTOSAR 2 Automotive Security is increasingly relevant and addressed by AUTOSAR 3 4 Security and Safety must be systematically aligned using best practices You should introduce Security Engineering in your organization and in your projects 8/28
9 No Safety without Security Automotive Safety is well established and 1 well supported by ISO and AUTOSAR /28
10 Automotive Safety General approach according ISO Driving Situations OEM 2. Hazards OEM 3. Risks and Safety Integrity Level OEM 4. Safety Goals Safety Requirements OEM 5. Technical Safety Concept OEM/Tier1 6. Safety Requirements ECU level OEM/Tier1 7. Software Safety Requirements Tier1/Vector 10/28
11 Automotive Safety Software Elements inherit ASIL from Software Safety Requirements Software Safety Requirements Software Elements ECU Software Mixed ASIL approach is often the basis of the ECU Safety Concept 11/28
12 Automotive Safety Safety architecture based on AUTOSAR ASIL Partition QM Partition SafeCom (E2E) SWC1 SWC2 SWC3 SWC4 SafeRTE RTE MICROSAR Safe supports Technical Safety Concept by Safe Watchdog Silent RTE BSW SafeBSW Safe Context (OS) BSW Core Test RxM Test MCAL MCAL Hardware 1. Protection of your Safety Software SafeContext FfI Memory SafeWatchdog FfI Time 2. Safe Communication a) between ECUs SafeCom FfI Communication b) within ECU SafeRTE with RTE Verify: BSW to be used in Safety Partitions SilentBSW without safety features 4. BSW with safety features SafeBSW /28
13 Automotive Safety Guidelines and standards complement each other ISO 26262: Guidelines Safety architecture methods process Project related top-down approach + AUTOSAR: Standards Reuse architecture methods architecture data methods formats & functionality data formats & functionality Combination & configuration of modules ( Safety Elements out of Context ) 13/28
14 1 Automotive Safety is well established and well supported by ISO and AUTOSAR 2 Automotive Security is increasingly relevant and addressed by AUTOSAR /28
15 Automotive Security Relevant access points Smart Charging Off-Board Tester Connectivity 3G/LTE WiFi / Car2X Gateway (or Backbone) Vehicle Dynamics Assistance & Protection SD USB Head Unit Body Control EMS Radar Airbag ESP Camera Camera 15/28 Powertrain / Chassis ADAS avoid & Safety misuse of services Infotainment offered by the Body vehicle avoid unintended modification of vehicle software CAN LIN FlexRay Ethernet/IP
16 Automotive Security Available solutions based on MICROSAR 1. ECU diagnostics and reprogramming Cryptographic routines for authorization and authentication Data encryption/decryption 2. Smart charging TLS (Transport Layer Security) secured communication 3. Secured in-vehicle communication Signal encryption and decryption (per AUTOSAR SWC) 16/28
17 Automotive Security AUTOSAR supports security AUTOSAR defines a. abstract interfaces for cryptographic routines: CSM - Crypto Service Manager (Service) CAL - Crypto Abstraction Layer (Library) OS OS SYS CSM RTE COM LIBS CAL b. modules to implement cryptographic routines (without specifying the content) CRY for CSM - hardware support possible (SHE, HSM) CPL for CAL CRY DRV MCAL Microcontroller CPL AUTOSAR supports security methods Not covered: - handling of certificates and keys - cryptographic algorithms itself - intrusion detection,... New AUTOSAR working group just started 17/28
18 Automotive Security Summary - security methods used today 1. Establish a secure communication Goal: - ensure authenticity ( right partner? ) Method: - distribution of certificates - verification by asymmetric encryption (private key and public key) 2. Secure Communication with a trusted partner Goal: - protect communication (modification and eavesdropping) Method: - exchange keys (for one session) - symmetric encryption (often hardware supported) 3. Firewall 4. Intrusion detection system 18/28
19 No Safety without Security 1 Automotive Safety is well established and well supported by ISO and AUTOSAR 2 Automotive Security is increasingly relevant and addressed by AUTOSAR 3 Security and Safety must be systematically aligned using best practices 4 19/28
20 Security and Safety must be Aligned Safety and Security must be addressed in parallel New functionality... Fail-safe and fail-operational behaviors Complex feature interaction High data volume External interfaces (V2X; vehicle as IP node)... Drives new challenges New safety concepts (architectures with more redundancy) Support of high-performance micro-controllers Support of high-performance software development Safety functions have to be secured against attacks > Avoid misuse of services and functions > Prevent unintended change of functions Cost-effective evolution and support over the entire life-cycle Learn from other industries to cost-effectively implement security 20/28
