SECURITY CHALLENGES IN THE SMART CAR
|
|
- Mitchell Palmer
- 7 years ago
- Views:
Transcription
1 SECURITY CHALLENGES IN THE SMART CAR BASED ON ELA / SYSTEMX ( & ECO-FEV / FP7 PROJECTS RESULT ( W. KLAUDEL 26/11/2015 GROUPE RENAULT
2 AGENDA Car evolution and cybersecurity threats Why such interest today? ELA/SystemX project contribution to cybersecurity challenges Methods, Architecture and Technology eco-fev/fp7 project contribution to the Identity and right management for extended car & enterprise Service delivery and identity management separation, federative approach (OpenID) W. KLAUDEL 26/11/2015 2
3 CAR EVOLUTION AND CYBERSECURITY THREATS In the past Today Threats electronics dysfunction Threats. + direct attacks from the Internet! theft of personal data navigation and infotainment dysfunction mass attacks possible Threats. + car theft theft of personal data TCU safety critical electronics W. KLAUDEL 26/11/2015 3
4 CAR EVOLUTION AND CYBERSECURITY THREATS Tomorrow Services Remote access to the car sensors (position, temperature, cameras,...) Diagnostic and remote update (OTA) Remote control (PC, smartphone...): preconditioning, opening Keyless access & start (smartphone, biometric wearable...) => car sharing ADAS (passive, active, cooperative) Autonomous driving Production After sale / Help Desk Services RSU Biometric Isolated TCU architecture no more possible remote (mass) sabotage threats have to be considered!!!! W. KLAUDEL 26/11/2015 4
5 CYBER SECURITY THREATS: MITIGATION ACTIONS Strengthening cybersecurity milestones in the V cycle & objectification of the about risk evaluation, standardization and certification (like ISO 2700x and Common Criteria) EE architecture adaptation to new threats More cyber security technology in all EE components W. KLAUDEL 26/11/2015 5
6 SystemX ELA project Projet ELA Electronique et Logiciel pour l Automobile Challenges Create architectural patterns ensuring the tradeoffs between scalability, safety, security and cost Propose methods and tools to control the costs of design and validation Create the technological components for "affordable architectures Tasks (work packages) T1: Real time virtualization T2: Image processing, data fusion for ADAS T3: Safe algorithms for Autosar multicore architectures T4: Cybersecurity
7 ELA : end user use cases / services ADAS Emergency stop, raised by ITS geonet or pedestrian recognition Automatic parking (monitored by the user from his smart device) Lane and Distance Keeping Assistance NAVIGATION AND INFOTAINMENT Internet access, Internet radio Connected navigation with Points of Interest Integrated HMI and vehicle equipment personalization OTHERS Vehicle access, preconditioning and start through Internet using Smartphone Software installation and update through Internet (OTA) E-Tolling, ecall Display of vehicle environment on the driver smartphone or tablet Remote diagnostics
8 Cybersecurity Risk Management: an optimization problem Design space {product definition x architecture & protections} => {attacks, consequences of successful attacks} Attack tree Attack goal: attacker aim, e.g. car theft, sabotage of brakes while driving at high speed Attacked function: attacked vehicle function, e.g. automatic brake Attack method: technical idea of attack, e.g. install unauthorized software Attack on asset: attack technique which is applied to an asset, e.g. message injection on the Ethernet interface of the Image Processing Unit (i.e. the asset) Attack entry point: attack entry point in the vehicle, e.g. 3G/4G interface of the Communication Unit (CU). consequences attack probabilities Optimization objectives Propose architecture and protection mechanism in order to: Min. cost Max. performance, usage facilities Min. risk, i.e. (consequence * probability) Problem definition Degree of freedom
9 ELA RISK ANALYSIS METHOD: ATTACK TREE Attack goal: attacker aim, e.g. inhibit/lock brakes while driving at high speed R=F(S,C,A): attack goal risk (vector) S: severity vector : Safety, Privacy, Financial, Operational C: controllability for safety related attacks A: attack probability Attacked function: attacked vehicle function, e.g. automatic brake Attack method: technical idea of attack, e.g. install unauthorized software, communicate falsified information Attack on asset: attack technique which is applied to an asset, e.g. message injection on the Ethernet of the IPU (Image Proc. Unit) Attack entry point: attack entry point to the vehicle, e.g. 3G/4G interface of the Communication Unit (CU). Two applications for elaborated method: 1. Security requirement establishment for all Attack goals qualified by R, S & C => maximum of accepted probability A for all Attacks on assets: 2. Security audit for all Attack goals qualified by S & C and known A for all Attacks on assets => R for all Attack goals (A calculated according to known protections) 9
