Security in Automotive Applications



Similar documents
Automotive Communication Network Trends

SHE Secure Hardware Extension

Vehicular On-board Security: EVITA Project

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

STM32 F-2 series High-performance Cortex-M3 MCUs

VELOCITY LAB TM Embedded Development Ecosystem

ZigBee Technology Overview

All Programmable Logic. Hans-Joachim Gelke Institute of Embedded Systems. Zürcher Fachhochschule

Digitale Signalverarbeitung mit FPGA (DSF) Soft Core Prozessor NIOS II Stand Mai Jens Onno Krah

AppliedMicro Trusted Management Module

Safety and security related features in AUTOSAR

NEXT GENERATION OF AUTOMOTIVE SECURITY: SECURE HARDWARE AND SECURE OPEN PLATFORMS

DesignWare IP for IoT SoC Designs

Cut Network Security Cost in Half Using the Intel EP80579 Integrated Processor for entry-to mid-level VPN

Hardware Security Modules for Protecting Embedded Systems

Wireless Microcontrollers for Environment Management, Asset Tracking and Consumer. October 2009

Customer Experience. Silicon. Support & Professional Eng. Services. Freescale Provided SW & Solutions

High-Performance, Highly Secure Networking for Industrial and IoT Applications

7a. System-on-chip design and prototyping platforms

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

M-Shield mobile security technology

Which ARM Cortex Core Is Right for Your Application: A, R or M?

Automotive and Industrial Data Security

NXP & Security Innovation Encryption for ARM MCUs

Secure Network Communications FIPS Non Proprietary Security Policy

Von der Hardware zur Software in FPGAs mit Embedded Prozessoren. Alexander Hahn Senior Field Application Engineer Lattice Semiconductor

SBC8600B Single Board Computer

Keeping Up with the Data & Security Demands of the Automotive IoT

Embedding Trust into Cars Secure Software Delivery and Installation

System Design Issues in Embedded Processing

Internet of Things. Opportunities for device differentiation

Standardization with ARM on COM Qseven. Zeljko Loncaric, Marketing engineer congatec

System-on-a-Chip with Security Modules for Network Home Electric Appliances

SPI I2C LIN Ethernet. u Today: Wired embedded networks. u Next lecture: CAN bus u Then: wireless embedded network

ARM Cortex -A8 SBC with MIPI CSI Camera and Spartan -6 FPGA SBC1654

FIPS Security Policy 3Com Embedded Firewall PCI Cards

Building Blocks for PRU Development

Quick Start Guide. USB Packet Sniffer/Dongle for Kinetis MKW22D and MKW24D Wireless MCUs USB-KW24D512

IoT Security Concerns and Renesas Synergy Solutions

MXMedia CipherStream. Preliminary Assessment. Copyright 2012 Farncombe 1.0. Author: T F

In-Vehicle Networking

Network connectivity controllers

Chapter 13. PIC Family Microcontroller

Architekturen und Einsatz von FPGAs mit integrierten Prozessor Kernen. Hans-Joachim Gelke Institute of Embedded Systems Professur für Mikroelektronik

FPGAs for Trusted Cloud Computing

Security in Vehicle Networks

SABRE Lite Development Kit

ST19NP18-TPM-I2C. Trusted Platform Module (TPM) with I²C Interface. Features

BEAGLEBONE BLACK ARCHITECTURE MADELEINE DAIGNEAU MICHELLE ADVENA

Products. CM-i586 Highlights. Página Web 1 de 5. file://c:\documents and Settings\Daniel\Os meus documentos\humanoid\material_o...

ontroller LSI with Built-in High- Performance Graphic Functions for Automotive Applications

The Internet of Things: Opportunities & Challenges

KeyStone Architecture Security Accelerator (SA) User Guide

Designing a System-on-Chip (SoC) with an ARM Cortex -M Processor

M2M For industrial and automotive

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

Secure Key Management A Key Feature for Modern Vehicle Electronics

Securing Host Operations with a Dedicated Cryptographic IC - CryptoCompanion

Lab Experiment 1: The LPC 2148 Education Board

Security Policy: Key Management Facility Crypto Card (KMF CC)

