CYBERSECURITY FOR THE AUTOMOBILE IS THE CAR OF THE FUTURE STILL A CAR?



Similar documents
Safety and security related features in AUTOSAR

Automotive Software Development Challenges Virtualisation and Embedded Security

The relevance of cyber-security to functional safety of connected and automated vehicles

JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Introduction CHAPTER 1

Security in Vehicle Networks

ISO Introduction

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions

Challenges for the European Automotive Software Industry

EB Automotive Driver Assistance EB Assist Solutions. Damian Barnett Director Automotive Software June 5, 2015

Hardware Virtualization for Pre-Silicon Software Development in Automotive Electronics

The Problem: Automotive safety recalls, Control Systems Diagnostics, Stability Control, Traction Control, Anti-lock Braking, Adaptive Cruise Control

Automotive Black Box Data Recovery Systems

Crucial Role of ICT for the Reinvention of the Car

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process

Vehicular On-board Security: EVITA Project

The Internet of Things: Opportunities & Challenges

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

Analysis of Performing Secure Remote Vehicle Diagnostics

ECU State Manager Module Development and Design for Automotive Platform Software Based on AUTOSAR 4.0

Mentor Embedded Automotive Solutions

Integrating the customer experience through unifying software - The Microsoft Vision

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

STMicroelectronics is pleased to present the. SENSational. Attend a FREE One-Day Technical Seminar Near YOU!

In the pursuit of becoming smart

David Tuttle Research Fellow The University of Texas at Austin

The demonstration will be performed in the INTA high speed ring to emulate highway geometry and driving conditions.

Keeping Up with the Data & Security Demands of the Automotive IoT

Frost & Sullivan Cybersecurity Presentation

The Vision of Vehicle Infrastructure Integration (VII)

Call for Proposal: Internet-of-Things (IoT) for Intelligent Buildings and Transportation

Advanced Safety. Driver Vehicle Interface Collision Avoidance & Mitigation Vehicle Communications. Helping industry engineer safe vehicles

NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

Automotive and Industrial Data Security

Low-Overhead Hard Real-time Aware Interconnect Network Router

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

1. Fault Attacks for Virtual Machines in Embedded Platforms. Supervisor: Dr Konstantinos Markantonakis,

A Systems of Systems. The Internet of Things. perspective on. Johan Lukkien. Eindhoven University

Securing Distribution Automation

Italian experience towards Smart Cities. Dani Schaumann Global Country Advisor Intesa Sanpaolo, Investment & Corporate Banking Division

Embedded Java & Secure Element for high security in IoT systems

Image Data Filtering to the Cloud

An OSGi based HMI for networked vehicles. Telefónica I+D Miguel García Longarón

Wireless Sensor Networks Chapter 14: Security in WSNs

Secure software updates for ITS communications devices

Advanced Driver Assistant System

AUTOSAR Software Architecture

A WIDER SHARING ECOSYSTEM. The pivotal role of data in transport solutions

Car Connections. Johan Lukkien. System Architecture and Networking

Connected and Automated Vehicles and the Cybersecurity Threat

INTEGRATED OPEN DEVELOPMENT PLATTFORM FÜR TEIL- UND VOLLAUTOMATISIERTE FAHRZEUGANTRIEBE

In-Vehicle Networking

TRW Automotive TRW Automotive Profile 2012

A Case Study of Application Development and Production Code Generation for a Telematics ECU with Full Unified Diagnostics Services

Problems of Security in Ad Hoc Sensor Network

An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID Abstract

Embedding Trust into Cars Secure Software Delivery and Installation

Hardware in the Loop (HIL) Testing VU 2.0, , WS 2008/09

Musings on IOT. Tim Grance Jeff Voas. Computer Security Division Information Technology Laboratory National Institute of Standards and Technology

TÜ V Rheinland Industrie Service

Securing Wireless Access for Vehicular Environments (WAVE)

DesignWare IP for IoT SoC Designs

Securing Wireless Access in Vehicular Environments (WAVE) Infrastructure and Operations Support Systems(OSS) Architecture

How To Understand The Power Of The Internet Of Things

Testimony of Ann Wilson House Energy & Commerce Committee Subcommittee on Commerce, Manufacturing and Trade, October 21, 2015

Service Oriented Architecture for Agricultural Vehicles

Wireless Sensor Network: Challenges, Issues and Research

Laptops on 4 wheels. New service processes for the automotive industry. Marko Weiße ProSTEP ivip Symposium

Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute

MEPTEC. Ecosystem for MCU, Sensors and MEMS for IoT Tony Massimini Chief of Technology Semico Research Corp. May 20, 2015

Virtual Integration and Consistent Testing of Advanced Driver Assistance Functions

Telematics Workshop: Remote 2-Way Communication Meeting Results

In-Vehicle Infotainment. A View of the European Marketplace

SCSK s Automotive Software Business

Lights. Sensors. Action.

