Automotive and Industrial Data Security
|
|
|
- Bridget Holmes
- 10 years ago
- Views:
Transcription
1 André Weimerskirch Cybersecurity for Cyber-Physical Systems Workshop April 23-24, 2012
2 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions
3 Communication and Cars If vehicles had developed in the same manner as telecommunications, then an average car would reach top speeds of 10 9 km/h at 400 million horse power, and the car would be hacked four times per year. - Prof. Christof Paar
4 Digital revolution in vehicles IT-security requirements Centralized door locking Electronic fuel injection Centralized signal lights Cruise control Automatic gearbox Anti lock braking system Electronic mirrors Anti slip control Car telephone Airbag Navigation system Dynamic stability control Adaptive transmission Voice control Emergency call Traffic message channel Telematics GPRS/UMTS Internet access Software updates Lane guard system Rain-/light sensors Adaptive Cruise Control Anti-roll system Intelligent transportation Web Vehicles V2V communication V2I communication Electronic license plate Autonomous driving Personalization M-commerce Steer-by-wire... mechanical electromechanical electronical software based 1960s 1970s 1980s 1990s 2000s 2010s Vehicles changed from mechanical to software based systems Software and electronics accounts for up to 50% of total cost Software and electronics is a market distinction today Modern cars come with up to 80 CPUs, 2 miles of cable, several hundred MB of software, and 5 in-vehicle networks
5 Hacking Recent media reports suggest that data security in vehicle becomes an issue Remote attack to vehicle by manipulated MP3 file via Bluetooth connected cell phone Weakness in telematics module to gain remote access via cellular connection Weakness in Bluetooth stack to gain access to CAN Then remotely flash new firmware, e.g. for brake ECU: lock left rear brake once car reaches 70 mph. Attacker can be on another continent. Source:
6 Hacking Same researchers found local attack Connect laptop to OBD-II port and flash manipulated firmware Insert manipulated CD or USB flash drive to inject manipulated firmware Remotely mounted hacks via Internet to remote engine start and remote vehicle unlock have been demonstrated as well by other researchers. Knowledge is proprietary and no known attacks are known. However, it is a matter of time until the knowledge will leak.
7 Financial Damage Counterfeit black market is a gigantic problem Odometer rollback 6 billion Euro damage per year in Germany 10-30% of all sold used vehicles manipulated in USA Source: Source:
8 Financial Damage Warranty fraud Owner performs chip tuning to increase engine power Engine blasts and owner flashes original firmware Source:
9 Privacy Event Data Recorder (EDR) record information during crashes and accidents. Navigation units include list of recent targets Theft protection devices track vehicles via GPS Source: +Black+Box+Standards+May+Release+Guidelines+Next+Mon th/article21717.htm
10 Area full of Pitfalls: Aftermarket Source: Be careful who upgrades your car! Source:
11 Underlying Problem: Vehicle Architecture There is a physical connection between safety relevant bus and nonsafety bus E.g. speed adjusted volume Note the physical connection between cellular, USB, SD, HMI, and safety critical powertrain components The complexity of code increases, mainly due to infotainment Almost impossible to avoid security flaws Access to bus via OBD-II, or remotely via infotainment system
12 Why is data security in vehicles special? Safety critical: a hacked vehicle might be different than a hacked PC Vehicles cannot regularly update software In many instances, attacker has physical access percentage 100% 80% 60% 40% Mechanics Production Cost Electric Electronics Software More infotainment will be introduced Modern cars include 100 million lines of code Industry average is about one security flaw per 1,000 lines of code Around 100,000 flaws? 20% 0% mechanical electrical mechatronics Source: Audi mechatronics (in 5 years)
13 Why is automotive security different to PC security (and hard)? Combination of safety and infotainment Buyers demand modern connected infotainment systems If a PC is hacked, data is lost. If a car is hacked, life is at stake. Automotive software cannot easily be updated No monthly security update Attacker might have physical access to vehicle
14 Safety and Security well understood processes are in place Safe and reliable Operation relatively new challenge since the introduction of wireless communication and advanced infotainment Reliability Security Protection against defects Protection against targeted hackers
15 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions
16 Who are the attackers? Today: different to iphone hacker community (challenge, curiosity), similar to Pay-TV hackers; purely financial motivation Almost all attackers are active in black market Illegal organizations Mainly financial motivation Significant financial damage Some individual attackers are motivated by curiosity To turn off annoying seat belt warning Turn off TV lock Academic teams Any damage?