SPEAr family of embedded microprocessors

Software engineering for real-time systems

Java Embedded Applications

Serial port interface for microcontroller embedded into integrated power meter

BroadSAFE Enhanced IP Phone Networks

IoT Security Platform

A Scalable VISC Processor Platform for Modern Client and Cloud Workloads

SPINS: Security Protocols for Sensor Networks

Pre-tested System-on-Chip Design. Accelerates PLD Development

Renesas Inverter Agenda

Mentor Embedded Automotive Solutions

Universal Flash Storage: Mobilize Your Data

Bootloader with AES Encryption

UM0586 User manual. STM32 Cryptographic Library. Introduction

Performance Investigations. Hannes Tschofenig, Manuel Pégourié-Gonnard 25 th March 2015

M85 OpenCPU Solution Presentation

OSI Layers in Automotive Networks

Figure 1.Block diagram of inventory management system using Proximity sensors.

System Considerations

W ith an estimated 14 billion devices connected to

OPTIMIZE DMA CONFIGURATION IN ENCRYPTION USE CASE. Guillène Ribière, CEO, System Architect

Internet of things (IOT) applications covering industrial domain. Dev Bhattacharya

ARM Cortex STM series

Best Practises for LabVIEW FPGA Design Flow. uk.ni.com ireland.ni.com

MVME162P2. VME Embedded Controller with Two IP Slots

Microtronics technologies Mobile:

Thingsquare Technology

SECURE IMPLEMENTATIONS OF CONTENT PROTECTION (DRM) SCHEMES ON CONSUMER ELECTRONIC DEVICES

Atmel Power Line Communications. Solutions for the Smart Grid

Accellion Secure File Transfer Cryptographic Module Security Policy Document Version 1.0. Accellion, Inc.

Horst Görtz Institute for IT-Security

Standardized software components will help in mastering the. software should be developed for FlexRay were presented at

The new 32-bit MSP432 MCU platform from Texas

Side Channel Analysis and Embedded Systems Impact and Countermeasures

Secure Hardware PV018 Masaryk University Faculty of Informatics

LSI SAS inside 60% of servers. 21 million LSI SAS & MegaRAID solutions shipped over last 3 years. 9 out of 10 top server vendors use MegaRAID

Bluetooth 4.0 Solutions for Apple ios Devices. Bluegiga Technologies

Transcription:

Security in Automotive Applications Renesas Electronics America Inc.

Renesas Technology & Solution Portfolio 2

Microcontroller and Microprocessor Line-up 2010 2013 32-bit 8/16-bit 1200 DMIPS, Superscalar Automotive & Industrial, 65nm 600µA/MHz, 1.5µA standby 500 DMIPS, Low Power Automotive & Industrial, 90nm 600µA/MHz, 1.5µA standby 165 DMIPS, FPU, DSC Industrial, 90nm 242µA/MHz, 0.2µA standby 25 DMIPS, Low Power Industrial & Automotive, 150nm 190µA/MHz, 0.3µA standby 10 DMIPS, Capacitive Touch Wide Industrial Format & LCDs Automotive, 130nm 350µA/MHz, 1µA standby 1200 DMIPS, Performance Automotive, 40nm 500µA/MHz, 35µA deep standby 165 DMIPS, FPU, DSC Industrial, 40nm 242µA/MHz, 0.2µA standby Embedded Security, ASSP Industrial, 90nm 1mA/MHz, 100µA standby 44 DMIPS, True Low Power Industrial & Automotive, 130nm 144µA/MHz, 0.2µA standby 3