Presented by: Jens Svensson, Volvo 3P. Volvo Group

Open Source Software

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

Seminar Automotive Open Systems Architecture

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Vehicular Cloud. Fan Zhang

Smart Systems: the key enabling technology for future IoT

IoT Security Concerns and Renesas Synergy Solutions

Enabling Service Innovation on a Smarter Planet with Integrated Service Management. Chris Mallon, Service Management Executive, IBM Canada

Securing the Internet of Things

Circuit Protection is Key in Maintaining Growth for The Internet of Things

Evolution of Connected Vehicle Ecosystem

What is Really Needed to Secure the Internet of Things?

Summer projects for Dept. of IT students in the summer 2015

Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software

Internet of Things, 5G, Big Smart Data Interplay. The Convergence and Integration of Mobile Communications, Internet, and Smart Data Processing

Smart Card- An Alternative to Password Authentication By Ahmad Ismadi Yazid B. Sukaimi

Transcription:

CYBERSECURITY FOR THE AUTOMOBILE IS THE CAR OF THE FUTURE STILL A CAR? Alberto Sangiovanni-Vincentelli The Edgar L. and Harold H. Buttner Chair of EECS University of California at Berkeley Co-Founder, CTA and Member of the Board Cadence Design Systems I&C Research Days, Lausanne, 21 June 2012

Outline The evolution of the IT World The Evolution of the Automotive World Challenges in Design Cybersecurity for Vehicles Conclusions

The Emerging IT Scene! Infrastructural core The Cloud! Sensory swarm Mobile access Courtesy: J. Rabaey 3 Alberto Sangiovanni-Vincentelli. All rights reserved.

Computers and mobiles to disappear! Predictions: 7 trillions devices servicing 7 billion people! 1,000 devices per person by 2025 The Immersed Human Real-life interaction between humans and cyberspace, enabled by enriched input and output devices on and in the body and in the surrounding environment Courtesy: J. Rabaey

IBM Smarter Planet Initiative: Something profound is happening CYBER PHYSICAL SYSTEMS! INSTRUMENTED We now have the ability to measure, sense and see the exact condition of practically everything. INTERCONNECTED People, systems and objects can communicate and interact with each other in entirely new ways. INTELLIGENT We can respond to changes quickly and accurately, and get better results by predicting and optimizing for future events. 5

Intelligent systems that gather, synthesize and apply information will change the way entire industries operate. Smart water Apply monitoring and management technologies to help optimize the availability, delivery, use, and quality of water as well as related systems including energy and chemical treatment. Smart traffic Smart energy Use real-time traffic prediction and dynamic tolling to reduce congestion and its byproducts while positively influencing related systems. Analyze customer usage and provide customized products and services that help to boost efficiency from the source through the grid to the end user. Congestion Water Energy grid Chemicals Energy Carbon emissions Carbon emissions Noise pollution Energy Public transportation 6 Energy sources Smart home

Vision 2025 - Every object will be smart - The Ensemble is the Function! - Function determined by availability of sensing, actuation, connectivity, computation, storage and energy - Collaborating to present unifying experiences or to fulfill common goals A humongous networked, distributed, adaptive, hierarchical, hybrid control problem

Outline The evolution of the IT World The Evolution of the Automotive World Challenges in Design Cybersecurity for Vehicles Conclusions

The Evolution of the Automotive DNA Energized by Petroleum Powered Mechanically by Internal Combustion Engine Controlled Mechanically Energized by Electricity and Hydrogen Powered Electrically by Electric Motors Controlled Electronically Stand-alone Connected Totally Dependence on the Driver Vehicle Sized for Maximum Use People and Cargo Courtesy: A. Taub, GM Semi/Full Autonomous Driving Vehicle Tailored to Specific Use

360 SENSING CAPABILITY TODAY FUTURE Courtesy: A. Taub, GM

CMOS mmwave Circuits and SoC: 60GHz Today Multiple 60GHz standards complete WirelessHD products available SiBeam (BWRC startup) Wall-powered Dissipate <2W A $10 Radar is a possibility! 11 Alberto Sangiovanni-Vincentelli. All rights reserved.