10 CYBERSECURITY MILESTONES IN THE V CYCLE Attack goals (*) Concepts of operation Verification and validation Operation and maintenance New risk monitoring and countermeasures (*) Risk analysis and security requirements (*) Requirements and architecture System verification and validation Risk analysis and audit (*) Security mechanism selection (*) Detailed design Integration, tests and verification Pentesting, certification (*) Implementation Security mechanism implementation (*) (*) security add-ons
11 ELA attack goals Car stealing Personal data theft (credentials included) Sensor information access (position, camera, temperature ) Navigation/infotainment malfunction Preconditioning/personalization activation/deactivation/malfunction Vehicle immobilization Braking inhibition, untimely braking or steering movement
12 ELA, Secure architecture, defense perimeters Internet radio source Internet web sites OEM OEM & partner clouds radio GPS Internet Internet network access : 3/4 G, WI-FI Internet network access : 3/4 G, WI-FI, G5 Internet Vehicle Communication Unit Switch/Router Ethernet IP Dashboard Other displays Three defense perimeters Infotainment Control Unit Vehicle Control Unit Image Processing Unit CAN ECU ECU ECU ECU ECU ECU Body & multimedia Powertrain & chassis
13 SECURE ARCHITECTURE: VIRTUALISATION Cellular GNSS G5 BT Radio broadcasting IP connectivity gateway Safety related service gateways (ecall, G5, GPS,..) Hypervisor No safety related service gateways (phone, radio, http...) Communication Unit (Antenna module) - Virtualization & partitioning - IDS & IPS - Secure boot IP comm. Ethernet USB Hypervisor Autosar GENEVI Android IP comm. Infotainment Control Unit - Virtualization & partitioning - Secure boot CAN Ethernet
14 Execution environment and security Secure boot and signed dynamic modules Application security : authentication and access rights (vehicle access included) Application separation OS applications Virtualization Communication and security Protocols & authentication/signature/encryption (authenticity, non repudiation, confidentiality, anonymization) CAN (*), Ethernet, WI-FI, 3/4/5 G, G5, Bluetooth, USB But also application level: http, CoAP, Some IP, Webservices. Hardware Security Modules (HSM) TECHNOLOGICAL COMPONENTS / FUNCTIONALITIES Cryptographic hardware acceleration, secure storage, secure execution zones (*) project proposed patent
15 eco-fev efficient Cooperative infrastructure for Fully Electric Vehicles Witold KLAUDEL, Renault This project is co-funded by the European Union
16 Identity and right management, extended car & enterprise, eco-fev/fp7 project eco-fev: efficient Cooperative infrastructure for Fully Electric Vehicles (Sept 2012-June2015, 4,3 M ) set of mobility services based on learning machine Hitachi Europe (coordinator), CEA, Centro Ricerche FIAT, Conseil Général de l Isère, EICT, ENERGRID, Facit Research,Politecnico di Torino, RENAULT (use cases, architecture, system spec), TECNOSITAF and TU Berlin Public transport operators Road infra operators Car rental operators Services Trip planning, assistance & monitoring Charging & parking facility operators Urban delivery operators Data collection & mining Monitoring & Optimization Weather info & map providers Banks 16 FEV, drivers & travelers
17 Design orientation eco-fev IT solutions as a support for business model flexibility Banking Banking Identity Management (users, cars) OpenID & OAuth Unique subscription Service delivery and identity management separation, federative approach (OpenID) Route planning & navigation Data collection & aggregation Integration & applications Operator Operator Internet of things style, web-services eco-fev ontology HMI & raw service separation Road infra. Road infra. Operator Operator Parking & Charging Parking & Charging facility operator facility operator 17 Backend function Reference implementation Energy provider
18 STILL NEED TO BE WORKED Normative approaches, risk management, validation / certification ISO, SAE (J3061)=>ISO, ETSI (TVRA) Identity and Right management life cycle: production, sale, after sale, second hand market, destruction Cars, parts Drivers & passengers Car makers, parts manufacturers, road infrastructure (car2x), service providers Federative approach introduction Architecture Hardware acceleration on SOCs & Linux, Autosar integration Communication protocols, network management Defense in Depth Embedded IDS / IPS (use of hardware acceleration) W. KLAUDEL 26/11/
19