17 Who are the attackers? (continued) The attacks are implemented and sold by black market organizations The user of the attack is in almost all cases the vehicle owner Odometer rollback Chip tuning Buyer of cheap counterfeits (did you ever buy an original car key for $250)? Question: Will there be attackers to mount safety-critical attacks? How will the attacks be offered/distributed?
18 Who is damaged? In many cases the buyers of used cars Odometer rollback Chip tuning (shortens engine life-span) Counterfeits (shorter life-span) Stolen vehicles (either direct damage, or damage due to increased insurance rates) Only a few cases where car makers are damaged directly Counterfeits: lost sales Potentially fines by EPA: if it becomes known that chip tuning is very easy, and that engine after chip tuning violates emission regulations Warranty fraud: engine burns out after chip tuning during warranty period
19 Who is damaged? (continued) Indirect damage for car makers might be significant Lost sales if insurance rates due to high theft are significantly higher than of competitors Lost sales if there is negative press Source: Some pressure on car makers to introduce security
20 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions
21 Examples of IT-Security Applications in Vehicles Theft protection Remote unlock Keyless entry Odometer manipulation Vehicle tracking Bluetooth and Wi-Fi ecall Tolling Business models Feature activation License agreements Copyright protection Warranty: prove manipulation of firmware Counterfeiting of components and spare parts Vehicle-to-vehicle communication
22 Security Features: Today Secure flash programming Software- Development 1 OEM signs firmware (usually RSA) ECU verifies OEMs signature Built-in public key in ECU that can be replaced with new boot-loader Certificate based systems are going to be implemented 2 Trust Center Private key Program code digital signature 3 Secured computer 4 database Device 5 Public key 6
23 Security Features: Today Filter in gateway Whitelists: designer explicitly define which packets are relayed between different bus systems Plausibility checks Part of safety validation Each ECU checks whether input is reasonable If not, input is discarded and fail-safe mode is activated
24 Security Features: Today Standard security E.g. Bluetooth security based on PIN entered pairing Proprietary security Theft protection Feature activation Most OEMs focus on remote attacks
25 Future In-Vehicle Security Layers Need for layered in-vehicle security: Application Layer: integrity of applications Operating System: secure operating environment App Store: Certification Process Hardened OS Virtualization Layer: separation Hardware Layer: separation between powertrain and infotainment, support for higher layers Hyper threading and microkernel: OVERSEE Secure boot and secure key storage: EVITA
26 Virtualization and Microkernel Rule of thumb: one security weakness per 1,000 lines of code Linux and Windows have many million lines of code Thousands of security weaknesses Design microkernel Remove drivers and non-essential modules from kernel Between 10,000 and 100,000 lines of code Hope: find all security weaknesses before deployment Hope: formal verification of correctness
27 Hyper-Threading Application Layer App 3 App 2 App App 4 Secure-RTOS Secure-RTOS Secure-RTOS 1 Secure-RTOS App X General Purpose OS App Y RTOS Virtualized Services API System Layer Security Sub Layer Virtualization Sub Layer Secure storage Secure communications Secure mechanisms Memory manager Clock & Timer management IP communications Interrupt management Scheduler Health monitor Hardware Layer CPU Security Module
28 Approach: OVERSEE OVERSEE: Open Vehicular Secure Platform Objective: Providing a standardized generic communication and application platform for vehicles, ensuring security, reliability and trust of external communication and simultaneous running applications. European Union funded project (3 million EURO) Runtime Members: Volkswagen, ESCRYPT, Fraunhofer, Trialog, Technical University Berlin, University of Valencia, Open Tech More information at
29 Hardware Security 1. Hardware as ultimate separation between local and remote interfaces and powertrain Automotive Firewall 2. Hardware as security anchor for higher layers Protection of software manipulation Secure boot Secure key storage Fast crypto performance
30 EVITA Security Levels EVITA Full: V2X (one per car) EVITA Medium: for advanced ECUs (gateway, headunit, engine control) EVITA Light: for sensors, actuators,
31 EVITA in Cars EVITA provides hardware extensions Just some more chip area Cost very low EVITA does not provide security known from dedicated security controllers such as smart-cards Only basic tamper resistance EVITA Light was standardized as Secure Hardware Extension (SHE) Available by several semiconductors Automotive grade A controller that implements EVITA Medium was recently introduced
32 Security of Future Vehicle Application: V2X Vehicles are equipped with Wi-Fi (but 5.9 GHz) and regularly broadcast location, speed, vehicle category, time, Receiver application creates map of environment (no line of sight necessary) Receiver safety application notifies driver E.g. immanent crash warning Probably the hottest security application in vehicles today 260 million nodes Full of privacy pit holes Security and safety intermix Security was recognized as major component and introduced from the beginning!
