AUTOSAR Security Modules

Similar documents
CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

From Signal Routing to complete AUTOSAR compliant CAN design with PREEvision (II)

Safety and security related features in AUTOSAR

Safety and Security Features in AUTOSAR

AUTOSAR Configuration Process - How to handle 1000s of parameters

Embedding Trust into Cars Secure Software Delivery and Installation

SHE Secure Hardware Extension

UM0586 User manual. STM32 Cryptographic Library. Introduction

Secure Network Communications FIPS Non Proprietary Security Policy

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions

Standardized software components will help in mastering the. software should be developed for FlexRay were presented at

Embedded OS. Product Information

SkyRecon Cryptographic Module (SCM)

User-friendly Configuration of AUTOSAR ECUs with Specialized Software Tools

Chapter 11 Security+ Guide to Network Security Fundamentals, Third Edition Basic Cryptography

Product Information Services for Embedded Software

ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0

Do AUTOSAR and functional safety rule each other out?

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

SPC5-CRYP-LIB. SPC5 Software Cryptography Library. Description. Features. SHA-512 Random engine based on DRBG-AES-128

Secure web transactions system

AUTOSAR Safety Solutions for Multicore ECUs and ADAS Systems. Robert Leibinger 5 th June 2015

AUTOSAR Software Architecture

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

SSL A discussion of the Secure Socket Layer

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

Northrop Grumman M5 Network Security SCS Linux Kernel Cryptographic Services. FIPS Security Policy Version

Security Technical. Overview. BlackBerry Enterprise Service 10. BlackBerry Device Service Solution Version: 10.2

IoT Security Concerns and Renesas Synergy Solutions

IT Networks & Security CERT Luncheon Series: Cryptography

An Introduction to Cryptography as Applied to the Smart Grid

Pulse Secure, LLC. January 9, 2015

M-Shield mobile security technology

BMW Car IT GmbH. AUTOSAR - First Experiences and the Migration Strategy of the BMW Group

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

Introducing etoken. What is etoken?

Trustworthy Computing

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

Plug and Play Solution for AUTOSAR Software Components

In networking ECUs in heavy-duty vehicles, it is the J1939 protocol that. plays a key role. J1939 networks are based on the CAN bus (high-speed

Modeling and verification of security protocols

SecureDoc Disk Encryption Cryptographic Engine

NXP & Security Innovation Encryption for ARM MCUs

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

Deeply Embedded Real-Time Hypervisors for the Automotive Domain Dr. Gary Morgan, ETAS/ESC

Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015

Measurement and Analysis Introduction of ISO7816 (Smart Card)

IPsec Details 1 / 43. IPsec Details

VASCO Data Security International, Inc. DIGIPASS GO-7. FIPS Non-Proprietary Cryptographic Module Security Policy

Overview of Cryptographic Tools for Data Security. Murat Kantarcioglu

Security in Vehicle Networks

Cyber Security Practical considerations for implementing IEC 62351

Chapter 6 Electronic Mail Security

Symantec Corporation Symantec Enterprise Vault Cryptographic Module Software Version:

APPLICATION NOTE. Atmel AT02333: Safe and Secure Bootloader Implementation for SAM3/4. Atmel 32-bit Microcontroller. Features.

Hardware Security Modules for Protecting Embedded Systems

Thanks, But No Thanks

An introduction to AUTOSAR

Key & Data Storage on Mobile Devices

Disk encryption... (not only) in Linux. Milan Brož

Seminar Automotive Open Systems Architecture

CS 393 Network Security. Nasir Memon Polytechnic University Module 11 Secure

isolar Integrated Solution for AUTOSAR

Deliverable D2.2: Specification of security services incl. virtualization and firewall mechanisms

Threat Model for Software Reconfigurable Communications Systems

AppliedMicro Trusted Management Module

Vehicular On-board Security: EVITA Project

How encryption works to provide confidentiality. How hashing works to provide integrity. How digital signatures work to provide authenticity and

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

Network Security. Computer Networking Lecture 08. March 19, HKU SPACE Community College. HKU SPACE CC CN Lecture 08 1/23