21 The Automotive world has to catch up 1. Take benefit from security experience in other critical domains Apply cybersecurity principles and methods to harden distributed embedded systems Adopt the IT standard Common Criteria for automotive IT infrastructure usage 2. Align the approaches for safety and security engineering to stay cost-effective Apply threat modelling as part of hazard and risk analysis Use security levels in relation to safety integrity levels > Different security aspects, e.g. authenticity, integrity, confidentiality > Relevance of assets and access options, e.g. attack intensity Align underlying development methods and processes > Architecture design and evaluation, security design, coding rules, hardening, robustness and misuse testing, life-cycle robustness > Tool support for combined safety and security engineering and consistency across the entire life-cycle 21/28
22 Security and Safety must be Aligned Example: Common Criteria Initiative of so far 26 countries Goal Consistent security evaluation and certification of products and protection profiles Applicability Operating systems, key management systems, ICs, smart cards, crypto libraries,... Common criteria have been adopted for different critical systems, such as automation, aerospace, defense, Approach 7 Evaluation Assurance Levels (EAL) Automotive experiences Many automotive players so far have unclear security targets and thus no consistent consideration in architecture and life-cycle processes Unnecessary high risk and cost due to overdoing in one area and failing on others Tailored subset of Common Criteria together with safety/security engineering help in providing a thorough yet cost-effective solution 22/28
23 Security and Safety must be Aligned Activities to Leverage Security Engineering Activity Adapt mature development processes to factor in security engineering. Benefit Security engineering activities are known, scheduled, and executed within normal development Security techniques in the life-cycle are combined with safety engineering Elicit security requirements in the beginning of the project. Assets to be protected are clearly identified Traceability is maintained to ensure consistency over the life-cycle Test cases for security validation are derived from requirements Review or test every security relevant artefact, use analysis and test tools. Use security competencies. Identification of issues at the earliest possible time Automated tools increase confidence and reduce effort Specific embedded security expertise available when necessary Economic and engineering trade-off analysis Systematically implement security engineering. 23/28
24 No Safety without Security 1 Automotive Safety is well established and well supported by ISO and AUTOSAR 2 Automotive Security is increasingly relevant and addressed by AUTOSAR 3 4 Security and Safety must be systematically aligned using best practices You should introduce Security Engineering in your organization and in your projects 24/28
25 Introduce Security Engineering Safety and Security Impacts: Complexity and Competences 25/28 Increasing number and complexity of functions Rising safety requirements and liability risks Inefficient processes Lack of safety / security competence Electronic fuel injection Cruise control Gearbox control Traction control Anti lock brakes Electronic fuel injection Cruise control Airbags Electronic stability control Active body control Adaptive gearbox control Adaptive cruise control Emergency call Gearbox control Traction control Anti lock brakes Electronic fuel injection Cruise control Adaptive Headlights Steer-by-wire Lane Assistant Stop and Go Parking Distance Control Emergency Break Assist Curve-Warning Hybrid Drive Road Trains Electronic Brake Control Telediagnostics Car-2-car Communication Online Software Updates Airbags Electronic stability control Active body control Adaptive gearbox control Adaptive cruise control Emergency call Gearbox control Traction control Anti lock brakes Electronic fuel injection Cruise control
26 Introduce Security Engineering Safety and Security An Odd Couple In many aspects safety and security are comparable It is not only about technical solutions and processes it is also about culture A joint approach including OEM, ECU supplier and provider of basic SW and HW is needed A failure can mean severe image problems... but Security is a bit special: Complex and expensive to cover the whole system and its lifecycle Probabilities don t matter, it is always 100% Necessary competences and methods not yet available in E/E departments Security Safety ISO It needs the ability to think like a Criminal and preemptively act as an Engineer 26/28