33 Overview Introduction and Motivation Risk analysis Current and future security solutions Conclusions
34 Conclusions 1/2 Passenger vehicles are more and more connected Users demand for infotainment known from mobile phones Main concern is introduced by connectivity Infotainment, wireless connectivity, telematics, V2X Recent academic attacks suggest that modern vehicles are vulnerable to serious hacker attacks No actual attacks known though Knowledge very proprietary Also a problem (but not considered here): privacy E.g. tracking based on RFID air pressure sensor
35 Conclusions 2/2 Car manufacturers work on solutions Plenty of data security mechanisms already implemented today Powertrain needs to be efficiently separated from external communication channels Lots of momentum Semiconductors introduce automotive security controllers Secure Hardware Extension (SHE) EVITA Medium (HSM) US DOT discusses introduction of automotive Information Sharing and Analysis Center (ISAC) SAE set up Vehicle Electrical System Security Committee
36 Dr. André Weimerskirch CEO
The relevance of cyber-security to functional safety of connected and automated vehicles
The relevance of cyber-security to functional safety of connected and automated vehicles André Weimerskirch University of Michigan Transportation Research Institute (UMTRI) February 12, 2014 Introduction
Vehicular Security Hardware The Security for Vehicular Security Mechanisms
escrypt GmbH Embedded Security Systemhaus für eingebettete Sicherheit Vehicular Security Hardware The Security for Vehicular Security Mechanisms Marko Wolf, escrypt GmbH Embedded Security Embedded Security
Security in Vehicle Networks
Security in Vehicle Networks Armin Happel, Christof Ebert Stuttgart, 17. March 2015 V1.1 2015-04-28 Introduction Vector Consulting Services supports clients worldwide in improving their product development
Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions
September 2013 Silicon Support & Professional Eng. Services Customer Experience Freescale Provided SW & Solutions Provide Valued Software, Support & Professional Engineering Services, Competitively 2 Customer
NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS
NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS André Groll, Jan Holle University of Siegen, Institute for Data Communications Systems {andre.groll,jan.holle}@uni-siegen.de
Vehicular On-board Security: EVITA Project
C2C-CC Security Workshop 5 November 2009 VW, MobileLifeCampus Wolfsburg Hervé Seudié Corporate Sector Research and Advance Engineering Robert Bosch GmbH Outline 1. Project Scope and Objectives 2. Security
Security risk analysis approach for on-board vehicle networks
1 Security risk analysis approach for on-board vehicle networks Alastair Ruddle Consultant, MIRA Limited Motivation 2 o o Future vehicles will become mobile nodes in a dynamic transport network vehicle
An OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón
June 10-11, 2008 Berlin, Germany An OSGi based HMI for networked vehicles Telefónica I+D Miguel García Longarón Networked Vehicle 2 Networked Vehicle! Tomorrow, the vehicles will be networked! Using Always
Automotive Software Development Challenges Virtualisation and Embedded Security
Automotive Software Development Challenges Virtualisation and Embedded Security 1 Public ETAS-PGA/PRM-E October 2014 ETAS GmbH 2014. All rights reserved, also regarding any disposal, exploitation, Automotive
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications
EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications 7 th escar Embedded Security in Cars Conference November 24 25, 2009, Düsseldorf Dr.-Ing. Olaf Henniger, Fraunhofer SIT Darmstadt Hervé
Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri
Automotive Ethernet Security Testing Alon Regev and Abhijit Lahiri 1 Automotive Network Security Cars are evolving Number of ECUs, sensors, and interconnects is growing Moving to Ethernet networks utilizing
Pervasive Computing und. Informationssicherheit
Pervasive Computing und 11. Symposium on Privacy and Security Rüschlikon, 13. September 2006 Prof. Christof Paar European Competence Center for IT Security www.crypto.rub.de Contents 1. Pervasive Computing
Mentor Embedded Automotive Solutions
