SECURITY CHALLENGES IN THE SMART CAR

Size: px
Start display at page:

Download "SECURITY CHALLENGES IN THE SMART CAR"

Transcription

1 SECURITY CHALLENGES IN THE SMART CAR BASED ON ELA / SYSTEMX ( & ECO-FEV / FP7 PROJECTS RESULT ( W. KLAUDEL 26/11/2015 GROUPE RENAULT

2 AGENDA Car evolution and cybersecurity threats Why such interest today? ELA/SystemX project contribution to cybersecurity challenges Methods, Architecture and Technology eco-fev/fp7 project contribution to the Identity and right management for extended car & enterprise Service delivery and identity management separation, federative approach (OpenID) W. KLAUDEL 26/11/2015 2

3 CAR EVOLUTION AND CYBERSECURITY THREATS In the past Today Threats electronics dysfunction Threats. + direct attacks from the Internet! theft of personal data navigation and infotainment dysfunction mass attacks possible Threats. + car theft theft of personal data TCU safety critical electronics W. KLAUDEL 26/11/2015 3

4 CAR EVOLUTION AND CYBERSECURITY THREATS Tomorrow Services Remote access to the car sensors (position, temperature, cameras,...) Diagnostic and remote update (OTA) Remote control (PC, smartphone...): preconditioning, opening Keyless access & start (smartphone, biometric wearable...) => car sharing ADAS (passive, active, cooperative) Autonomous driving Production After sale / Help Desk Services RSU Biometric Isolated TCU architecture no more possible remote (mass) sabotage threats have to be considered!!!! W. KLAUDEL 26/11/2015 4

5 CYBER SECURITY THREATS: MITIGATION ACTIONS Strengthening cybersecurity milestones in the V cycle & objectification of the about risk evaluation, standardization and certification (like ISO 2700x and Common Criteria) EE architecture adaptation to new threats More cyber security technology in all EE components W. KLAUDEL 26/11/2015 5

6 SystemX ELA project Projet ELA Electronique et Logiciel pour l Automobile Challenges Create architectural patterns ensuring the tradeoffs between scalability, safety, security and cost Propose methods and tools to control the costs of design and validation Create the technological components for "affordable architectures Tasks (work packages) T1: Real time virtualization T2: Image processing, data fusion for ADAS T3: Safe algorithms for Autosar multicore architectures T4: Cybersecurity

7 ELA : end user use cases / services ADAS Emergency stop, raised by ITS geonet or pedestrian recognition Automatic parking (monitored by the user from his smart device) Lane and Distance Keeping Assistance NAVIGATION AND INFOTAINMENT Internet access, Internet radio Connected navigation with Points of Interest Integrated HMI and vehicle equipment personalization OTHERS Vehicle access, preconditioning and start through Internet using Smartphone Software installation and update through Internet (OTA) E-Tolling, ecall Display of vehicle environment on the driver smartphone or tablet Remote diagnostics

8 Cybersecurity Risk Management: an optimization problem Design space {product definition x architecture & protections} => {attacks, consequences of successful attacks} Attack tree Attack goal: attacker aim, e.g. car theft, sabotage of brakes while driving at high speed Attacked function: attacked vehicle function, e.g. automatic brake Attack method: technical idea of attack, e.g. install unauthorized software Attack on asset: attack technique which is applied to an asset, e.g. message injection on the Ethernet interface of the Image Processing Unit (i.e. the asset) Attack entry point: attack entry point in the vehicle, e.g. 3G/4G interface of the Communication Unit (CU). consequences attack probabilities Optimization objectives Propose architecture and protection mechanism in order to: Min. cost Max. performance, usage facilities Min. risk, i.e. (consequence * probability) Problem definition Degree of freedom

9 ELA RISK ANALYSIS METHOD: ATTACK TREE Attack goal: attacker aim, e.g. inhibit/lock brakes while driving at high speed R=F(S,C,A): attack goal risk (vector) S: severity vector : Safety, Privacy, Financial, Operational C: controllability for safety related attacks A: attack probability Attacked function: attacked vehicle function, e.g. automatic brake Attack method: technical idea of attack, e.g. install unauthorized software, communicate falsified information Attack on asset: attack technique which is applied to an asset, e.g. message injection on the Ethernet of the IPU (Image Proc. Unit) Attack entry point: attack entry point to the vehicle, e.g. 3G/4G interface of the Communication Unit (CU). Two applications for elaborated method: 1. Security requirement establishment for all Attack goals qualified by R, S & C => maximum of accepted probability A for all Attacks on assets: 2. Security audit for all Attack goals qualified by S & C and known A for all Attacks on assets => R for all Attack goals (A calculated according to known protections) 9