27 Introduce Security Engineering Benefit from our Portfolio on Automotive Safety and Security Standard Software Technical measures to protect hardware and software security Examples: Robustness and Hardening in AUTOSAR, Security adjusted to safety integrity needs Tools Consistent approach for all development activities. Examples: Threat and Hazard analysis during concept definition, consistent modeling in PREEvision Consulting Support for methods and skills as well as the necessary cultural changes. Examples: Security engineering, culture change, hazard analysis Security Culture needs to address products, processes and people 27/28
28 For more information about Vector and our products please visit Author: Dr. Christof Ebert, Dr. Günther Heling, with Dr. Dominik Lieckfeldt, Armin Happel, Jonas Wolf Vector Informatik GmbH Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V
Security in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
More informationFunctional Safety with ISO 26262 Principles and Practice Dr. Christof Ebert, Dr. Arnulf Braatz Vector Consulting Services
Functional Safety with ISO 26262 Principles and Practice Dr. Christof Ebert, Dr. Arnulf Braatz Vector Consulting Services Welcome to the Webinar Functional Safety with ISO 26262 Webinar Part 1, Principles
More informationSafety and security related features in AUTOSAR
Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22
More informationAutomotive Software Development Challenges Virtualisation and Embedded Security
Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive
More informationVehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
More informationEVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé
More informationFrom Signal Routing to complete AUTOSAR compliant CAN design with PREEvision (II)
From Signal Routing to complete AUTOSAR compliant CAN design with PREEvision (II) RELEASED V0.01 2014-12-02 Agenda PREEvision AUTOSAR Webinar Part I AUTOSAR System and Software Design with PREEvision The
More informationCustomer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions
September 2013 Silicon Support & Professional Eng. Services Customer Experience Freescale Provided SW & Solutions Provide Valued Software, Support & Professional Engineering Services, Competitively 2 Customer
More informationAUTOSAR Configuration Process - How to handle 1000s of parameters
AUTOSAR Configuration Process - How to handle 1000s of parameters Webinar 2013-04-19 V2.0 2013-04-18 Agenda >Introduction AUTOSAR ECU Configuration Description ECU Configuration Workflow Multi-User Workflow
More informationSecurity risk analysis approach for on-board vehicle networks
1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle
More informationThe relevance of cyber-security to functional safety of connected and automated vehicles
The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction
More informationAutomotive and Industrial Data Security
André Weimerskirch Cybersecurity for Cyber-Physical Systems Workshop April 23-24, 2012 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions Communication
More informationCycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
More informationIoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
More informationThe research area of SET group is software engineering, and model-based software engineering in particular:
Introduction The research area of SET group is software engineering, and model-based software engineering in particular: Given the high-tech software-intensive industry in the Eindhoven region, we consider
More informationSafety compliance. Energy management. System architecture advisory services. Diagnostics. Network topologies. Physical and functional partitioning
Energy management Network topologies Physical and functional partitioning Safety compliance Diagnostics System architecture advisory services www.continental-corporation.com Why system architecture? 2
More informationAutomotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri
Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing
More informationAdvanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software
133 Hitachi Review Vol. 63 (2014), No. 2 Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software Yoshinobu Fukano, Dr. Sci. Kosei Goto Masahiro Matsubara
More informationEmbedding Trust into Cars Secure Software Delivery and Installation
Embedding Trust into Cars Secure Software Delivery and Installation André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi, Christian Stüble Horst Görtz Institute for IT Security, Bochum, Germany Third Workshop
More informationDeveloping software for Autonomous Vehicle Applications; a Look Into the Software Development Process
Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process By Andreas Lindenthal and Franz Walkembach, Wind River The concept of autonomous vehicles or unmanned
More informationDo AUTOSAR and functional safety rule each other out?