Microcontroller and Microprocessor Line-up 2010 2013 32-bit 1200 DMIPS, Superscalar Automotive & Industrial, 65nm 600µA/MHz, 1.5µA standby 500 DMIPS, Low Power 32-Bit High Performance, High Scalability & High Reliability Automotive & Industrial, 90nm 600µA/MHz, 1.5µA standby 165 DMIPS, FPU, DSC 1200 DMIPS, Performance Automotive, 40nm 500µA/MHz, 35µA deep standby 165 DMIPS, FPU, DSC Industrial, 40nm 242µA/MHz, 0.2µA standby 8/16-bit Industrial, 90nm 242µA/MHz, 0.2µA standby 25 DMIPS, Low Power Industrial & Automotive, 150nm 190µA/MHz, 0.3µA standby 10 DMIPS, Capacitive Touch Wide Industrial Format & LCDs Automotive, 130nm 350µA/MHz, 1µA standby Embedded Security, ASSP Industrial, 90nm 1mA/MHz, 100µA standby 44 DMIPS, True Low Power Industrial & Automotive, 130nm 144µA/MHz, 0.2µA standby 4

Enabling The Smart Society Challenge: Future in-vehicle systems will contribute to safer cars, safer roads, more efficient driving, easier maintenance and more fun as long as sufficient trust can be established in those systems Solution: This class introduces the security challenges ahead in the Automotive world and the solutions developing in the market to address them 5

Agenda What is driving security in the automotive space? Automotive devices: the secure way forward SHE and EVITA: major security initiatives in the industry Renesas solutions Future developments 6

Introduction to Automotive Security 7

Security: One of Many Automotive Applications Safety-relevant messages Emergency Brake! must be secured! (so that they can be trusted) 8

Security Breach in Cars: One Consequence Step #1: Select your car brand and model Can an engine break down just after 40,000km? Yes, if used outside of the guaranteed configuration Step #2 get more horse power or save fuel! 9

Automotive Security: Why Take it so Seriously? Electronic hobbyist customization for fun Lab / University reputation Revenue loss Brand / reputation damage Car safety at risk Heavy costs (e.g. warranty) Professional counterfeiting for money Competitor gaining knowledge & expertise Criminal organization black market, terrorist acts 10

Security-Enabled Automotive ECUs: The Vision How to protect my virtual dashboard design? How to secure radio communications? How to protect the odometer? How to protect against illegal tuning? How to secure the car diagnosis? How to secure the remote entry system and the immobilizer? Toward a distributed in-vehicle security system 11

Automotive Devices: The (Secure) Way Forward 12

Behind The Scene Electronic Control Unit (ECU) Handles a dedicated in-vehicle function (engine control, transmission, airbag, etc.) In-vehicle network Interconnects the ECUs together Different bus types (CAN, LIN, Flexray, etc.) Splits by functional domains (safety, body, ) MCU / SoC The ECU intelligence MCU: Microcontroller Unit with on-chip Flash SoC: Flash-less System-on-Chip The number of ECUs per car keeps on a steady growth How to secure this increased IP value? 13

The 3 Security Objectives of a Secure System In-vehicle network Proven Identity Confidentiality Cryptographic Services Computation power Secret keys Integrity & Authenticity Security Cryptography [Computation power + Keys] 14

Measuring The Capabilities of a Secure ECU Cryptographic element Computation capabilities Metric Flexibility OEM / Tier1 interrogation How easy can cryptographic services be integrated in the overall system? Secret keys 15

Measuring The Capabilities of a Secure ECU Cryptographic element Computation capabilities Metric Flexibility OEM / Tier1 interrogation How easy can cryptographic services be integrated in the overall system? Performance * How fast run the cryptographic services? Secret keys * The quality of random number generators (RNG) is also considered to a certain extent 16

Measuring The Capabilities of a Secure ECU Cryptographic element Computation capabilities Metric Flexibility OEM / Tier1 interrogation How easy can cryptographic services be integrated in the overall system? Performance * How fast run the cryptographic services? Secret keys Tamper resistance How secret are the secret keys? How difficult is it for an attacker to retrieve them? Those metrics are normalized with the price of the secure ECU (a low-cost BCM will target lower metrics than a high-end Gateway) * The quality of random number generators (RNG) is also considered to a certain extent 17

The Corner Stones of a Secure ECU OEMs & Tier1s Secure protocols Crypto services Standardization Bodies Firmware Flexibility Performance Tamper resistance MCU / SoC Semiconductor Vendors The MCU / SoC is the security enabler! 18