Secure software updates for ITS communications devices
Secure software updates for ITS communications devices - International Standardization Activity in ITU-T SG17 - Masashi Eto, Senior researcher, Cybersecurity laboratory, Network security research institute,
More informationSecurity in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
More informationThe relevance of cyber-security to functional safety of connected and automated vehicles
The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction
More informationAcquisition of Novero. Investor presentation 18th December 2015
Acquisition of Novero Investor presentation 18th December 2015 What Novero brings to Laird The acquisition of Novero and LSR rebalances our business, Wireless Systems will now be of a similar scale to
More informationIdentification of Authenticity Requirements in Systems of Systems by Functional Security Analysis
Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis Andreas Fuchs and Roland Rieke {andreas.fuchs,roland.rieke}@sit.fraunhofer.de Fraunhofer Institute for
More informationSecurity risk analysis approach for on-board vehicle networks
1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle
More informationTelematics Workshop: Remote 2-Way Communication Meeting Results
March 31, 2016 Telematics Workshop: Remote 2-Way Communication Meeting Results ASAM Members and Non-Members primarily from the North American On-Road/Off-Road Commercial Vehicle Market met to discuss the
More informationAutomotive Software Development Challenges Virtualisation and Embedded Security
Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive
More informationMentor Embedded Automotive Solutions
Mentor Embedded Automotive Solutions Overview May 2013 mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered trademark
More informationVehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
More informationCustomer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions
September 2013 Silicon Support & Professional Eng. Services Customer Experience Freescale Provided SW & Solutions Provide Valued Software, Support & Professional Engineering Services, Competitively 2 Customer
More informationAutomotive and Industrial Data Security
André Weimerskirch Cybersecurity for Cyber-Physical Systems Workshop April 23-24, 2012 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions Communication
More informationEVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé
More informationTechnology.Transfer.Application.
Technology.Transfer.Application. Steinbeis Research Center Elektromobility and Information Systems 2015 Steinbeis Technology. Transfer. Application. www.steinbeis.de Open and Secure Operating for mobility
More informationOT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE
OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,
More informationFrost & Sullivan Cybersecurity Presentation
Frost & Sullivan Cybersecurity Presentation 2015 will be the Year of Security, Prognostics & Evolution of OEM Vehicle Automation Strategies Praveen Narayanan Research Manager Feb 2015 Key Trends Impacting
More informationEB Automotive Driver Assistance EB Assist Solutions. Damian Barnett Director Automotive Software June 5, 2015
EB Automotive Driver Assistance EB Assist Solutions Damian Barnett Director Automotive Software June 5, 2015 Advanced driver assistance systems Market growth The Growth of ADAS is predicted to be about
More informationDeveloping software for Autonomous Vehicle Applications; a Look Into the Software Development Process
Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process By Andreas Lindenthal and Franz Walkembach, Wind River The concept of autonomous vehicles or unmanned
More informationAUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems. Robert Leibinger 5 th June 2015
AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems Robert Leibinger 5 th June 2015 Agenda Architecture requirements for ADAS ECU Overview of different architecture approaches Compare and contrast
More informationMentor Embedded IVI Solutions
Mentor Embedded IVI Solutions Infotainment Instrument Cluster Andrew Patterson andrew_patterson@mentor.com Business Development Director Automotive Embedded Software mentor.com/embedded Android is a trademark
More informationThe research area of SET group is software engineering, and model-based software engineering in particular:
Introduction The research area of SET group is software engineering, and model-based software engineering in particular: Given the high-tech software-intensive industry in the Eindhoven region, we consider
More informationWhat is Really Needed to Secure the Internet of Things?