Software development Do AUTOSAR and functional safety rule each other out? While simplicity is a factor in safety-critical applications, AUTOSAR has over 6,000 configuration parameters and well over 100,000
More informationDevelopment of AUTOSAR Software Components within Model-Based Design
2008-01-0383 Development of AUTOSAR Software Components within Model-Based Design Copyright 2008 The MathWorks, Inc. Guido Sandmann Automotive Marketing Manager, EMEA The MathWorks Richard Thompson Senior
More informationJEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development
JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development ROADMAP TO AUTOMATED DRIVING Autonomous Driving (Chauffeured Driving) Increasing Capability
More informationEmbedded OS. Product Information
Product Information Table of Contents 1 Operating Systems for ECUs... 3 2 MICROSAR.OS The Real-Time Operating System for the AUTOSAR Standard... 3 2.1 Overview of Advantages... 3 2.2 Properties... 4 2.3
More informationAutoSAR Overview. FESA Workshop at KTH 2010 04 12. Prof. Jakob Axelsson Volvo Cars and Mälardalen University
AutoSAR Overview FESA Workshop at KTH 2010 04 12 Prof. Jakob Axelsson Volvo Cars and Mälardalen University This presentation is based on a tutorial prepared by the AutoSAR Consortium AUTOSAR Members Status
More informationSafety and Security Features in AUTOSAR
Safety and Security Features in AUTOSAR Nagarjuna Rao Kandimala, Michal Sojka Czech Technical University in Prague 166 27 Praha 6, Czech Republic Thursday 15 th November, 2012 Contents 1 Introduction 2
More informationIntroduction CHAPTER 1
CHAPTER 1 Introduction Ever since the development of the first integrated circuits in the late 1950s the complexity of such devices doubled every 20 months. A development which has been anticipated by
More informationNEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS
NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS André Groll, Jan Holle University of Siegen, Institute for Data Communications Systems {andre.groll,jan.holle}@uni-siegen.de
More informationProduct Information Services for Embedded Software
Product Information Services for Embedded Software Table of Contents 1 Technical Consulting/Engineering Services... 3 1.1 Overview of Advantages... 3 1.2 Application Areas... 3 2 Product- Services - Proficient
More informationProgram Automotive Security and Privacy
Program Automotive Security and Privacy FFI Board Funded Program 2015 10 02 Abstract This document describes the FFI board funded program Automotive Security and Privacy. This document is prepared by the
More informationBeschleunigen Sie die Entwicklung Ihrer Embedded Software mit Dienstleistungen von Vector
Beschleunigen Sie die Entwicklung Ihrer Embedded Software mit Dienstleistungen von Vector Vector Embedded Software 2013 V1.3.0 2013-04-04 Your Presenters Today Michael Buck Manager Product Services / Technical
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationChallenges for the European Automotive Software Industry
Challenges for the European Automotive Software Industry Viewpoint of a safety supplier 28 th April 2010 Franck Lesbroussart What Trends do we see? Integration of functions Functionalities are expanding
More informationEBERSPÄCHER ELECTRONICS automotive bus systems
EBERSPÄCHER ELECTRONICS automotive bus systems YOUR PARTNER FOR IN-VEHICLE NETWORKING DRIVING THE MOBILITY OF TOMORROW 2 AUTOmotive bus systems EBERSPÄCHER ELECTRONICS: THE EXPERTS IN AUTOMOTIVE BUS SYSTEMS
More informationTOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT
TOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT Go beyond error detection to ensure safety and security TABLE OF CONTENTS The Three Biggest Challenges...4 Ensure compliance
More informationFlexRay A Communications Network for Automotive Control Systems
FlexRay A Communications Network for Automotive Control Systems WFCS 2006 Rainer Makowitz Automotive Systems Engineering, EMEA Freescale and the Freescale logo are trademarks of Freescale Semiconductor,
More informationVehicular Security Hardware The Security for Vehicular Security Mechanisms
escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationCost Effective Updating of Software in Cars From IVIs, TCUs and Domain Controllers to the Entire Vehicle. White Paper
Cost Effective Updating of Software in Cars From IVIs, TCUs and Domain Controllers to the Entire Vehicle White Paper Published February 2015 Copyright 1999-2015 Redbend. All Rights Reserved. This Software
More informationPlug and Play Solution for AUTOSAR Software Components
Plug and Play Solution for AUTOSAR Software Components The interfaces defined in the AUTOSAR standard enable an easier assembly of the ECU application out of components from different suppliers. However,
More informationDeveloping an Architectural Framework towards achieving Cyber Resiliency. Presented by Deepak Singh
Developing an Architectural Framework towards achieving Cyber Resiliency Presented by Deepak Singh Presentation Content Cyber Threat Landscape Cyber Attack and Threat Profile Cyber Threat Map Cyber Security
More informationMentor Embedded Automotive Solutions
Mentor Embedded Automotive Solutions Overview May 2013 mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered trademark
More informationIn networking ECUs in heavy-duty vehicles, it is the J1939 protocol that. plays a key role. J1939 networks are based on the CAN bus (high-speed
Networking Heavy-Duty Vehicles Based on SAE J1939 From Parameter Group to plug-and-play Application In networking ECUs in heavy-duty vehicles, it is the J1939 protocol that plays a key role. J1939 networks
More informationConfiguration management in AUTOSAR
Configuration management in AUTOSAR The need for efficient process tools for Automotive System Engineering V0.01 2008-11-02 Introduction AUTOSAR will influence the ECU SW Architecture and also the way
More informationTelematics Workshop: Remote 2-Way Communication Meeting Results
March 31, 2016 Telematics Workshop: Remote 2-Way Communication Meeting Results ASAM Members and Non-Members primarily from the North American On-Road/Off-Road Commercial Vehicle Market met to discuss the
More informationSHE Secure Hardware Extension
SHE Secure Hardware Extension Data Security for Automotive Embedded Systems Workshop on Cryptography and Embedded Security Embedded World @ Nuremberg, February 2012 Content Data Security - What does it
More informationHardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
More informationEncryption Doesn t Always Protect Your Data. Presented by: Joe Sturonas PKWARE
Encryption Doesn t Always Protect Your Data Presented by: Joe Sturonas PKWARE Agenda Threat Landscape Security Risks Public/Private Keys Digital Signing and Authentication Use Case Q&A Threat Landscape
More informationInformation Security Services
Information Security Services Information Security In 2013, Symantec reported a 62% increase in data breaches over 2012. These data breaches had tremendous impacts on many companies, resulting in intellectual
More informationELEC 5260/6260/6266 Embedded Computing Systems
ELEC 5260/6260/6266 Embedded Computing Systems Spring 2016 Victor P. Nelson Text: Computers as Components, 3 rd Edition Prof. Marilyn Wolf (Georgia Tech) Course Topics Embedded system design & modeling
More informationANSYS SCADE Model-Based Development Solutions for AUTOMOTIVE. Critical Systems & Software Development Solutions
ANSYS SCADE Model-Based Development Solutions for AUTOMOTIVE Critical Systems & Software Development Solutions Embedded Systems and Software Challenges in Automotive Production-Proven International and
More informationISO 26262 Introduction
ISO 26262 Introduction Prof. Christian Madritsch 2012 Table of Contents Structure of ISO 26262 Management of Functional Safety Product Development System Level Product Development Hardware Level Product
More informationStandardized software components will help in mastering the. software should be developed for FlexRay were presented at
Embedded Software for FlexRay Systems Special aspects and benefits of implementing modularized software Standardized software components will help in mastering the growing complexity of the interplay of