10 CYBERSECURITY MILESTONES IN THE V CYCLE Attack goals (*) Concepts of operation Verification and validation Operation and maintenance New risk monitoring and countermeasures (*) Risk analysis and security requirements (*) Requirements and architecture System verification and validation Risk analysis and audit (*) Security mechanism selection (*) Detailed design Integration, tests and verification Pentesting, certification (*) Implementation Security mechanism implementation (*) (*) security add-ons

11 ELA attack goals Car stealing Personal data theft (credentials included) Sensor information access (position, camera, temperature ) Navigation/infotainment malfunction Preconditioning/personalization activation/deactivation/malfunction Vehicle immobilization Braking inhibition, untimely braking or steering movement

12 ELA, Secure architecture, defense perimeters Internet radio source Internet web sites OEM OEM & partner clouds radio GPS Internet Internet network access : 3/4 G, WI-FI Internet network access : 3/4 G, WI-FI, G5 Internet Vehicle Communication Unit Switch/Router Ethernet IP Dashboard Other displays Three defense perimeters Infotainment Control Unit Vehicle Control Unit Image Processing Unit CAN ECU ECU ECU ECU ECU ECU Body & multimedia Powertrain & chassis

13 SECURE ARCHITECTURE: VIRTUALISATION Cellular GNSS G5 BT Radio broadcasting IP connectivity gateway Safety related service gateways (ecall, G5, GPS,..) Hypervisor No safety related service gateways (phone, radio, http...) Communication Unit (Antenna module) - Virtualization & partitioning - IDS & IPS - Secure boot IP comm. Ethernet USB Hypervisor Autosar GENEVI Android IP comm. Infotainment Control Unit - Virtualization & partitioning - Secure boot CAN Ethernet

14 Execution environment and security Secure boot and signed dynamic modules Application security : authentication and access rights (vehicle access included) Application separation OS applications Virtualization Communication and security Protocols & authentication/signature/encryption (authenticity, non repudiation, confidentiality, anonymization) CAN (*), Ethernet, WI-FI, 3/4/5 G, G5, Bluetooth, USB But also application level: http, CoAP, Some IP, Webservices. Hardware Security Modules (HSM) TECHNOLOGICAL COMPONENTS / FUNCTIONALITIES Cryptographic hardware acceleration, secure storage, secure execution zones (*) project proposed patent

15 eco-fev efficient Cooperative infrastructure for Fully Electric Vehicles Witold KLAUDEL, Renault This project is co-funded by the European Union

16 Identity and right management, extended car & enterprise, eco-fev/fp7 project eco-fev: efficient Cooperative infrastructure for Fully Electric Vehicles (Sept 2012-June2015, 4,3 M ) set of mobility services based on learning machine Hitachi Europe (coordinator), CEA, Centro Ricerche FIAT, Conseil Général de l Isère, EICT, ENERGRID, Facit Research,Politecnico di Torino, RENAULT (use cases, architecture, system spec), TECNOSITAF and TU Berlin Public transport operators Road infra operators Car rental operators Services Trip planning, assistance & monitoring Charging & parking facility operators Urban delivery operators Data collection & mining Monitoring & Optimization Weather info & map providers Banks 16 FEV, drivers & travelers

17 Design orientation eco-fev IT solutions as a support for business model flexibility Banking Banking Identity Management (users, cars) OpenID & OAuth Unique subscription Service delivery and identity management separation, federative approach (OpenID) Route planning & navigation Data collection & aggregation Integration & applications Operator Operator Internet of things style, web-services eco-fev ontology HMI & raw service separation Road infra. Road infra. Operator Operator Parking & Charging Parking & Charging facility operator facility operator 17 Backend function Reference implementation Energy provider

18 STILL NEED TO BE WORKED Normative approaches, risk management, validation / certification ISO, SAE (J3061)=>ISO, ETSI (TVRA) Identity and Right management life cycle: production, sale, after sale, second hand market, destruction Cars, parts Drivers & passengers Car makers, parts manufacturers, road infrastructure (car2x), service providers Federative approach introduction Architecture Hardware acceleration on SOCs & Linux, Autosar integration Communication protocols, network management Defense in Depth Embedded IDS / IPS (use of hardware acceleration) W. KLAUDEL 26/11/

19

Secure software updates for ITS communications devices

Secure software updates for ITS communications devices Secure software updates for ITS communications devices - International Standardization Activity in ITU-T SG17 - Masashi Eto, Senior researcher, Cybersecurity laboratory, Network security research institute,

More information

Security in Vehicle Networks

Security in Vehicle Networks Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development

More information

The relevance of cyber-security to functional safety of connected and automated vehicles

The relevance of cyber-security to functional safety of connected and automated vehicles The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction

More information

Acquisition of Novero. Investor presentation 18th December 2015

Acquisition of Novero. Investor presentation 18th December 2015 Acquisition of Novero Investor presentation 18th December 2015 What Novero brings to Laird The acquisition of Novero and LSR rebalances our business, Wireless Systems will now be of a similar scale to

More information

Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis

Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis Andreas Fuchs and Roland Rieke {andreas.fuchs,roland.rieke}@sit.fraunhofer.de Fraunhofer Institute for

More information

Security risk analysis approach for on-board vehicle networks

Security risk analysis approach for on-board vehicle networks 1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle

More information

Telematics Workshop: Remote 2-Way Communication Meeting Results

Telematics Workshop: Remote 2-Way Communication Meeting Results March 31, 2016 Telematics Workshop: Remote 2-Way Communication Meeting Results ASAM Members and Non-Members primarily from the North American On-Road/Off-Road Commercial Vehicle Market met to discuss the

More information

Automotive Software Development Challenges Virtualisation and Embedded Security

Automotive Software Development Challenges Virtualisation and Embedded Security Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive

More information

Mentor Embedded Automotive Solutions

Mentor Embedded Automotive Solutions Mentor Embedded Automotive Solutions Overview May 2013 mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered trademark

More information

Vehicular On-board Security: EVITA Project

Vehicular On-board Security: EVITA Project C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security

More information

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions September 2013 Silicon Support & Professional Eng. Services Customer Experience Freescale Provided SW & Solutions Provide Valued Software, Support & Professional Engineering Services, Competitively 2 Customer

More information

Automotive and Industrial Data Security

Automotive and Industrial Data Security André Weimerskirch Cybersecurity for Cyber-Physical Systems Workshop April 23-24, 2012 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions Communication

More information

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé

More information

Technology.Transfer.Application.

Technology.Transfer.Application. Technology.Transfer.Application. Steinbeis Research Center Elektromobility and Information Systems 2015 Steinbeis Technology. Transfer. Application. www.steinbeis.de Open and Secure Operating for mobility

More information

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE MACHINE-TO-MACHINE ENABLE AND SECURE A CONNECTED LIFE DRIVEN BY GOVERNMENT REGULATIONS, COMPANY AND CONSUMER NEEDS, PRODUCTS ARE TRANSFORMED INTO INTELLIGENT,

More information

Frost & Sullivan Cybersecurity Presentation

Frost & Sullivan Cybersecurity Presentation Frost & Sullivan Cybersecurity Presentation 2015 will be the Year of Security, Prognostics & Evolution of OEM Vehicle Automation Strategies Praveen Narayanan Research Manager Feb 2015 Key Trends Impacting

More information

EB Automotive Driver Assistance EB Assist Solutions. Damian Barnett Director Automotive Software June 5, 2015

EB Automotive Driver Assistance EB Assist Solutions. Damian Barnett Director Automotive Software June 5, 2015 EB Automotive Driver Assistance EB Assist Solutions Damian Barnett Director Automotive Software June 5, 2015 Advanced driver assistance systems Market growth The Growth of ADAS is predicted to be about

More information

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process By Andreas Lindenthal and Franz Walkembach, Wind River The concept of autonomous vehicles or unmanned

More information

AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems. Robert Leibinger 5 th June 2015

AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems. Robert Leibinger 5 th June 2015 AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems Robert Leibinger 5 th June 2015 Agenda Architecture requirements for ADAS ECU Overview of different architecture approaches Compare and contrast

More information

Mentor Embedded IVI Solutions

Mentor Embedded IVI Solutions Mentor Embedded IVI Solutions Infotainment Instrument Cluster Andrew Patterson andrew_patterson@mentor.com Business Development Director Automotive Embedded Software mentor.com/embedded Android is a trademark

More information

The research area of SET group is software engineering, and model-based software engineering in particular:

The research area of SET group is software engineering, and model-based software engineering in particular: Introduction The research area of SET group is software engineering, and model-based software engineering in particular: Given the high-tech software-intensive industry in the Eindhoven region, we consider

More information

What is Really Needed to Secure the Internet of Things?

What is Really Needed to Secure the Internet of Things? What is Really Needed to Secure the Internet of Things? By Alan Grau, Icon Labs alan.grau@iconlabs.com The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices

More information

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer Research Institution

More information

Key requirements for Interoperable IoT systems

Key requirements for Interoperable IoT systems Key requirements for Interoperable IoT systems Pratul Sharma Technical Marketing Manager, ARM Inc. May/08/2014 Agenda Why Interoperability? Open standards for interoperability Data Communication Standards

More information

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis, K.Markantonakis@rhul.ac.uk Proposed PhD Research Areas I am looking for strong PhD candidates to work on the projects listed below. The ideal candidate would have a mix of theoretical and practical skills, achieved a distinction