What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices
More informationCHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution
More informationKey requirements for Interoperable IoT systems
Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards
More information1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk
Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction
More informationCrucial Role of ICT for the Reinvention of the Car
Joint EC / EPoSS / ERTRAC Expert Workshop 2011 Electric Vehicle System Integration and Architecture Crucial Role of ICT for the Reinvention of the Car Karl-Josef Kuhn Siemens Corporate Research and Technologies
More informationToward Connected Vehicle with AGL
Toward Connected Vehicle with AGL September 9 th 2015 (at the AGL All Member Meeting - 2015 Fall) Ken-ichi Murata BR Connected Strategy & Planning Toyota Motor Corporation 68% of new vehicle will be connected
More informationS E P T E M B E R 2 0 1 4
S E P T E M B E R 2 0 1 4 IRIS-ENABLED SMARTWATCH AND ITS APPLICATIONS INTRODUCTION Iris Recognition Enabled Smartwatch Convergence of wearables and biometrics Will bring the widespread use of iris recognition
More informationSNAPPIN.IO. FWR is a Hardware & Software Factory, which designs and develops digital platforms.
SNAPPIN.IO SNAPPIN.IO Snappin is an ecosystem oriented to retail that aims to increase in store sales due to the proactive involvement of users, relying on mechanisms of "Engagement", "Empowerment " and
More informationFor the Future IT Convergence Vehicle Connected & Downloadable Infotainment Platform. Pusik Park. Korea Electronics Technology Institute
For the Future IT Convergence Vehicle Connected & Downloadable Infotainment Platform Pusik Park Korea Electronics Technology Institute Agenda Trend Introduction of the project Key missions 2 Trend Open
More informationGEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M
GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M Anvay Lonkar, Marketing Manager M2M Solutions & Services Gemalto M2M FORUM, MILAN, 15 May 2013 Gemalto delivers trusted and convenient digital services to billions
More informationAdvanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software
133 Hitachi Review Vol. 63 (2014), No. 2 Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software Yoshinobu Fukano, Dr. Sci. Kosei Goto Masahiro Matsubara
More informationAutomotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car
Automotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car Authors: Dr. Joerg Borchert, VP of Chip Card and Security ICs, Infineon North America Shawn Slusser, VP of Automotive,
More informationEncyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.
Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:
More informationCyber-Security in the Connected Car Age
IHS AUTOMOTIVE Presentation Cyber- in the Connected Car Age GENIVI Conference Seoul, October 21, 2015 ihs.com Egil Juliussen, Director Research & Principal Analyst +1 630 432 1304, egil.juliussen@ihs.com
More informationPEMS Conference. Acquiring Data from In-Vehicle Networks. Rick Walter, P.E. HEM Data Corporation
PEMS Conference Acquiring Data from In-Vehicle Networks Rick Walter, P.E. HEM Data Corporation Acquiring Data from In-Vehicle Networks Topics Overview/Benefits Heavy Duty J1939 protocol Available J1939
More informationBeyond passwords: Protect the mobile enterprise with smarter security solutions
IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive
More informationSecurity in ST : From Company to Products
Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately
More informationA Survey of Existing Technologies, Applications, Products, and Services for Geofencing
Report to the US Department of Transportation Research and Innovative Technology Administration A Survey of Existing Technologies, Applications, Products, and Services for Geofencing California PATH Program
More informationEMX-2500 DATA SHEET FEATURES GIGABIT ETHERNET REMOTE CONTROLLER FOR PXI EXPRESS MAINFRAMES SYSTEM LEVEL FUNCTIONALITY
DATA SHEET EMX-2500 GIGABIT ETHERNET REMOTE CONTROLLER FOR PXI EXPRESS MAINFRAMES FEATURES SYSTEM LEVEL FUNCTIONALITY Industry s first gigabit Ethernet Remote controller for PXI express mainframes Up to
More information2016 North American Over-the-air Update Enabling Technology Leadership Award
2016 North American Over-the-air Update Enabling Technology Leadership Award 2016 Contents Background and Company Performance... 3 Industry Challenges... 3 Conclusion... 7 Significance of Enabling Technology
More informationCYBERSECURITY FOR THE AUTOMOBILE IS THE CAR OF THE FUTURE STILL A CAR?