More informationSecure software updates for ITS communications devices
Secure software updates for ITS communications devices - International Standardization Activity in ITU-T SG17 - Masashi Eto, Senior researcher, Cybersecurity laboratory, Network security research institute,
More informationSoftware House Embedded Systems
Software House Embedded Systems Contacts: E-mobility, chassis, driver assistance and body electronics: Martin Richter +49 5371 805-1041 Infotainment, radio and instrument cluster: Sven Lochau +49 30 39978-7631
More informationCertification Report
Certification Report EAL 4 Evaluation of SecureDoc Disk Encryption Version 4.3C Issued by: Communications Security Establishment Certification Body Canadian Common Criteria Evaluation and Certification
More informationVehicle Electronics. Services and Solutions to Manage the Complexity
Vehicle Electronics Services and Solutions to Manage the Complexity INNOVATIONS & DEVELOPMENT CYCLES Commercial vehicle manufacturers are experiencing a technological change. In addition to the rising
More informationKeeping Up with the Data & Security Demands of the Automotive IoT
Keeping Up with the Data & Security Demands of the Automotive IoT AESIN 2015 Robert Moran Automotive Systems Engineering O C T O B E R 2 0 1 5 External Use Keeping Up with the Data & Security Demands of
More informationAUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems. Robert Leibinger 5 th June 2015
AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems Robert Leibinger 5 th June 2015 Agenda Architecture requirements for ADAS ECU Overview of different architecture approaches Compare and contrast
More informationAutomotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car
Automotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car Authors: Dr. Joerg Borchert, VP of Chip Card and Security ICs, Infineon North America Shawn Slusser, VP of Automotive,
More informationSafe Automotive software architecture (SAFE)
Safe Automotive software architecture (SAFE) 01-03-2012, ARTEMIS Technology Conference 2012 Stefan Voget Continental Automotive Content Motivation Project Organization Work Packages Approach for Interoperability
More informationSafety Issues in Automotive Software
Safety Issues in Automotive Software Paolo Panaroni, Giovanni Sartori INTECS S.p.A. SAFEWARE 1 INTECS & Safety A very large number of safety software development, V&V activities and research project on
More informationSecure Software Delivery and Installation in Embedded Systems
Secure Software Delivery and Installation in Embedded Systems André Adelsbach, Ulrich Huber, Ahmad-Reza Sadeghi Horst-Görtz-Institute, Bochum, Germany ISPEC 2005 Presentation Singapore, April 13, 2005
More informationSafe-E. Safe-E Introduction. Coordination: Andreas ECKEL TTTech Computertechnik AG andreas.eckel@tttech.com
Introduction Coordination: Andreas ECKEL TTTech Computertechnik AG andreas.eckel@tttech.com The Eurostars Project within the ITEA-2 Safe Project Eurostars : what is it and why?: Eurostars is an Eureka
More informationNew Methodologies in Smart Card Security Design. Y.GRESSUS Methodology and Secure ASIC development manager, Bull CP8
New Methodologies in Smart Card Security Design Y.GRESSUS Methodology and Secure ASIC development manager, Bull CP8 Japan Security Conference Page 2 Trends Opportunities New methodologies Summary Concurrent
More informationNHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA
NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH Arthur Carter, Frank Barickman, NHTSA Electronic Systems Safety Research Division Electronic Systems Safety (ESS) Research Division conducts research to ensure
More informationA Survey Report by Horst Hientz Hans-Jürgen Kugler
A Survey Report by Horst Hientz Hans-Jürgen Kugler Bonifaz Maag Dominik Strube 1 Content Survey framework Results Trends & Drivers Impact on business models Impact on automotive industry Impact on automotive
More informationSecure Key Management A Key Feature for Modern Vehicle Electronics