IBM Crypto Server Management General Information Manual

Chapter 13. PIC Family Microcontroller

Index. BIOS rootkit, 119 Broad network access, 107

Cryptography and Key Management Basics

IT Networking and Security

Security Policy for FIPS Validation

PikeOS: Multi-Core RTOS for IMA. Dr. Sergey Tverdyshev SYSGO AG , Moscow

Real-Time Communication Security: SSL/TLS. Guevara Noubir CSU610

FIPS Non Proprietary Security Policy: Kingston Technology DataTraveler DT4000 Series USB Flash Drive

AN3270 Application note

Cryptography & Network Security. Introduction. Chester Rebeiro IIT Madras

Beschleunigen Sie die Entwicklung Ihrer Embedded Software mit Dienstleistungen von Vector

Secure Hardware PV018 Masaryk University Faculty of Informatics

Architectures and Platforms

EnergyAxis System: Security for the Smart Grid

Software Development for Multiple OEMs Using Tool Configured Middleware for CAN Communication

KeyStone Architecture Security Accelerator (SA) User Guide

BlackBerry Enterprise Solution

Cryptographic Algorithms and Key Size Issues. Çetin Kaya Koç Oregon State University, Professor

Kaseya US Sales, LLC Virtual System Administrator Cryptographic Module Software Version: 1.0

Table of Contents. Bibliografische Informationen digitalisiert durch

BroadSAFE Enhanced IP Phone Networks

Configuration management in AUTOSAR

From Diagnostic Requirements to Communication

Freescale Variable Key Security Protocol Transmitter User s Guide by: Ioseph Martínez and Christian Michel Applications Engineering - RTAC Americas

Transcription:

AUTOSAR Security Modules Current Status V1.00 2015-05-27

Agenda 1. AUTOSAR 2. CAL & CSM 3. SecOC 2/40

AUTOSAR Introduction Automotive Open System Architecture Software for electronic control units (ECU) Software architecture SWC/Application RTE SYS COM LIB MCAL CDD Microcontroller 3/40

AUTOSAR Introduction Software component (SWC) / Application Implementation of functionality of ECU Runs on microcontroller Sends & receives data to and from other ECUs (in network) SWC/Application Microcontroller 4/40

AUTOSAR Introduction Run time environment (RTE) Provides interface to basic software (BSW) SWC/Application RTE Microcontroller 5/40

AUTOSAR Introduction System services (SYS) and libraries (LIB) Cryptographic modules Operating system (OS) Complex device drivers (CDD) SWC/Application RTE SYS LIB CDD Microcontroller 6/40

AUTOSAR Introduction Communication modules (COM) send & receive data on automotive bus systems > Controller Area Network (CAN) > Local Interconnect Network (LIN) > FlexRay > Ethernet >... SWC/Application RTE SYS COM LIB CDD Microcontroller 7/40

AUTOSAR Introduction Microcontroller abstraction layer (MCAL) BSW & SWC independent of microcontroller SWC/Application RTE SYS COM LIB MCAL CDD Microcontroller 8/40

AUTOSAR Motivation for security modules in AUTOSAR New security challenges Automotive software plays central role in car innovations Car connectivity will provide an essential part for value-added features Car security strict and secure access control to the car and its parts (ECU) sensitive car data (odometer, motor characteristic) passenger s data (GPS) intellectual property of the OEM 9/40

AUTOSAR AUTOSAR security modules CAL & CSM Basic cryptographic primitives for BSW and application SecOC Authenticated communication seamlessly integrated into the AUTOSAR communication stack 10/40

Agenda 1. AUTOSAR 2. CAL & CSM 3. SecOC 11/40

CAL & CSM Introduction Crypto Abstraction Library CAL BSW, CDD or SWC use CAL by inclusion Memory allocated by caller Enables re-entrance Crypto Primitive Library CPL SW implementation of cryptographic primitives Crypto Service Manager CSM CAL CPL SWC/Application RTE CSM SYS CRY CRY COM SWC use CSM through RTE LIB MCAL SHEDRV CDD BSW/CDD use CSM by inclusion Microcontroller SHE Asynchronous operation possible Callback indicates application Crypto library module CRY Implementation of cryptographic primitives Usage of SW or crypto HW possible 12/40