VEHICLE IS PART OF A CONNECTED ECO-SYSTEM Internet Back Office Backend Call Center GPS Satellite Uplink Satellite Broadcast AutoNet or Verizon MiFi Cellular Geo-syncing Location In-Car Access Point Wi-Fi Cellular Embedded Link Smartphone V2I V2V VII VSC-CAMP ITS Demos CICAS Courtesy: A. Taub, GM

The Problem: Typical Car Electrical Architecture ETS?? AM/ATA AM/ATA

From federated to integrated architectures Today: Federated Architectures Each time a new function is required, the OEM starts a request to suppliers for a new ECU (an integrated HW/SW device realizing the function) to be integrated on the existing networks The device is developed by the supplier with its own choice of HW, RTOS, device drivers and communication layers (with some standardization) The result is Proliferation of ECUs (reaching 100) Device Complex distributed Drivers architectures with the need of high bandwidth and COM Application HWtherefore multiple networks and gateways stack software Complex functional RTOS and not-functional (timing) dependencies across the network, which OEMs struggle to control Missing opportunities for common set of libraries and (sub)functions Limited standardization, flexibility and extensibility Limited control on the execution platform by OEMs

Active Safety Collision Avoidance LateralAir bag Pre-Tensioner Pedestrian Protection Night Vision Traffic Sign Recognition Lane Departure Lateral Control Airbag ABS Electric Steering Alberto Sangiovanni-Vincentelli. All rights reserved. Active Suspension Electronic Stability Active Front Steering Integrated Vehicle Stability Sensors are becoming critical Fusion and Optimization are Differentiating factors

Cyber Tire System Major broadcast channel in Italy Vehicle dynamics control system User Applications Processing unit Receivers Marco Tronchetti Provera Chairman of Pirelli & C. S.p.A. Cyber Tire Cyber Tire

From federated to integrated architectures Tomorrow?: Integrated Architectures The execution architecture is completely selected and planned by the OEM. OEMs are free to standardize HW, drivers, RTOS and communication layers, leveraging competition among suppliers HW Device Drivers COM stack HW Device Drivers RTOS COM stack Each time a new function is required, the OEM starts a request to suppliers for new functional content (SW) to be integrated on the existing platform RTOS Device Drivers HW COM stack HW Device Drivers COM stack Device Drivers RTOS RTOS HW HW COM Device Drivers COM stack HW Device Drivers COM stack RTOS RTOS RTOS HW Device Drivers RTOS COM stack HW Device Drivers COM stack RTOS Device Drivers HW RTOS COM stack HW Device Drivers RTOS COM stack The challenges are: Moving from specifications of ECUs with message interfaces to the specs of SW components Standardize interoperability among components Standardize access to the platform services Define models that allow to predict the result of the composition (functional and not-functional)

Outline The evolution of the IT World The Evolution of the Automotive World Challenges in Design Cybersecurity for Vehicles Conclusions

Trustworthy Computing: Safety The ISO 26262 roadmap for MCUs MCU Systematic faults HW random faults Avoidance faults in the process Avoidance bugs in SW Analysis Safety Mechanisms Requirments tracking, Config. mngment Control & verification of tool suites (e.g. compiler, etc..) Qualitative Analysis HW diagnostic mechanisms (e.g. ECC, DCLS etc) Control & verification of the design process Control & verification of the SW test design Dependent failures (CCF) analysis SW diagnostic mechanisms (e.g. SW tests) Control & verification of usage, mntainance and changes Doc. & Verification of HW-SW interfaces Quantitative Analysis Measures for CCF avoidance HW metrics analysis (SPFM, LFM, PMHF) 19 VDA Automotive SYS Conference - Berlin 2012 - Riccardo Mariani (riccardo.mariani@yogitech.com) HW metrics verification (fault injection)

Automotive V-Models: a Linear Development Process Development of Car System Development of Sub-System Development of Mechanical Part (s) ECU Development ECU SW Development ECU HW Development ECU SW Implementation ECU HW/SW Integration and Test ECU HW Sign-Off! ECU SW Integration and Test Car System Sign-Off! Sub-System(s) Integration, Test, and Validation Sub-System Sign-Off! ECU/ Sens./Actrs./Mech. Part(s) Integration, Calibration, and Test ECU Sign-Off! ECU: Electrical Control Unit

AUTOSAR Architecture SW-C Description AUTOSA R SW-C 1 ECU Descriptions AUTOSA R SW-C 1 SW-C Description ECU1 RTE Basic Software AUTOSA R SW-C 2 SW-C Description AUTOSA R SW-C 3 Virtual Functional Bus Deployment tools AUTOSA R SW-C 2 SW-C Description ECU1 RTE AUTOSA R SW-C 3 Basic Software AUTOSA R SW-C n System Constraint Description Functional infrastructure A fundamental concept of AUTOSAR is the separation between: (functional) application and infrastructure