Mentor Embedded Automotive Solutions Overview May 2013 mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered trademark
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules Dr. Frederic Stumpf, ESCRYPT GmbH Embedded Security, Stuttgart, Germany 1 Introduction Electronic Control Units (ECU) are embedded
Frost & Sullivan Cybersecurity Presentation
Frost & Sullivan Cybersecurity Presentation 2015 will be the Year of Security, Prognostics & Evolution of OEM Vehicle Automation Strategies Praveen Narayanan Research Manager Feb 2015 Key Trends Impacting
In-Vehicle Infotainment. A View of the European Marketplace
In-Vehicle Infotainment A View of the European Marketplace In-Vehicle Infotainment: A View of the European Marketplace A number of trends are impacting the automotive industry, creating fertile ground
Hardware Security Modules for Protecting Embedded Systems
Hardware Security Modules for Protecting Embedded Systems Marko Wolf, ESCRYPT GmbH Embedded Security, Munich, Germany André Weimerskirch, ESCRYPT Inc. Embedded Security, Ann Arbor, USA 1 Introduction &
Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication
01PC-422 Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication Pascal Jost IAS, University of Stuttgart, Germany Stephan Hoffmann Vector CANtech Inc., USA Copyright
Secure Key Management A Key Feature for Modern Vehicle Electronics
13AE-0069 Secure Key Management A Key Feature for Modern Vehicle Electronics Christian Schleiffer, Marko Wolf, André Weimerskirch, and Lars Wolleschensky ESCRYPT Copyright 2012 SAE International ABSTRACT
Updating Car ECUs Over-The-Air (FOTA) White Paper
Updating Car ECUs Over-The-Air (FOTA) ABSTRACT As the amount of software in automobiles grows, so too does the need to effectively manage that software asset. The telecom industry has a proven solution
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS
CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS Prof. Dr.-Ing. Georg Sigl Institute for Security in Information Technology Technical University Munich [email protected] Fraunhofer Research Institution
Science Fiction to Reality: The Future of Automobile Insurance and Transportation Technology
Michael R. Nelson Kymberly Kochis October 13, 2015 Science Fiction to Reality: The Future of Automobile Insurance and Transportation Technology INSURANCE AND FINANCIAL SERVICES LITIGATION WEBINAR SERIES
Secure software updates for ITS communications devices
Secure software updates for ITS communications devices - International Standardization Activity in ITU-T SG17 - Masashi Eto, Senior researcher, Cybersecurity laboratory, Network security research institute,
Cyber-Security in the Connected Car Age
IHS AUTOMOTIVE Presentation Cyber- in the Connected Car Age GENIVI Conference Seoul, October 21, 2015 ihs.com Egil Juliussen, Director Research & Principal Analyst +1 630 432 1304, [email protected]
The Vision of Vehicle Infrastructure Integration (VII)
The Vision of Vehicle Infrastructure Integration (VII) Ralph L. Robinson ITS Integration Office September, 2007 Cooperative Highways SAFETY MOBILITY Collision Avoidance Signal Control Emergency Alerts
Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis
Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis Andreas Fuchs and Roland Rieke {andreas.fuchs,roland.rieke}@sit.fraunhofer.de Fraunhofer Institute for
AVL DISCAN 8000. Handheld-Scantool for multifunctional fields of application Faultcode-reader with integrated Informationsystem and Oscilloscope
AVL DISCAN 8000 Handheld-Scantool for multifunctional fields of application Faultcode-reader with integrated Informationsystem and Oscilloscope Thomas Penz 26.11.2010 Seite 1 Content and Topics Description
Connected and Automated Vehicles and the Cybersecurity Threat
Connected and Automated Vehicles and the Cybersecurity Threat How the Industry is Responding Dr Andrew Brown, Jr, PE, FESD, FSAE, NAE Vice President & Chief Technologist CAR Breakfast Briefing Series February
Over-the-Air Software Updates: Deployment Strategies
Over-the-Air Software Updates: Deployment Strategies John Cain Head of Business Development Arynga, Inc. September, 2014 Topics Covered What is OTA/FOTA/SOTA? How does it work? How and who does it benefit?