CAL & CSM Supported Cryptographic Services Abstract definition of cryptographic services No definition for a concrete cryptographic algorithm Basic Cryptography Hash Message authentication code () Generation Verification Random number generation Encryption/ Decryption Symmetric Asymmetric Signatures Key Management Key derivation function (KDF) Key generation, update*, export, import Key exchange protocols *Csm only Miscellaneous Compression/ Decompression Checksum 13/40

CAL & CSM Cryptographic Service Configuration AsymEncryptService AsymEncrypt_1 RSA2048 AsymEncrypt_2 RSA4096 SymEncryptService SymEncrypt_1 AES SymEncrypt_2 TwoFish HashService Individual configuration of each required service Set of distinct configurations Specific implementation for each service configuration 14/40

CAL & CSM Cryptographic Service Configuration AsymEncryptService AsymEncrypt_1 RSA2048 AsymEncrypt_2 RSA4096 SymEncryptService SymEncrypt_1 AES SymEncrypt_2 Serpent HashService Individual configuration of each required service Set of distinct configurations Specific implementation for each service configuration Implementations may change in future 15/40

CAL & CSM Cryptographic Service Configuration AsymEncryptService AsymEncrypt_1 RSA2048 ECC256 AsymEncrypt_2 RSA4096 ECC512 SymEncryptService SymEncrypt_1 AES SymEncrypt_2 Serpent HashService Individual configuration of each required service Set of distinct configurations Specific implementation for each service configuration Implementations may change in future API compatibility not ensured 16/40

CAL & CSM General Usage Streaming services Start Update Indefinite long data stream... Update Update... Update Finish Result Initialization with Start function (e.g. Csm_SymEncryptStart) Update function (e.g. Csm_SymEncryptUpdate) Finish function (e.g. Csm_SymEncryptFinish) Non-streaming services Example: Csm_GenerateRandom 17/40

CAL & CSM Hardware-based Security SWC/Application RTE CSM SYS CRY CRY LIB MCAL SHEDRV CDD Microcontroller SHE CSM services use cryptographic hardware or software implementation 18/40

CAL & CSM Hardware-based Security Controller Secure Zone SHE Secure Hardware Extension CPU Control Logic AES RAM + Flash + ROM Peripherals (CAN, UART,...) Secure Hardware Extension (SHE) On-chip extension to microcontroller Memory for secure storage of (cryptographic) data Hardware extension for cryptographic primitives Specified by Hersteller Initiative Software (HIS) 19/40

CAL & CSM SHE - Performance AES ECB Encryption: SHE vs. Software library 2000 1800 1600 1400 2002.5 1 Block 3 Blocks 6 Blocks µs 1200 1000 800 600 400 200 0 1111.6 24.94 13.5 SHE 64 Mhz SW 64 Mhz SHE 120 Mhz SW 120 Mhz Measured on a Freescale MPC5646C (w/ CSE), MICROSAR Stack with CSM and SHE driver with the Vector AUTOSAR Measurement and Debugging (AMD) Runtime Measurement (Rtm) Tool. 1 Block = 16 bytes 20/40

Agenda 1. AUTOSAR 2. CAL & CSM 3. SecOC 21/40

SecOC Introduction SecOC is parallel to PDUR PDUR routes PDUs PDU is a message on a bus SWC/Application RTE SecOC PDUR SYS COM LIB MCAL CDD Microcontroller 22/40

SecOC Introduction SecOC is parallel to PDUR PDUs are routed through SecOC PDU & authentication sent & received through IF or TP modules COM module combines data into PDUs SWC/Application RTE IF modules send & receive atomic messages TP modules manage messages longer than atomic messages SYS SecOC COM PDUR COM IF/TP LIB MCAL CDD Microcontroller 23/40

SecOC Introduction SecOC is parallel to PDUR PDUs are routed through SecOC PDU & authentication sent & received through IF or TP modules SecOC uses Cal or Csm RTE-interface Authentication: or signature CAL CSM SWC/Application RTE SecOC PDUR COM SYS COM IF/TP LIB MCAL CDD Microcontroller 24/40