Automotive Devices: The (Secure) Way Forward Cryptographic performances Trend setters Concrete OEM & Tier1 requests W/W High Targeted area for security relevant applications Constraints Power dissipation (ma/mhz) Reliability ( AEC-Q100++ ) Cost (die size, test, etc.) Mid SoC Low MCU Low Mid High Smart Card MCU Tamper resistance 19

In-Car Security: Fostering Market Acceptance 20

Toward Security Standards in Automotive The establishment of standards is key to ensure the support of all key suppliers (Tier1s & MCU vendors) Two important initiatives in Europe are setting the grounds for W/W standardization 21

Secure Hardware Extension (SHE) portal.automotive-his.de SHE: on-chip extension within a MCU Provides a set of cryptographic services to the application layer Isolates the secret keys from the rest of the MCU resources SHE objectives Secure anchor Low cost SHE: released in April 2009 as a public specification Specification work driven by Audi Endorsed by the German OEM consortium HIS SHE: now requested or (at least) referenced by OEMs W/W 22

SHE: Brief Overview Provides the application layer with a fixed set of cryptographic services based on AES-128 Encryption & decryption CMAC generation & verification Random number generation Boot loader verification Unique device identification Stores secret keys and certificates in a dedicated NVM not accessible by the application The keys are referenced by an index (from 0 to 14) Keys are updated in the secure memory with a specific procedure 23

The EVITA Project www.evita-project.org EVITA: an EC-sponsored project Was running from 3 years, ended in November 2011 Project lead by BMW and Bosch EVITA scope: in-vehicular security hardware Enforce ECU SW protection against SW & selected HW attacks Accelerate security mechanism by HW acceleration Support ECU to ECU communication protection EVITA specification: targets both HW & SW All deliverables publicly available on the EVITA web site 24

The EVITA HSM Concept MCU (ECU) boundary EVITA HSM Secure Storage Application Core Internal RAM Internal NVM Crypto HW acceleration Application NVM Shared RAM Data Secure CPU Symmetric Crypto Engine Hash engine Bus I/F Application CPU Interrupts EVITA interface Asymmetric Crypto Engine TRNG / PRNG Counters In-vehicle bus system Source: EVITA project / Deliverable D3.2: Secure On-board Architecture Specification 25

Envisioning The Deployment of HSMs EVITA HSM full securing extra-vehicular coms Supporting strong authentication (e.g. RSA, ECC) as well as complex block ciphers @ very high data throughputs EVITA small EVITA medium EVITA full EVITA small EVITA medium EVITA small EVITA small EVITA medium EVITA HSM medium securing internal coms, enforcing IP protection Supporting complex block ciphers @ high data throughput Supporting signature verification in SW (e.g. RSA) EVITA HSM small securing critical sensors / actuators Supporting simple block ciphers, low cost modules Source: EVITA project / Deliverable D3.2: Secure On-board Architecture Specification 26

Security in Automotive: Picturing the Trend 27

Security-enabled Automotive MCU Master in the system: has unrestricted accesses to all MCU resources Main CPU Application Domain New master in the system: controls a (small) set of specific but exclusive resources for security relevant tasks Secure Domain Secure HW Security Services Secret Data Application Services Configuration / Parameter Files External Memory I/F Test / Debug I/F Communication I/F 28

Application & Secure Domains Application Domain Secure Domain Sense Encrypt / Decrypt Dedicated HW for efficient cryptography Actuate Verify Integrity Isolation of secret data Parallel processing Communicate Authenticate Customized services 29

Potential use Case: Boot Loader Verification Application Domain Initialize the application environment Initialize the communication stack Main application loop HW Reset Execution time Secure Domain Calculate hash value of boot loader (H) Verify boot loader signature (H ) No H == H? Yes Boot loader verification failed: break the application loop Boot loader verification successful: prepare for next security service Enables systematic background check with no impact on application domain timings 30