Evolution of Connected Vehicle Ecosystem
SAE Symposium: Intelligent Vehicle Systems Advancing the Connected Mobility Experience November 8-9, 2011 Troy Marriott, Troy MI Evolution of Connected Vehicle Ecosystem Partha Goswami Technology Manager
Car Connections. Johan Lukkien. System Architecture and Networking
Car Connections Johan Lukkien System Architecture and Networking 1 Smart mobility, TU/e wide Cooperative Driving (platooning), A270: Helmond-Eindhoven, 2011 (Mechanical Engineering/TNO) Full electric:
Chapter 9. Communications and Networks. McGraw-Hill/Irwin. Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved.
Chapter 9 Communications and Networks McGraw-Hill/Irwin Copyright 2008 by The McGraw-Hill Companies, Inc. All rights reserved. Competencies (Page 1 of 2) Discuss connectivity, the wireless revolution,
Safety and security related features in AUTOSAR
Safety and security related features in Dr. Stefan Bunzel Spokesperson (Continental) Co-Authors: S. Fürst, Dr. J. Wagenhuber (BMW), Dr. F. Stappert (Continental) Automotive - Safety & Security 2010 22
Product Specification instalert Rapid Messenger Variable Message Sign
instalert 2 units to cover any application instalert 18 (ia18): 18 x 28 full matrix instalert 24: (ia24): 24 x 60 full matrix Size, Weight without battery ia18: 30 x 20 x 2.74, 29 lbs ia24: Folds to fits
Security Best Practice
Security Best Practice Presented by Muhibbul Muktadir Tanim [email protected] 1 Hardening Practice for Server Unix / Linux Windows Storage Cyber Awareness & take away Management Checklist 2 Hardening Server
Cybersecurity And The Automotive Industry
Cybersecurity And The Automotive Industry Dr Andrew Brown, Jr PE, FESD, FSAE, NAE Vice President & Chief Technologist Delphi 2014 Global Symposium on Connected Vehicles & Infrastructure April 21-23, 2014
Thatcham Research The Insurers Automotive Research Centre
Thatcham Research The Insurers Automotive Research Centre 15 th October 2014 Mike Briggs- Vehicle Crime Research Manager Overview of Thatcham The Motor Insurance Research Centre Owned by the major UK Motor
International Working Group on Data Protection in Telecommunications
International Working Group on Data Protection in Telecommunications 675.42.10 4 April 2011 Working Paper Event Data Recorders (EDR) on Vehicles Privacy and data protection issues for governments and manufacturers
Acquisition of Novero. Investor presentation 18th December 2015
Acquisition of Novero Investor presentation 18th December 2015 What Novero brings to Laird The acquisition of Novero and LSR rebalances our business, Wireless Systems will now be of a similar scale to
An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID 15-0454 Abstract
An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Authors(s): Arthur Carter, David Freeman, and Cem Hatipoglu National Highway Traffic Safety Administration (NHTSA) Paper
www.vdoroadlog.com VDO RoadLog EOBR / ELD Electronic On Board Recorder The simple solution for daily log book and compliance reporting.