SecOC Functionality ECU 1 ECU 3 Secured PDU BUS 25/40 SecOC sends & receives secured PDUs Secured PDUs are protected against Manipulation Random errors Replays

SecOC Sending a secured PDU ECU 1 DataID 1 Secured PDU DataID assigned to secured PDU Authentic PDU 26/40

SecOC Sending a secured PDU ECU 1 DataID 1 Fresh. Value Secured PDU Freshness value Monotonic counter to prevent replay attacks Implementation Timestamp Counter 27/40

SecOC Sending a secured PDU ECU 1 DataID 1 Fresh. Value Generator Secured PDU DataID, PDU, freshness value form input to generator Symmetric key required for generation SecOC may use C to benefit from SHE 28/40

SecOC Sending a secured PDU ECU 1 DataID 1 LSBs Fresh. Value Generator Fresh. Value Secured PDU MSBs PDU, truncated freshness value, truncated form secured PDU 29/40

SecOC Sending a secured PDU ECU 1 DataID 1 Fresh. Value Generator Fresh. Value Secured PDU MSBs NIST Special Publication 800-38B (C) Truncated length 64 bits Truncated length must be thoroughly chosen dependent on network attributes and security requirements 30/40

SecOC Reception of a secured PDU DataID 1 ECU 1 Fresh. Value Generator replace LSBs Fresh. Value Secured PDU ECU 3 DataID 1 Ver. Fresh. Authentic PDU is parsed DataID must be identical for sender and receiver Truncated freshness value is synchronized to form verification freshness value 31/40

SecOC Reception of a secured PDU Ver. Fresh. + 0..01 0..0 = Ver. Fresh. Fresh. Value Secured PDU ECU 3 DataID 1 Ver. Fresh. Verification freshness value stored freshness value (replay attacks) If not: Increment MSBs of verification freshness value Synchronization between sender and receiver 32/40

SecOC Reception of a secured PDU DataID 1 ECU 1 Fresh. Value Generator Fresh. Value Secured PDU compare DataID 1 ECU 3 Fresh. Value Generator DataID, PDU, verification freshness form input to generator Symmetric key must be identical for sender and receiver MSBs of calculated are compared to truncated If successful, PDU is forwarded If not, PDU is dropped 33/40

SecOC System Configuration ECU 1 ECU 2 ECU 3 PDU 2 PDU 2 PDU 3 PDU 3 BUS 34/40

SecOC System Configuration ECU 1 ECU 2 ECU 3 PDU 2 PDU 2 PDU 3 PDU 3 BUS 35/40

SecOC System Configuration ECU 1 ECU 2 ECU 3 DataID 1 DataID 1 DataID 1 DataID 2 DataID 2 PDU 2 PDU 2 PDU 3 PDU 3 BUS Assignment of DataIDs to the to-be-secured PDUs 36/40

SecOC System Configuration ECU 1 ECU 2 ECU 3 DataID 1 DataID 1 DataID 1 Fresh. Value Fresh. Value Fresh. Value DataID 2 DataID 2 PDU 2 Fresh. Value PDU 2 Fresh. Value PDU 3 PDU 3 BUS Specification of the layout of the secured PDU 37/40

SecOC System configuration ECU 1 ECU 2 ECU 3 DataID 1 DataID 1 DataID 1 Fresh. Value Fresh. Value Fresh. Value DataID 2 DataID 2 PDU 2 Fresh. Value PDU 2 Fresh. Value PDU 3 PDU 3 BUS Assignment of keys to the secured PDUs Initial keying Re-keying 38/40

SecOC System configuration ECU 1 ECU 2 ECU 3 DataID 1 DataID 1 DataID 1 Fresh. Value Fresh. Value Fresh. Value DataID 2 DataID 2 PDU 2 Fresh. Value PDU 2 Fresh. Value PDU 3 PDU 3 ECU1_Extract ECU2_Extract ECU3_Extract 39/40

For more information about Vector and our products please visit www.vector.com Author: Philipp Werner, Armin Happel, Ralf Fritz, Steffen Keul Vector Informatik GmbH 2015. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V1.00 2015-05-27