Supporting Theory Provide a semantic foundations for integrating different models of computation Independent of the design language Maximize flexibility for using different levels of abstraction For different parts of the design At different stages of the design process For different kinds of analysis Support many forms of abstraction Model of computation (model of time, synchronization, etc.) Scoping Structure (hierarchy)

Outline The evolution of the IT World The Evolution of the Automotive World Challenges in Design Cybersecurity for Vehicles Conclusions

Trustworthy Computing: Vehicle Cybersecurity Modern vehicles are complex, networked Information Technology (IT) systems that comprise an increasingly sophisticated array of sensors and control processors connected by internal communication networks Vehicles are networked entities that exist in cyberspace much like any other computational node, PC, tablet, or smartphone As more and more technology is introduced into automobiles, the threat of malicious software and hardware manipulation increases Increasing connectivity and complexity is greatly expanding the attack surface of our systems Recent work has demonstrated potential security weaknesses in vehicles Comprehensive Experimental Analyses of Automotive Attack Surfaces, S. Checkoway et al.,uc San Diego, K. Koscher, et al, U. of Washington IEEE Symposium on Security and Privacy in Oakland, CA on May 19, 2010.

Surface of attack 25 Alberto Sangiovanni-Vincentelli. All rights reserved.

Basic Findings Demonstrated the ability to control a wide range of automotive functions and completely ignore driver input, including disabling the brakes, selectively braking individual wheels on demand, and stopping the engine. Possible to bypass rudimentary network security protections within the car, such as maliciously bridging between two internal subnets of a car. Possible to embed malicious code in a car s telematics unit that will completely erase any evidence of its presence after a crash 26 Alberto Sangiovanni-Vincentelli. All rights reserved.

27 Attack Surface Capabilities

Scenario What if a malicious node can get access to the network and send a message with rogue data? A node becomes malicious because of physical tempering and/or cybertempering brake throttle engine Accelerate! malicious node steering wheel gear tires 28

The Dilemma 29 Alberto Sangiovanni-Vincentelli. All rights reserved. Raffaello Sanzio, The Athens School

Types of Attacks and Desired Properties Types of attacks Interception (eavesdropping): unauthorized nodes read data Modification: authorized nodes change data Fabrication: unauthorized nodes generate additional data Interruption: data becomes unavailable Desired properties Confidentiality: data is not read by unauthorized nodes Data integrity: data is not changed by unauthorized nodes Authentication: a receiver or a sender is who it claims to be Non-repudiation (not discussed here): a sender ensures that a receiver has received the message, and a receiver is sure about the identity of a sender. Data integrity and authentication are the most relevant properties for an automotive communication system 30

Our Work (UCB+GM): Provide a Security Solution for CAN First part: security mechanism Define the attacker model (the attack scenarios that we want to address with our mechanism) Point out the difficulties of using existing authentication approaches on CAN Propose a security mechanism which is applicable to CAN and help prevent masquerade and replay attacks Second part: optimization framework Support for optimization and trade-off exploration e.g., maximizing degree of security vs. additional bus load penalty Generalize to additional configurations e.g., different secret key distributions and counter implementations Easy to use, maintain, and support 31

Attacker Model Masquerade attack An attacker sends a message in which it claims to be a node other than itself Replay attack An attacker sends (replays) a copy of a message it has received from the CAN network The message is not modified or altered 32

Existing Approach [Szilagyi & Koopman, CMU] Achieve data integrity by authentication Each pair of nodes has a shared secret key A sender computes Message Authentication Codes (MACs) and broadcasts the message with the MACs A receiver computes a MAC and compares it with the sent MAC global time broadcast message message node i key 1,i f MAC 1 key i,1 f MAC 1 compare key i,2 key i,n f f MAC 2 MAC n ignore ignore accept /reject message node 1 node 2 node n 33

Difficulties on CAN The communication overhead is too high There is no global time in CAN global time broadcast message message node i key 1,i f MAC 1 key i,1 f MAC 1 compare key i,2 key i,n f f MAC 2 MAC n ignore ignore accept /reject message node 1 node 2 node n 34

Our Security Mechanism Sender 1. Increases its sending counter 2. Computes MACs (for its receivers only) Using data, the counter, and the pair-wise keys 3. Broadcasts a message w/ data, the counter, and MACs (plus the other CAN fields) Receiver 1. Checks its ID table Decides which key and counter to use based upon the sender ID 2. Checks if the received counter > its local counter Sees if the message is fresh 3. Computes MAC and compares MAC and MAC Uses (received) data, (received) counter, and its pair-wise key 4. Updates its local counter prevent masquerade attacks data prevent replay attacks counter message format MAC 35

Final Words of Wisdom 36 Alberto Sangiovanni-Vincentelli. All rights reserved.