www.vdoroadlog.com VDO RoadLog EOBR / ELD Electronic On Board Recorder The simple solution for daily log book and compliance reporting. Electronic Log Books are coming! Be ready with VDO RoadLog, the simple,
In short, the OBDII connected device has proven itself as the primary device for UBI products and services for the following reasons:
Insurance Telematics US Market Data Collection Analysis Aftermarket OBD II device vs. the Smartphone and the OEM Connected Platform By: Tim Morris, Mike Carroll, Nate Bryer Executive Summary: The Insurance
Automotive Companies Save Costs, Gain Advantages with Red Bend s FOTA. Case Study
Automotive Companies Save Costs, Gain Advantages with Case Study Notices vlogix Mobile Notice Copyright 2002-2013, Red Bend Software. All Rights Reserved. Patented: www.redbend.com/red-bend-patents.pdf
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars Srdjan Čapkun (joint work with Aurélien Francillon, Boris Danev) 1 Agenda 1. Overview of Car Key Systems 2. Previous Attacks: In
SMARTDEVICELINK CONNECTIVITY FROM THE CAR S POINT OF VIEW
SMARTDEVICELINK CONNECTIVITY FROM THE CAR S POINT OF VIEW 2 Continuing to open highways 3 4 5 Developing for the car ~68 million vehicles sold globally in 2013 6 Developing for the car ~68 million ~978
WHITE PAPER Security in M2M Communication What is secure enough?
WHITE PAPER Security in M2M Communication What is secure enough? Motivation Wireless Machine-To-Machine (M2M) communication has grown dramatically over the past decade and is still growing rapidly. In
Berlin Institute of Technology FG Security in Telecommunications
Berlin Institute of Technology FG Security in Telecommunications Weiss L4Android: A Generic Operating System Framework for Secure Smartphones Workshop on Security and Privacy in Smartphones and Mobile
The NexTraq Difference
The NexTraq Difference Take Your Business to the Next Level 1 Agenda Who Is NexTraq? How NexTraq Benefits Your Business The NexTraq Difference The NexTraq Solution CFN Fuel Card Integration Benefits Summary
White Paper How are thieves stealing modern vehicles?
SECURITY WHITEPAPER How are thieves stealing modern vehicles? SBD/SEC/2288 1 Introduction Developments in vehicle security over recent years have made it increasingly difficult for thieves to steal vehicles
The Problem: Automotive safety recalls, Control Systems Diagnostics, Stability Control, Traction Control, Anti-lock Braking, Adaptive Cruise Control
AUTOPLUG: Remote Diagnostics Automotive Architecture for Control Software Safety Rahul Mangharam, Yash V. Pant and Truong X. Nghiem Department of Electrical & Systems Engineering University of Pennsylvania
Connected Vehicles: New Directions and Opportunities. AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA. Leidos. All rights reserved.
Connected Vehicles: New Directions and Opportunities AASHTO Connected Vehicle Task Force December 3, 2014 Irvine, CA N A T I O N A L S E C U R I T Y E N G I N E E R I N G H E A L T H S O L U T I O N S
Intervid Fleet Management Fleet Telematics. Intervid, Inc. 5111 Pegasus Court, Suite C Frederick, MD 21704
Intervid Fleet Management Fleet Telematics Intervid Fleet Management Intervid Fleet Management brings to market a leading Global Fleet Telematics Technology. Intervid Fleet Management solutions have assisted
Ways to Use USB in Embedded Systems
Ways to Use USB in Embedded Systems by Yingbo Hu, R&D Embedded Engineer and Ralph Moore, President of Micro Digital Universal Serial Bus (USB) is a connectivity specification that provides ease of use,
WIND RIVER INTELLIGENT DEVICE PLATFORM XT
WIND RIVER INTELLIGENT DEVICE PLATFORM XT The Foundation for Building Devices That Connect to the Internet of Things The opportunities presented by the burgeoning Internet of Things (IoT) may be new, but
How To Attack A Key Card With A Keycard With A Car Key (For A Car)
Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars (NDSS ) Aurélien Francillon, Boris Danev, Srdjan Čapkun (ETHZ) Wednesday System Security April Group 6, 1 Agenda 1. Overview of Car
Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process
Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process By Andreas Lindenthal and Franz Walkembach, Wind River The concept of autonomous vehicles or unmanned
WIND RIVER SECURE ANDROID CAPABILITY
WIND RIVER SECURE ANDROID CAPABILITY Cyber warfare has swiftly migrated from hacking into enterprise networks and the Internet to targeting, and being triggered from, mobile devices. With the recent explosion
The Future of the Automobile Vehicle Safety Communications. Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014
The Future of the Automobile Vehicle Safety Communications Stanford University ME302 Luca Delgrossi, Ph.D. April 1, 2014 About your lecturer Luca Delgrossi, Ph. D. Born in Italy, I live in the US since
Introduction CHAPTER 1
CHAPTER 1 Introduction Ever since the development of the first integrated circuits in the late 1950s the complexity of such devices doubled every 20 months. A development which has been anticipated by
Quick Start Guide: Iridium GO! Advanced Portal
Quick Start Guide: Iridium GO! Advanced Portal Contents Set-Up... 3 Overview... 4 Main Tab 1: General... 5 Status.... 5 Settings... 8 Audio.... 8 GPS.... 9 Tab 2: Communication... 9 Wi-Fi... 9 Satellite...