Potential use Case: Encrypted CAN Messages Application Domain Main application loop Process the message received Prepare a message to send Execution time IRQ IRQ Secure Domain Wait for a CAN message Decrypt the mailbox Encrypt the mailbox Send the CAN message Secret keys are never seen in the application domain 31

In-Vehicle Security: Renesas Solutions 32

Security in Automotive: Renesas Solutions The next generation of Renesas Automotive devices integrates a scalable range of security peripherals to support existing and emerging security requirements Security Peripherals for MCU with embedded Flash Security Peripherals for Flash-less SoC ICU-S ICU-M2 ICU-M3 Crypto Engine (low- to mid-end) (mid- to high-end) Low power Low cost Flexibility and performances High-performance (stream ciphers) 33

Security-Enabled Automotive MCUs * : Renesas ICU Concept * MCU: Microcontroller Unit with embedded Flash 34

ICU: Intelligent Cryptographic Unit To tackle the need for security in automotive applications, Renesas introduces a dedicated MCU peripheral to support different security services access to MCU internal resources Cryptographic Accelerators Interfaces to host ICU Control System Resources ICU Memory (non-volatile) signals to MCU system control internal reset, interrupt controller, etc. 35

ICU Types Cryptographic Capabilities SHE compliant IP ICU-S EVITA HSM type-of IP ICU-M Slave unit Private key cryptography Control logic Master unit Private key cryptography Public key cryptography Dedicated CPU IP Complexity & Cost 36

ICU-S Block Diagram (Simplified View) Inside view of the MCU INTC DMA ICU-S INT_DO INT_DI DMARQ_DO DMARQ_DI Data Flash ICU-S command access path from CPU APB I/F Finite State Machine (FSM) SHE ICU Exclusive Data Flash Flash Control RAM AES TRNG Data Flash access path from CPU 37

ICU-S Overview APB slave peripheral Commands and data transferred by the CPU or a DMA Polling or interrupt handling possible Keys and certificates stored in a dedicated Data Flash area Can be read, written and erased by the ICU-S only Fail-safe mechanism in case of power fail during key update CPU or ICU-S access to Data Flash arbitrated by ICU-S Device dependent data initialized by Renesas before shipment Unique Identification Number, SECRET_KEY ICU-S operation complies to the SHE specification v1.1 38

ICU-M Block Diagram (Simplified View) INTxx internal reset system clock Inside view of the MCU Config Flash JTAG control I/F APB I/F ICU-M TRNG INTC SYSCNT RST RH850 Core CLK RAM Master I/F Data Flash ICU Exclusive Data Flash Flash Control R R R/W Fetch Shared System RAM ICU-M Commands & Data R/W R/W ICU Exclusive Code Flash System Resources (peripheral, ext. I/F, ) CEG* co-processor AES Watchdog Timer Interval Timer Code Flash * Optional CEG = Cryptographic Engine 39

ICU-M Overview Master peripheral: acts autonomously Has access to (almost) all internal MCU resources Programmable: can manage any type of security services Secure code and secret data stored in dedicated Flash areas Can be read, written and erased by the ICU-M only Smart Data Flash arbitration Powerful: embeds high-end cryptographic co-processors 40

ICU-M: First Performance Estimations* AES encryption (@ 50MHz) Function Test Latency / 32-bit word Estimated throughput AES (1) ECB / CBC Read from far memory, encrypt and write back 5 clocks ~8 MB/s *based on simulation Hashing (@ 50MHz) (1) AES engine raw throughput ~50MB/s Function Test Latency / 32-bit word Estimated throughput SHA-1 (SW only) Hash over Flash memory (irom) 5 clocks ~1.5 MB/s AES-based hash (HW+SW) Hash over Flash memory (irom) 5 clocks ~3.5 MB/s RSA signature generation (@ 66MHz) Function Test Estimated timing RSA 2048 bits Signature generation (w/o CRT (2) ) ~180ms (3) RSA 2048 bits Signature generation (w/ CRT (2) ) ~55ms (3) RSA 2048 bits Signature verification (e=2 16 +1) ~1.4ms (3) (2) CRT: Chinese Reminder Theorem (3) As fast as a Pentium III @ 800MHz (source: Secure Broadcast Communication by A. Perrig) 41