More information

Crucial Role of ICT for the Reinvention of the Car

Crucial Role of ICT for the Reinvention of the Car Joint EC / EPoSS / ERTRAC Expert Workshop 2011 Electric Vehicle System Integration and Architecture Crucial Role of ICT for the Reinvention of the Car Karl-Josef Kuhn Siemens Corporate Research and Technologies

More information

Toward Connected Vehicle with AGL

Toward Connected Vehicle with AGL Toward Connected Vehicle with AGL September 9 th 2015 (at the AGL All Member Meeting - 2015 Fall) Ken-ichi Murata BR Connected Strategy & Planning Toyota Motor Corporation 68% of new vehicle will be connected

More information

S E P T E M B E R 2 0 1 4

S E P T E M B E R 2 0 1 4 S E P T E M B E R 2 0 1 4 IRIS-ENABLED SMARTWATCH AND ITS APPLICATIONS INTRODUCTION Iris Recognition Enabled Smartwatch Convergence of wearables and biometrics Will bring the widespread use of iris recognition

More information

SNAPPIN.IO. FWR is a Hardware & Software Factory, which designs and develops digital platforms.

SNAPPIN.IO. FWR is a Hardware & Software Factory, which designs and develops digital platforms. SNAPPIN.IO SNAPPIN.IO Snappin is an ecosystem oriented to retail that aims to increase in store sales due to the proactive involvement of users, relying on mechanisms of "Engagement", "Empowerment " and

More information

For the Future IT Convergence Vehicle Connected & Downloadable Infotainment Platform. Pusik Park. Korea Electronics Technology Institute

For the Future IT Convergence Vehicle Connected & Downloadable Infotainment Platform. Pusik Park. Korea Electronics Technology Institute For the Future IT Convergence Vehicle Connected & Downloadable Infotainment Platform Pusik Park Korea Electronics Technology Institute Agenda Trend Introduction of the project Key missions 2 Trend Open

More information

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M

GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M GEMALTO M2M KEY TECHNOLOGY TRENDS OF M2M Anvay Lonkar, Marketing Manager M2M Solutions & Services Gemalto M2M FORUM, MILAN, 15 May 2013 Gemalto delivers trusted and convenient digital services to billions

More information

Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software

Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software 133 Hitachi Review Vol. 63 (2014), No. 2 Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software Yoshinobu Fukano, Dr. Sci. Kosei Goto Masahiro Matsubara

More information

Automotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car

Automotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car Automotive (R)evolution: Defining a Security Paradigm in the Age of the Connected Car Authors: Dr. Joerg Borchert, VP of Chip Card and Security ICs, Infineon North America Shawn Slusser, VP of Automotive,

More information

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted. Administrative Awareness Case Study: Government Offices Certification and Accreditation:

More information

Cyber-Security in the Connected Car Age

Cyber-Security in the Connected Car Age IHS AUTOMOTIVE Presentation Cyber- in the Connected Car Age GENIVI Conference Seoul, October 21, 2015 ihs.com Egil Juliussen, Director Research & Principal Analyst +1 630 432 1304, egil.juliussen@ihs.com

More information

PEMS Conference. Acquiring Data from In-Vehicle Networks. Rick Walter, P.E. HEM Data Corporation

PEMS Conference. Acquiring Data from In-Vehicle Networks. Rick Walter, P.E. HEM Data Corporation PEMS Conference Acquiring Data from In-Vehicle Networks Rick Walter, P.E. HEM Data Corporation Acquiring Data from In-Vehicle Networks Topics Overview/Benefits Heavy Duty J1939 protocol Available J1939

More information

Beyond passwords: Protect the mobile enterprise with smarter security solutions

Beyond passwords: Protect the mobile enterprise with smarter security solutions IBM Software Thought Leadership White Paper September 2013 Beyond passwords: Protect the mobile enterprise with smarter security solutions Prevent fraud and improve the user experience with an adaptive

More information

Security in ST : From Company to Products

Security in ST : From Company to Products Security in ST : From Company to Products July 2015 Thierry FENSCH Innovation, Collaboration and Efficiency Director Grenoble Site A global semiconductor leader 2014 revenues of $7.40B Who we are 2 Approximately

More information

A Survey of Existing Technologies, Applications, Products, and Services for Geofencing

A Survey of Existing Technologies, Applications, Products, and Services for Geofencing Report to the US Department of Transportation Research and Innovative Technology Administration A Survey of Existing Technologies, Applications, Products, and Services for Geofencing California PATH Program