About Redtail Telematics
Company Overview About Redtail Telematics Redtail was established to explore the potential of GPS technology; turning location and accelerometer data into meaningful insight for consumers, fleet managers,
M-Shield mobile security technology
Technology for Innovators TM M-Shield mobile security technology making wireless secure Overview As 3G networks are successfully deployed worldwide, opportunities are arising to deliver to end-users a
The Internet of Things: Opportunities & Challenges
The Internet of Things: Opportunities & Challenges What is the IoT? Things, people and cloud services getting connected via the Internet to enable new use cases and business models Cloud Services How is
Sierraware Overview. Simply Secure
Sierraware Overview Simply Secure Sierraware Software Suite SierraTEE/Micro Kernel TrustZone/GlobalPlatform TEE SierraVisor: Bare Metal Hypervisor Hypervisor for ARM Para-virtualization, TrustZone Virtualization,
Leveraging Tizen IVI Platform for Realizing V2X Use Cases
Leveraging Tizen IVI Platform for Realizing V2X Use Cases Purnendu Sinha Tizen IVI Team Samsung R&D India, Bangalore Email: [email protected] Outline V2X Applications and their Requirements Use Cases
NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA
NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH Arthur Carter, Frank Barickman, NHTSA Electronic Systems Safety Research Division Electronic Systems Safety (ESS) Research Division conducts research to ensure
Semiconductors enablers of future mobility concepts 4. Kompetenztreffen Elektromobilität, 22. Februar 2012, Cologn
Semiconductors enablers of future mobility concepts 4. Kompetenztreffen Elektromobilität, 22. Februar 2012, Cologn Kurt Sievers Executive VP & General Manager NXP Automotive Geschäftsführer NXP Semiconductors
How To Make A Car A Car Into A Car With A Car Stereo And A Car Monitor
Designing 1000BASE-T1 Into Automotive Architectures Alexander E Tan Ethernet PHY and Automotive PLM [email protected] Ethernet IP & Automotive Tech Day October 23 & 24th, 2014 Agenda What Does 1000BASE-T1
Advanced Safety. Driver Vehicle Interface Collision Avoidance & Mitigation Vehicle Communications. Helping industry engineer safe vehicles
SAE INTERNATIONAL Advanced Safety Standards & Resources Driver Vehicle Interface Collision Avoidance & Mitigation Vehicle Communications Helping industry engineer safe vehicles Driver Vehicle Interface,
Vehicle Tracking System using GPRS
Urban Transport XIII: Urban Transport and the Environment in the 21st Century 409 Vehicle Tracking System using GPRS S. Ikram 1 & F. T. Shah 2 1 Seidco Communication L.L.C, Abu Dhabi, UAE 2 COMSATS Institute
Telematics & Wireless M2M
www.lairdtech.com Telematics & Wireless M2M DEVICE PORTFOLIO About Laird Technologies Laird Technologies designs and manufactures customized, performance-critical products for wireless and other advanced
Enterprise M2M Solutions. Fast, Flexible, Cost Effective
Enterprise M2M Solutions Fast, Flexible, Cost Effective The Procon Difference Procon provides M2M platforms and applications for the management of all mobile assets. We are an Australian owned company
Bus Data Acquisition and Remote Monitoring System Using Gsm & Can
IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 8, Issue 3 (Nov. - Dec. 2013), PP 88-92 Bus Data Acquisition and Remote Monitoring System
U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE
U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE October 19, 2015 To: Members, Subcommittee on Commerce, Manufacturing, and Trade From: Committee Majority Staff Re: Hearing entitled Examining
Avaya G700 Media Gateway Security - Issue 1.0
Avaya G700 Media Gateway Security - Issue 1.0 Avaya G700 Media Gateway Security With the Avaya G700 Media Gateway controlled by the Avaya S8300 or S8700 Media Servers, many of the traditional Enterprise
PL-1, Pocket Logger 11-0135B
PL-1, Pocket Logger 1 PL-1... 2 2 Wiring... 3 2.1.1 Single Innovate Device Relay Wiring Instructions... 3 3 Mounting... 4 4 Connecting the PL-1 to the MTS serial chain... 4 5 Recording... 5 6 LogWorks...