CYBERSECURITY FOR THE AUTOMOBILE IS THE CAR OF THE FUTURE STILL A CAR? Alberto Sangiovanni-Vincentelli The Edgar L. and Harold H. Buttner Chair of EECS University of California at Berkeley Co-Founder,
More informationIn the pursuit of becoming smart
WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution
More informationChallenges for the European Automotive Software Industry
Challenges for the European Automotive Software Industry Viewpoint of a safety supplier 28 th April 2010 Franck Lesbroussart What Trends do we see? Integration of functions Functionalities are expanding
More informationOver-the-Air Software Updates: Deployment Strategies
Over-the-Air Software Updates: Deployment Strategies John Cain Head of Business Development Arynga, Inc. September, 2014 Topics Covered What is OTA/FOTA/SOTA? How does it work? How and who does it benefit?
More informationEB TechPaper. Test drive with the tablet. automotive.elektrobit.com
EB TechPaper Test drive with the tablet automotive.elektrobit.com 1 A great many test miles have to be covered in the development and validation of driver assistance systems. A tablet with Elektrobit (EB)
More informationSymantec Client Management Suite 8.0
IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,
More informationIn-Vehicle Infotainment. A View of the European Marketplace
In-Vehicle Infotainment A View of the European Marketplace In-Vehicle Infotainment: A View of the European Marketplace A number of trends are impacting the automotive industry, creating fertile ground
More informationCar Data New access via telematic systems. Maja Berends, ADAC. 12 September 2013 10-13 SEPT 1
Car Data New access via telematic systems Maja Berends, ADAC 12 September 2013 10-13 SEPT 1 Access to car data Relevance for Automobile Clubs Ø Consumer protection Consumers free choice Ø Consumer data
More informationSecure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems
Secure Services and Quality Testing SST Security Engineering Privacy by Design Trusted Solutions for Service Ecosystems Mario Hoffmann Head of Department Fraunhofer AISEC in a nutshell Fraunhofer Profile
More informationIntroduction CHAPTER 1
CHAPTER 1 Introduction Ever since the development of the first integrated circuits in the late 1950s the complexity of such devices doubled every 20 months. A development which has been anticipated by
More informationSecurity 4.0 - Security by Separation
Security 4.0 - Security by Separation Making Industrial Control Systems More Secure Author(s): Date: Version Mehmet Özer 19.05.2015 v1.0 SYSGO AG 1 Agenda Security Challenges IoT Architecture for Industrial
More informationThe Vision of Vehicle Infrastructure Integration (VII)
The Vision of Vehicle Infrastructure Integration (VII) Ralph L. Robinson ITS Integration Office September, 2007 Cooperative Highways SAFETY MOBILITY Collision Avoidance Signal Control Emergency Alerts
More informationEnterprise M2M Solutions. Fast, Flexible, Cost Effective
Enterprise M2M Solutions Fast, Flexible, Cost Effective The Procon Difference Procon provides M2M platforms and applications for the management of all mobile assets. We are an Australian owned company
More informationAbout the Authors Preface Acknowledgements List of Acronyms
Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security
More informationWeb of Things Architecture
Web of Things Architecture 1. Introduction This document is an explanation about the architecture of Web Of Things (WoT). The purpose of this document is to provide (a) a guideline of the mapping between
More informationWearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec
Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec 3.58 KM 12.11 KPH 493 Calories 114 BPM WEARABLE TECH EVOLUTION AND SECURITY GRANT BROWN SECURITY STRATEGIST @thegrantbrown
More informationAutomotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri
Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing
More informationWIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
More informationDesignWare IP for IoT SoC Designs
DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to
More informationIntroducing BEEKS Proximity Solutions. Developer Kit Gets You Started
Introducing BEEKS Proximity Solutions BEEKS from BluVision provides industry-leading Bluetooth beacon solutions to enterprises and innovative developers. Leveraging a cutting-edge, cloudbased solution,
More informationKeeping Up with the Data & Security Demands of the Automotive IoT