13AE-0069 Secure Key Management A Key Feature for Modern Vehicle Electronics Christian Schleiffer, Marko Wolf, André Weimerskirch, and Lars Wolleschensky ESCRYPT Copyright 2012 SAE International ABSTRACT
More informationCompliance. Review. Our Compliance Review is based on an in-depth analysis and evaluation of your organization's:
Security.01 Penetration Testing.02 Compliance Review.03 Application Security Audit.04 Social Engineering.05 Security Outsourcing.06 Security Consulting.07 Security Policy and Program.08 Training Services
More informationWireless Sensor Network Security. Seth A. Hellbusch CMPE 257
Wireless Sensor Network Security Seth A. Hellbusch CMPE 257 Wireless Sensor Networks (WSN) 2 The main characteristics of a WSN include: Power consumption constrains for nodes using batteries or energy
More informationMitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security
Mitigating Server Breaches with Secure Computation Yehuda Lindell Bar-Ilan University and Dyadic Security The Problem Network and server breaches have become ubiquitous Financially-motivated and state-sponsored
More informationUser-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools
User-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools The simple CAN ECU is a thing of the past. Now, a typical ECU utilizes many functions of the AUTOSAR basic software to perform
More informationEB Automotive Driver Assistance EB Assist Solutions. Damian Barnett Director Automotive Software June 5, 2015
EB Automotive Driver Assistance EB Assist Solutions Damian Barnett Director Automotive Software June 5, 2015 Advanced driver assistance systems Market growth The Growth of ADAS is predicted to be about
More informationCrucial Role of ICT for the Reinvention of the Car
Joint EC / EPoSS / ERTRAC Expert Workshop 2011 Electric Vehicle System Integration and Architecture Crucial Role of ICT for the Reinvention of the Car Karl-Josef Kuhn Siemens Corporate Research and Technologies
More informationSCSK s Automotive Software Business
SCSK s Automotive Software Business Syoichi Kondou Executive Officer Automotive Systems Business Div. Manufacturing Systems Business Group SCSK Corporation May 20, 2015 Copyright(c) SCSK Corporation Page
More informationCHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution
More informationSystem Security Solutions for the connected world. www.infineon.com/ccs
System Security Solutions for the connected world www.infineon.com/ccs Solutions for rising security demands The right balance between hardware-based and software-based security mechanisms allows you to
More informationIntelligent development tools Design methods and tools Functional safety
Intelligent development tools Design methods and tools Functional safety Flanders DRIVE Index: Flanders DRIVE 1 Importance of functional safety 2 Functional safety for mechatronic systems 4 Global functional
More informationSECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES
SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES Contents Introduction... 3 DRM Threat Model... 3 DRM Flow... 4 DRM Assets... 5 Threat Model... 5 Protection of
More informationECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0
ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0 Dhanamjayan P.R. 1, Kuruvilla Jose 2, Manjusree S. 3 1 PG Scholar, Embedded Systems, 2 Specialist,
More informationManaging Vulnerabilities for PCI Compliance White Paper. Christopher S. Harper Managing Director, Agio Security Services
Managing Vulnerabilities for PCI Compliance White Paper Christopher S. Harper Managing Director, Agio Security Services PCI STRATEGY Settling on a PCI vulnerability management strategy is sometimes a difficult
More informationSECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014
SECURITY PRACTICES FOR ADVANCED METERING INFRASTRUCTURE Elif Üstündağ Soykan, Seda Demirağ Ersöz 08.05.2014, ICSG 2014 Table of Contents Introduction AMI Communication Architecture Security Threats Security
More informationHost Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
More informationConvenient Charging of Electric Vehicles