Mentor Embedded IVI Solutions
Mentor Embedded IVI Solutions Infotainment Instrument Cluster Andrew Patterson [email protected] Business Development Director Automotive Embedded Software mentor.com/embedded Android is a trademark
Switcher SW1 User Manual V2.2
Switcher SW1 User Manual V2.2 Table of Contents 1 Introduction...3 2 Disclaimer...4 3 About Switcher SW1...5 3.1 Compatibility...5 3.2 Privacy Firewall...5 3.3 Boost Control...5 3.4 Firmware Upgrades...5
2009 QUICK REFERENCE GUIDE GET INFORMED. ROLL.
xb 2009 QUICK REFERENCE GUIDE GET INFORMED. ROLL. 2009 Scion xb This Quick Reference Guide is a summary of basic vehicle operations. It contains brief descriptions of fundamental operations so you can
Trust Digital Best Practices
> ARMING IT AGAINST SMARTPHONE THREATS Trust Digital Best Practices April 2009 The information contained herein is subject to change at any time, and Trust Digital makes no warranties, either express or
Implementation of Wireless Gateway for Smart Home
Communications and Network, 2013, 5, 16-20 doi:10.4236/cn.2013.51b005 Published Online February 2013 (http://www.scirp.org/journal/cn) Implementation of Wireless Gateway for Smart Home Yepeng Ni 1, Fang
SVC400P/SVC800P. 4/8 Camera Live Tracking Vehicle DVR Installation Manual. Version 1.0
SVC400P/SVC800P 4/8 Camera Live Tracking Vehicle DVR Installation Manual Version 1.0 1. MAIN FEATURES... 2 2. PRODUCT OVERVIEW... 2 3. DIMENSIONS... 4 4. PACKAGE CONTENTS... 5 5. MOUNTING AND ENVORNMENTAL
BlackBerry 10.3 Work and Personal Corporate
GOV.UK Guidance BlackBerry 10.3 Work and Personal Corporate Published Contents 1. Usage scenario 2. Summary of platform security 3. How the platform can best satisfy the security recommendations 4. Network
Crucial Role of ICT for the Reinvention of the Car
Joint EC / EPoSS / ERTRAC Expert Workshop 2011 Electric Vehicle System Integration and Architecture Crucial Role of ICT for the Reinvention of the Car Karl-Josef Kuhn Siemens Corporate Research and Technologies
Protecting Corporate Data from Mobile Threats. And the emerging role for microsd-based security Art Swift CEO, CUPP Computing
Protecting Corporate Data from Mobile Threats And the emerging role for microsd-based security Art Swift CEO, CUPP Computing 1 Information security is broken $77B WORLDWIDE SPENDING ON INFORMATION SECURITY
Case Study: Mobile Device Forensics in Texting and Driving Cases
Case Study: Mobile Device Forensics in Texting and Driving Cases Company Profile McCann Investigations is a full service private investigation firm providing complete case solutions by employing cutting-edge
Using Smartphones to Detect Car Accidents and Provide Situational Awareness to First Responders
Using Smartphones to Detect Car Accidents and Provide Situational Awareness to First Responders Christopher Thompson [email protected] Institute for Software Integrated Systems Vanderbilt University
A&E Specifications RoadRunner Video Surveillance Systems for School Transportation Applications
RoadRunner Video Surveillance Systems for School Transportation Applications A. Digital Video Recorder (DVR) System: 1. The system shall be provided in compatible and interchangeable formats that support