More information

EMX-2500 DATA SHEET FEATURES GIGABIT ETHERNET REMOTE CONTROLLER FOR PXI EXPRESS MAINFRAMES SYSTEM LEVEL FUNCTIONALITY

EMX-2500 DATA SHEET FEATURES GIGABIT ETHERNET REMOTE CONTROLLER FOR PXI EXPRESS MAINFRAMES SYSTEM LEVEL FUNCTIONALITY DATA SHEET EMX-2500 GIGABIT ETHERNET REMOTE CONTROLLER FOR PXI EXPRESS MAINFRAMES FEATURES SYSTEM LEVEL FUNCTIONALITY Industry s first gigabit Ethernet Remote controller for PXI express mainframes Up to

More information

2016 North American Over-the-air Update Enabling Technology Leadership Award

2016 North American Over-the-air Update Enabling Technology Leadership Award 2016 North American Over-the-air Update Enabling Technology Leadership Award 2016 Contents Background and Company Performance... 3 Industry Challenges... 3 Conclusion... 7 Significance of Enabling Technology

More information

CYBERSECURITY FOR THE AUTOMOBILE IS THE CAR OF THE FUTURE STILL A CAR?

CYBERSECURITY FOR THE AUTOMOBILE IS THE CAR OF THE FUTURE STILL A CAR? CYBERSECURITY FOR THE AUTOMOBILE IS THE CAR OF THE FUTURE STILL A CAR? Alberto Sangiovanni-Vincentelli The Edgar L. and Harold H. Buttner Chair of EECS University of California at Berkeley Co-Founder,

More information

In the pursuit of becoming smart

In the pursuit of becoming smart WHITE PAPER In the pursuit of becoming smart The business insight into Comarch IoT Platform Introduction Businesses around the world are seeking the direction for the future, trying to find the right solution

More information

Challenges for the European Automotive Software Industry

Challenges for the European Automotive Software Industry Challenges for the European Automotive Software Industry Viewpoint of a safety supplier 28 th April 2010 Franck Lesbroussart What Trends do we see? Integration of functions Functionalities are expanding

More information

Over-the-Air Software Updates: Deployment Strategies

Over-the-Air Software Updates: Deployment Strategies Over-the-Air Software Updates: Deployment Strategies John Cain Head of Business Development Arynga, Inc. September, 2014 Topics Covered What is OTA/FOTA/SOTA? How does it work? How and who does it benefit?

More information

EB TechPaper. Test drive with the tablet. automotive.elektrobit.com

EB TechPaper. Test drive with the tablet. automotive.elektrobit.com EB TechPaper Test drive with the tablet automotive.elektrobit.com 1 A great many test miles have to be covered in the development and validation of driver assistance systems. A tablet with Elektrobit (EB)

More information

Symantec Client Management Suite 8.0

Symantec Client Management Suite 8.0 IT Flexibility. User Freedom. Data Sheet: Endpoint Management Overview of Symantec Client Management Suite Symantec Client Management Suite automates time-consuming and redundant tasks for deploying, managing,

More information

In-Vehicle Infotainment. A View of the European Marketplace

In-Vehicle Infotainment. A View of the European Marketplace In-Vehicle Infotainment A View of the European Marketplace In-Vehicle Infotainment: A View of the European Marketplace A number of trends are impacting the automotive industry, creating fertile ground

More information

Car Data New access via telematic systems. Maja Berends, ADAC. 12 September 2013 10-13 SEPT 1

Car Data New access via telematic systems. Maja Berends, ADAC. 12 September 2013 10-13 SEPT 1 Car Data New access via telematic systems Maja Berends, ADAC 12 September 2013 10-13 SEPT 1 Access to car data Relevance for Automobile Clubs Ø Consumer protection Consumers free choice Ø Consumer data

More information

Secure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems

Secure Services and Quality Testing SST. Security Engineering Privacy by Design Trusted Solutions. Mario Hoffmann. for Service Ecosystems Secure Services and Quality Testing SST Security Engineering Privacy by Design Trusted Solutions for Service Ecosystems Mario Hoffmann Head of Department Fraunhofer AISEC in a nutshell Fraunhofer Profile

More information

Introduction CHAPTER 1

Introduction CHAPTER 1 CHAPTER 1 Introduction Ever since the development of the first integrated circuits in the late 1950s the complexity of such devices doubled every 20 months. A development which has been anticipated by

More information

Security 4.0 - Security by Separation

Security 4.0 - Security by Separation Security 4.0 - Security by Separation Making Industrial Control Systems More Secure Author(s): Date: Version Mehmet Özer 19.05.2015 v1.0 SYSGO AG 1 Agenda Security Challenges IoT Architecture for Industrial

More information

The Vision of Vehicle Infrastructure Integration (VII)

The Vision of Vehicle Infrastructure Integration (VII) The Vision of Vehicle Infrastructure Integration (VII) Ralph L. Robinson ITS Integration Office September, 2007 Cooperative Highways SAFETY MOBILITY Collision Avoidance Signal Control Emergency Alerts