ICU Types And Variants (Summary) ICU-S ICU-M2 ICU-M3 ICU Control FSM CPU Code + Flash RAM: 24KB CPU Code + Flash RAM: 64KB System Peripherals TRNG TRNG TIMER WDT TRNG TIMER WDT Cryptographic Accelerators AES AES AES CEG System Interfaces slave slave master slave master Accessible Resources Data Flash (1KB) All on-chip resources All on-chip resources Tamper Resistance HW isolation of the ICU-S Data Flash HW isolation of the ICU-M Code & Data Flash HW isolation of the ICU-M Code & Data Flash Compatibility SHE EVITA small SHE EVITA med. SHE EVITA full CEG = Cryptographic Engine 42

ICU in RH850 Targeting all applications Ultimately available in all device families 43

Security in High-end Automotive SoC * : a Glimpse @ Renesas CryptoEngine * SoC: System-on-Chip without embedded Flash 44

R-CAR-H1: High-end Automotive SoC 9 x 32-bit Timer Cap/Comp, PWM 7 x 24-bit PWM programmable width WDT 4 x SD 832pin FCBGA; 0.8mm pitch GPS BaseBand (option) Media Engine 2 x IMP-X3 (option) 32KByte RAM SH-4A 2 x CAN 32 Message Buffers IEBus MLB (MOST150) 6-Pin I/F Ethernet MAC H/W HD video decoder (768KB RAM) 4 x Audio DSP (2xSPU2) Digital audio router & SRC 4 x IMR-X image renderer SH-4A for Media H/W control MMC 2 x USB Host (480Mbps with PHY) USB Host/Funct (480Mbps with PHY) Video Display: WXGA 4xRGB-in & IMR 2xRGB-out JTAG/Coresight 4 x Cortex A9 32KB i$, 32KB d$ Neon/FPU 1GHz 1MB L2$ SGX 543MP2* @250MHz 2D/3D Graphics Engine 2 x 4 Pipelines/ OpenVG/GL DMA 32KByte RAM DDR3-1066 SDRAM 2x 1GB, 2x 32-bit Data PCIe V2.0 (1 lane) SATA PATA 9 x I²S 4 x I²C (400Kbps) 3 x HSPI (26.6Mbps) 45 8 x UART 6 x UART (1Mbps) 2 x HUART (3Mbps) Gyro ADC IF Image recognition engine HMI & 3D maps 83MPoly/s; 2500MPix/s; 16GFlop/s R-GP2 map renderer Dedicated cryptographic unit to provide high-end security services CryptoEngine External Bus I/F/PATA GPIOs *Note: IP from Imagination Technology 45

Outlook on Future Developments 46

Future: More Tamper Resistance Security is about being ahead of attacker capabilities HW isolation of secret Flash areas is a first level of security Other protections mechanisms are available in Renesas IP pool to countermeasure many kind of security attacks Multiple circuits have designed within the last 15 years to counter invasive and non-invasive attacks in smart card ICs Careful assessments are required before integration into automotive MCUs Relevance vs. technical constraints Relevance vs. targeted security level Cost impact Regulations / enforcement of security in safety-relevant applications 47

Future: Dedicated HW Acceleration For C2X IEEE 1609 Wireless Access in Vehicular Environment (WAVE) IEEE 1609.2 security protocols Message authentication method selected: ECDSA ECDSA throughput requirements: Existing solutions today? FPGA-based @ very high freq. Renesas intends to develop a low-power solution to achieve several 100s of ECC signature verifications per second Objective: integration into power-efficient automotive device 48

Enabling The Smart Society Challenge: Future in-vehicle systems will contribute to safer cars, safer roads, more efficient driving, easier maintenance and more fun as long as sufficient trust can be established in those systems Solution: Starts building trusted Automotive systems with Renesas solutions today! 49

Questions? 50

Renesas Electronics America Inc.