Keeping Up with the Data & Security Demands of the Automotive IoT AESIN 2015 Robert Moran Automotive Systems Engineering O C T O B E R 2 0 1 5 External Use Keeping Up with the Data & Security Demands of
More informationIntegrated Engineering Solutions
Integrated Engineering Solutions Karthikeyan Natarajan & Prashant Kamat November 2014 1 Integrated Engineering Solutions: An Introduction AUTOMOTIVE Tie-up with 8 OEMs and 10 Tier-1 majors AEROSPACE &
More informationAN INTEL COMPANY WIND RIVER AUTOMOTIVE SOLUTIONS
AN INTEL COMPANY WIND RIVER AUTOMOTIVE SOLUTIONS The Software-Enabled Automobile Software is a key differentiating factor for today s automakers. It is critical to harnessing the opportunities of autonomous
More informationEmbedded Java & Secure Element for high security in IoT systems
Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product
More informationEnterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
More informationCyber Security and Privacy
Cyber Security and Privacy Jovan Golić CySeP Winter School, Stockholm, 2014 EIT ICT Labs EIT ICT Labs is one of the first Knowledge and Innovation Communities set up in 2010 by the European Institute of
More informationAn OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón
June 10-11, 2008 Berlin, Germany An OSGi based HMI for networked vehicles Telefónica I+D Miguel García Longarón Networked Vehicle 2 Networked Vehicle! Tomorrow, the vehicles will be networked! Using Always
More informationINSTALLATION FUTURES - ITS IN YOUR VEHICLE FCS / ITS (UK) EVENT, DAVENTRY, 19 MAY 2011. Alan Carter Consultant to innovits
The Vehicle Aftermarket s place in the Global Market for Intelligent Transport Systems and Services (ITSS) INSTALLATION FUTURES - ITS IN YOUR VEHICLE FCS / ITS (UK) EVENT, DAVENTRY, 19 MAY 2011 Based on
More informationARC Forum Orlando 2015 Building a Secure Industrial Internet of Things
ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things Sid Snitkin Vice-President & GM Enterprise Advisory Services ARC Advisory Group srsnitkin@arcweb.com Session Overview ARC Presentation
More informationIoT Security Concerns and Renesas Synergy Solutions
IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas
More informationBellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
More informationSecuring Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.
Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources
More informationIndustrial Application of MultiPARTES
Industrial Application of MultiPARTES January 21st, 2012 HiPEAC Workshop 2013 Integration of mixed-criticality subsystems on multi-core processors David Gonzalez (dgonzalez@ikerlan.es) 1 Definitions and
More informationRIOT CONTROL The Art of Managing Risk for Internet of Things
RIOT CONTROL The Art of Managing Risk for Internet of Things Kim Singletary McAfee Session ID: Session Classification: Advanced Intro What is IoT and why is it different? What are the risks? What are the
More informationJEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development
JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development ROADMAP TO AUTOMATED DRIVING Autonomous Driving (Chauffeured Driving) Increasing Capability
More informationTesting the Internet of Things
Presentation to TMF Testing the Internet of Things Test and Verification Solutions Delivering Tailored Solutions for Hardware Verification and Software Testing What is the IoT? Wikipedia The Internet of
More informationSecurity, Cloud. Guy Pujolle Guy.Pujolle@lip6.fr
Post-IP Network Knowledge, Piloting, Virtualization, Security, Cloud Guy Pujolle Guy.Pujolle@lip6.fr Where we are? Stone age Bronze age Iron age 2.5 M années 8000 années 3000 années Printing Stone age
More informationTOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT
TOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT Go beyond error detection to ensure safety and security TABLE OF CONTENTS The Three Biggest Challenges...4 Ensure compliance
More informationEnabling Smart Data on M2M Gateways and Aggregators
Enabling Smart Data on M2M Gateways and Aggregators How OSGi and Java enables smart data on M2M aggregators and gateways. 3/27/2013 Hitachi Communication Technologies America, Inc. Walt Bowers Chief Architect
More informationNetwork Security in Building Networks
Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content
More informationData Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
More informationIOTIVITY AND EMBEDDED LINUX SUPPORT. Kishen Maloor Intel Open Source Technology Center