More information

Enterprise M2M Solutions. Fast, Flexible, Cost Effective

Enterprise M2M Solutions. Fast, Flexible, Cost Effective Enterprise M2M Solutions Fast, Flexible, Cost Effective The Procon Difference Procon provides M2M platforms and applications for the management of all mobile assets. We are an Australian owned company

More information

About the Authors Preface Acknowledgements List of Acronyms

About the Authors Preface Acknowledgements List of Acronyms Contents About the Authors Preface Acknowledgements List of Acronyms xiii xv xvii xix Part One Wireless Ad Hoc, Sensor and Mesh Networking 1 1 Introduction 3 1.1 Information Security 4 1.1.1 Computer Security

More information

Web of Things Architecture

Web of Things Architecture Web of Things Architecture 1. Introduction This document is an explanation about the architecture of Web Of Things (WoT). The purpose of this document is to provide (a) a guideline of the mapping between

More information

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec

Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec Wearable Technology Evolution & Security: Grant Brown - Security Strategist Symantec 3.58 KM 12.11 KPH 493 Calories 114 BPM WEARABLE TECH EVOLUTION AND SECURITY GRANT BROWN SECURITY STRATEGIST @thegrantbrown

More information

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing

More information

WIND RIVER SECURE ANDROID CAPABILITY

WIND RIVER SECURE ANDROID CAPABILITY WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion

More information

DesignWare IP for IoT SoC Designs

DesignWare IP for IoT SoC Designs DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to

More information

Introducing BEEKS Proximity Solutions. Developer Kit Gets You Started

Introducing BEEKS Proximity Solutions. Developer Kit Gets You Started Introducing BEEKS Proximity Solutions BEEKS from BluVision provides industry-leading Bluetooth beacon solutions to enterprises and innovative developers. Leveraging a cutting-edge, cloudbased solution,

More information

Keeping Up with the Data & Security Demands of the Automotive IoT

Keeping Up with the Data & Security Demands of the Automotive IoT Keeping Up with the Data & Security Demands of the Automotive IoT AESIN 2015 Robert Moran Automotive Systems Engineering O C T O B E R 2 0 1 5 External Use Keeping Up with the Data & Security Demands of

More information

Integrated Engineering Solutions

Integrated Engineering Solutions Integrated Engineering Solutions Karthikeyan Natarajan & Prashant Kamat November 2014 1 Integrated Engineering Solutions: An Introduction AUTOMOTIVE Tie-up with 8 OEMs and 10 Tier-1 majors AEROSPACE &

More information

AN INTEL COMPANY WIND RIVER AUTOMOTIVE SOLUTIONS

AN INTEL COMPANY WIND RIVER AUTOMOTIVE SOLUTIONS AN INTEL COMPANY WIND RIVER AUTOMOTIVE SOLUTIONS The Software-Enabled Automobile Software is a key differentiating factor for today s automakers. It is critical to harnessing the opportunities of autonomous

More information

Embedded Java & Secure Element for high security in IoT systems

Embedded Java & Secure Element for high security in IoT systems Embedded Java & Secure Element for high security in IoT systems JavaOne - September 2014 Anne-Laure SIXOU - ST Thierry BOUSQUET - ST Frédéric VAUTE - Oracle Speakers 2 Anne-Laure SIXOU Smartgrid Product

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Cyber Security and Privacy

Cyber Security and Privacy Cyber Security and Privacy Jovan Golić CySeP Winter School, Stockholm, 2014 EIT ICT Labs EIT ICT Labs is one of the first Knowledge and Innovation Communities set up in 2010 by the European Institute of

More information

An OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón

An OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón June 10-11, 2008 Berlin, Germany An OSGi based HMI for networked vehicles Telefónica I+D Miguel García Longarón Networked Vehicle 2 Networked Vehicle! Tomorrow, the vehicles will be networked! Using Always

More information

INSTALLATION FUTURES - ITS IN YOUR VEHICLE FCS / ITS (UK) EVENT, DAVENTRY, 19 MAY 2011. Alan Carter Consultant to innovits

INSTALLATION FUTURES - ITS IN YOUR VEHICLE FCS / ITS (UK) EVENT, DAVENTRY, 19 MAY 2011. Alan Carter Consultant to innovits The Vehicle Aftermarket s place in the Global Market for Intelligent Transport Systems and Services (ITSS) INSTALLATION FUTURES - ITS IN YOUR VEHICLE FCS / ITS (UK) EVENT, DAVENTRY, 19 MAY 2011 Based on

More information

ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things

ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things ARC Forum Orlando 2015 Building a Secure Industrial Internet of Things Sid Snitkin Vice-President & GM Enterprise Advisory Services ARC Advisory Group srsnitkin@arcweb.com Session Overview ARC Presentation