Technical Article Convenient Charging of Electric Vehicles Smart Charging with MICROSAR IP enables flexible charging processes and easy payment Compared to conventionally powered vehicles, electric vehicles
More informationTesting the Internet of Things
Presentation to TMF Testing the Internet of Things Test and Verification Solutions Delivering Tailored Solutions for Hardware Verification and Software Testing What is the IoT? Wikipedia The Internet of
More informationHoneywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014
Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Process Solutions (HPS) June 4, Industrial Cyber Security Industrial Cyber Security is the leading provider of cyber security
More informationNetwork Security in Building Networks
Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content
More informationCautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work
Cautela Labs Cloud Agile. Secured. Threat Management Security Solutions at Work Security concerns and dangers come both from internal means as well as external. In order to enhance your security posture
More informationASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY
ASSESSMENT OF THE ISO 26262 STANDARD, ROAD VEHICLES FUNCTIONAL SAFETY Dr. Qi Van Eikema Hommes SAE 2012 Government/Industry Meeting January 25, 2012 1 Outline ISO 26262 Overview Scope of the Assessment
More informationCertification Report
Certification Report EAL 4+ Evaluation of WatchGuard Issued by: Communications Security Establishment Canada Certification Body Canadian Common Criteria Evaluation and Certification Scheme Government of
More informationThe Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency
logo The Panoptix Building Efficiency Solution: Ensuring a Secure Delivery of Building Efficiency Understanding the Multiple Levels of Security Built Into the Panoptix Solution Published: October 2011
More informationFrost & Sullivan Cybersecurity Presentation
Frost & Sullivan Cybersecurity Presentation 2015 will be the Year of Security, Prognostics & Evolution of OEM Vehicle Automation Strategies Praveen Narayanan Research Manager Feb 2015 Key Trends Impacting
More informationWhere every interaction matters.
Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper
More informationVELOCITY LAB TM Embedded Development Ecosystem
VELOCITY LAB TM Embedded Development Ecosystem 0C05B Renesas Electronics America Inc. Renesas Technology & Solution Portfolio 2 Microcontroller and Microprocessor Line-up 2010 2013 32-bit 8/16-bit 1200
More informationautomotive.elektrobit.com Driver assistance software EB Assist solutions
automotive.elektrobit.com Driver assistance software EB Assist solutions From driver assistance systems to automated driving Automated driving leads to more comfortable driving and makes the road safer
More informationFunctional Safety and Automotive SW - Engineering Introduction ISO 26262 @ Daimler
Functional Safety and Automotive SW - Engineering Introduction ISO 26262 @ Daimler Dr. Juergen Schwarz Senior Manager Functional Safety & E/E - Processes WOCS 2012 September 27, 2012, Tokyo, Japan Overview
More informationCYBERSECURITY FOR THE AUTOMOBILE IS THE CAR OF THE FUTURE STILL A CAR?
CYBERSECURITY FOR THE AUTOMOBILE IS THE CAR OF THE FUTURE STILL A CAR? Alberto Sangiovanni-Vincentelli The Edgar L. and Harold H. Buttner Chair of EECS University of California at Berkeley Co-Founder,
More informationVICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui
VICTORIA UNIVERSITY OF WELLINGTON Te Whare Wānanga o te Ūpoko o te Ika a Māui School of Engineering and Computer Science Te Kura Mātai Pūkaha, Pūrorohiko PO Box 600 Wellington New Zealand Tel: +64 4 463
More informationThe Problem: Automotive safety recalls, Control Systems Diagnostics, Stability Control, Traction Control, Anti-lock Braking, Adaptive Cruise Control
AUTOPLUG: Remote Diagnostics Automotive Architecture for Control Software Safety Rahul Mangharam, Yash V. Pant and Truong X. Nghiem Department of Electrical & Systems Engineering University of Pennsylvania
More information7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
More information