IOTIVITY AND EMBEDDED LINUX SUPPORT Kishen Maloor Intel Open Source Technology Center Outline Brief introduction to IoTivity Software development challenges in embedded Yocto Project and how it addresses
More informationAdvanced Safety. Driver Vehicle Interface Collision Avoidance & Mitigation Vehicle Communications. Helping industry engineer safe vehicles
SAE INTERNATIONAL Advanced Safety Standards & Resources Driver Vehicle Interface Collision Avoidance & Mitigation Vehicle Communications Helping industry engineer safe vehicles Driver Vehicle Interface,
More informationNXP s Solution to ecall Brussels, October 19 th, 2010
NXP s Solution to ecall Brussels, October 19 th, 2010 Agenda The Mission of NXP and its Partners NXP s ecall platform Awareness the Next Step Conclusions NXP leads innovation in Telematics Breakthrough
More informationACEA PRINCIPLES OF DATA PROTECTION IN RELATION TO CONNECTED VEHICLES AND SERVICES
ACEA PRINCIPLES OF DATA PROTECTION IN RELATION TO CONNECTED VEHICLES AND SERVICES September 2015 INTRODUCTION We, the member companies of ACEA, are committed to providing our customers with a high level
More informationSecure Communication Made Easy
Secure Communication Made Easy Remote Access to Industrial Equipment Easy Setup Central Administration Firewall Friendly State-of-Art Security Fast Return On Investment PROGRAMMING CONTROL LOGGING INFRASTRUCTURE
More informationEnabling Secure Mobile Operations with Commercial Products
Enabling Secure Mobile Operations with Commercial Products Grant Wagner Technical Director Trusted Systems Research National Security Agency October 16, 2014 Overview Moving to Commercial Products Mobile
More informationHitachi Europe R&D. Dr. David Williams. Activity in Europe. Hitachi Cambridge Laboratory. March 2014
Hitachi Europe R&D (ERD) Activity in Europe March 2014 Dr. David Williams Hitachi Cambridge Laboratory Contents 1. General information 2. ICT and Big Data Laboratories 3. Cambridge Laboratory 1 1-1 Hitachi
More informationrm Management apping eather iagnostics Integrating ntroller adcell/sensors lematics
rm Management apping eather iagnostics Integrating Agricultural IMPLEMENT Control & monitoring with ISOBUS, SmartphoneS & Tablets Sma Tab Virt ntroller adcell/sensors lematics Over the years, the agriculture
More informationWhere Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things
Where Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things aisa.org.a u aisa.org.a u Rebecca Herold, CEO The Privacy Professor 1 rebeccaherold@rebeccaherold.com Agenda Technology
More informationParadigm shift in insurance policies
Athens, April 2016 Paradigm shift in insurance policies ADAPTIVE technical workshop Agenda Driverless cars & need for insurance Shift of Motor Insurance model Motor liability Product Liability Data ownership
More informationEthernet Oriented E/E Architecture with CAN Virtualization for Automated Driving Vehicles
Ethernet Oriented E/E Architecture with CAN Virtualization for Automated Driving Vehicles Mikio Kataoka, Mitsuhiro Kitani *, Masaaki Nakamura, Satoshi Otsuka *, Kenichi Osada, and Kohei Sakurai Hitachi
More informationChris Boykin VP of Professional Services
5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing
More informationIntroduction: Why do we need computer networks?
Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February
More informationThe Internet on Wheels and Hitachi, Ltd. By Hitachi Data Systems
The Internet on Wheels and Hitachi, Ltd. By Hitachi Data Systems November 2014 1 Contents Executive Summary... 2 Introduction... 3 The Undeniable Value of Data... 3 The Smart Car as a Communications Hub...
More informationIntroduction Chapter 1. Uses of Computer Networks
Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks
More informationSecurity for the Internet of Things (IoT) John Yeoh, IoT Working Group
Security for the Internet of Things (IoT) John Yeoh, IoT Working Group Cloud Security Alliance, 2015 Agenda Introduction IoT Security Challenges IoT Threat Discussion Working Group Activities Cloud Security
More informationNational Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity
National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything
More informationAn Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID 15-0454 Abstract
An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Authors(s): Arthur Carter, David Freeman, and Cem Hatipoglu National Highway Traffic Safety Administration (NHTSA) Paper
More information