More information

IoT Security Concerns and Renesas Synergy Solutions

IoT Security Concerns and Renesas Synergy Solutions IoT Security Concerns and Renesas Synergy Solutions Simon Moore CTO - Secure Thingz Ltd Agenda Introduction to Secure.Thingz. The Relentless Attack on the Internet of Things Building protection with Renesas

More information

Bellevue University Cybersecurity Programs & Courses

Bellevue University Cybersecurity Programs & Courses Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320

More information

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc. Securing Modern Substations With an Open Standard Network Security Solution Kevin Leech Schweitzer Engineering Laboratories, Inc. Copyright SEL 2009 What Makes a Cyberattack Unique? While the resources

More information

Industrial Application of MultiPARTES

Industrial Application of MultiPARTES Industrial Application of MultiPARTES January 21st, 2012 HiPEAC Workshop 2013 Integration of mixed-criticality subsystems on multi-core processors David Gonzalez (dgonzalez@ikerlan.es) 1 Definitions and

More information

RIOT CONTROL The Art of Managing Risk for Internet of Things

RIOT CONTROL The Art of Managing Risk for Internet of Things RIOT CONTROL The Art of Managing Risk for Internet of Things Kim Singletary McAfee Session ID: Session Classification: Advanced Intro What is IoT and why is it different? What are the risks? What are the

More information

JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development

JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development ROADMAP TO AUTOMATED DRIVING Autonomous Driving (Chauffeured Driving) Increasing Capability

More information

Testing the Internet of Things

Testing the Internet of Things Presentation to TMF Testing the Internet of Things Test and Verification Solutions Delivering Tailored Solutions for Hardware Verification and Software Testing What is the IoT? Wikipedia The Internet of

More information

Security, Cloud. Guy Pujolle Guy.Pujolle@lip6.fr

Security, Cloud. Guy Pujolle Guy.Pujolle@lip6.fr Post-IP Network Knowledge, Piloting, Virtualization, Security, Cloud Guy Pujolle Guy.Pujolle@lip6.fr Where we are? Stone age Bronze age Iron age 2.5 M années 8000 années 3000 années Printing Stone age

More information

TOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT

TOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT TOP 3 STRATEGIES TO REDUCE RISK IN AUTOMOTIVE/IN-VEHICLE SOFTWARE DEVELOPMENT Go beyond error detection to ensure safety and security TABLE OF CONTENTS The Three Biggest Challenges...4 Ensure compliance

More information

Enabling Smart Data on M2M Gateways and Aggregators

Enabling Smart Data on M2M Gateways and Aggregators Enabling Smart Data on M2M Gateways and Aggregators How OSGi and Java enables smart data on M2M aggregators and gateways. 3/27/2013 Hitachi Communication Technologies America, Inc. Walt Bowers Chief Architect

More information

Network Security in Building Networks

Network Security in Building Networks Network Security in Building Networks Prof. Dr. (TU NN) Norbert Pohlmann Institute for Internet Security - if(is) Westphalian University of Applied Sciences Gelsenkirchen, Germany www.if-is.net Content

More information

Data Protection: From PKI to Virtualization & Cloud

Data Protection: From PKI to Virtualization & Cloud Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security

More information

IOTIVITY AND EMBEDDED LINUX SUPPORT. Kishen Maloor Intel Open Source Technology Center

IOTIVITY AND EMBEDDED LINUX SUPPORT. Kishen Maloor Intel Open Source Technology Center IOTIVITY AND EMBEDDED LINUX SUPPORT Kishen Maloor Intel Open Source Technology Center Outline Brief introduction to IoTivity Software development challenges in embedded Yocto Project and how it addresses

More information

Advanced Safety. Driver Vehicle Interface Collision Avoidance & Mitigation Vehicle Communications. Helping industry engineer safe vehicles

Advanced Safety. Driver Vehicle Interface Collision Avoidance & Mitigation Vehicle Communications. Helping industry engineer safe vehicles SAE INTERNATIONAL Advanced Safety Standards & Resources Driver Vehicle Interface Collision Avoidance & Mitigation Vehicle Communications Helping industry engineer safe vehicles Driver Vehicle Interface,

More information

NXP s Solution to ecall Brussels, October 19 th, 2010

NXP s Solution to ecall Brussels, October 19 th, 2010 NXP s Solution to ecall Brussels, October 19 th, 2010 Agenda The Mission of NXP and its Partners NXP s ecall platform Awareness the Next Step Conclusions NXP leads innovation in Telematics Breakthrough

More information

ACEA PRINCIPLES OF DATA PROTECTION IN RELATION TO CONNECTED VEHICLES AND SERVICES

ACEA PRINCIPLES OF DATA PROTECTION IN RELATION TO CONNECTED VEHICLES AND SERVICES ACEA PRINCIPLES OF DATA PROTECTION IN RELATION TO CONNECTED VEHICLES AND SERVICES September 2015 INTRODUCTION We, the member companies of ACEA, are committed to providing our customers with a high level

More information

Secure Communication Made Easy

Secure Communication Made Easy Secure Communication Made Easy Remote Access to Industrial Equipment Easy Setup Central Administration Firewall Friendly State-of-Art Security Fast Return On Investment PROGRAMMING CONTROL LOGGING INFRASTRUCTURE

More information

Enabling Secure Mobile Operations with Commercial Products

Enabling Secure Mobile Operations with Commercial Products Enabling Secure Mobile Operations with Commercial Products Grant Wagner Technical Director Trusted Systems Research National Security Agency October 16, 2014 Overview Moving to Commercial Products Mobile

More information

Hitachi Europe R&D. Dr. David Williams. Activity in Europe. Hitachi Cambridge Laboratory. March 2014

Hitachi Europe R&D. Dr. David Williams. Activity in Europe. Hitachi Cambridge Laboratory. March 2014 Hitachi Europe R&D (ERD) Activity in Europe March 2014 Dr. David Williams Hitachi Cambridge Laboratory Contents 1. General information 2. ICT and Big Data Laboratories 3. Cambridge Laboratory 1 1-1 Hitachi

More information

rm Management apping eather iagnostics Integrating ntroller adcell/sensors lematics

rm Management apping eather iagnostics Integrating ntroller adcell/sensors lematics rm Management apping eather iagnostics Integrating Agricultural IMPLEMENT Control & monitoring with ISOBUS, SmartphoneS & Tablets Sma Tab Virt ntroller adcell/sensors lematics Over the years, the agriculture

More information

Where Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things

Where Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things Where Do You Draw the Creepy Line? Privacy, Big Data Analytics and the Internet of Things aisa.org.a u aisa.org.a u Rebecca Herold, CEO The Privacy Professor 1 rebeccaherold@rebeccaherold.com Agenda Technology

More information

Paradigm shift in insurance policies

Paradigm shift in insurance policies Athens, April 2016 Paradigm shift in insurance policies ADAPTIVE technical workshop Agenda Driverless cars & need for insurance Shift of Motor Insurance model Motor liability Product Liability Data ownership

More information

Ethernet Oriented E/E Architecture with CAN Virtualization for Automated Driving Vehicles

Ethernet Oriented E/E Architecture with CAN Virtualization for Automated Driving Vehicles Ethernet Oriented E/E Architecture with CAN Virtualization for Automated Driving Vehicles Mikio Kataoka, Mitsuhiro Kitani *, Masaaki Nakamura, Satoshi Otsuka *, Kenichi Osada, and Kohei Sakurai Hitachi

More information

Chris Boykin VP of Professional Services

Chris Boykin VP of Professional Services 5/30/12 Chris Boykin VP of Professional Services Future Com! 20 years! Trusted Advisors! Best of brand partners! Brand name customers! 1000 s of solutions delivered!! 1 5/30/12 insight to the future, bringing

More information

Introduction: Why do we need computer networks?

Introduction: Why do we need computer networks? Introduction: Why do we need computer networks? Karin A. Hummel - Adapted slides of Prof. B. Plattner, plattner@tik.ee.ethz.ch - Add-on material included of Peterson, Davie: Computer Networks February

More information

The Internet on Wheels and Hitachi, Ltd. By Hitachi Data Systems

The Internet on Wheels and Hitachi, Ltd. By Hitachi Data Systems The Internet on Wheels and Hitachi, Ltd. By Hitachi Data Systems November 2014 1 Contents Executive Summary... 2 Introduction... 3 The Undeniable Value of Data... 3 The Smart Car as a Communications Hub...

More information

Introduction Chapter 1. Uses of Computer Networks

Introduction Chapter 1. Uses of Computer Networks Introduction Chapter 1 Uses of Computer Networks Network Hardware Network Software Reference Models Example Networks Network Standardization Metric Units Revised: August 2011 Uses of Computer Networks

More information

Security for the Internet of Things (IoT) John Yeoh, IoT Working Group

Security for the Internet of Things (IoT) John Yeoh, IoT Working Group Security for the Internet of Things (IoT) John Yeoh, IoT Working Group Cloud Security Alliance, 2015 Agenda Introduction IoT Security Challenges IoT Threat Discussion Working Group Activities Cloud Security

More information

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity National Cybersecurity Challenges and NIST Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity Though no-one knows for sure, corporate America is believed to lose anything

More information

An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID 15-0454 Abstract

An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID 15-0454 Abstract An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Authors(s): Arthur Carter, David Freeman, and Cem Hatipoglu National Highway Traffic Safety Administration (NHTSA) Paper

More information