for Vehicle Cyber Security



Similar documents
Paradigm Change of Vehicle Cyber Security

The relevance of cyber-security to functional safety of connected and automated vehicles

Automotive Ethernet Security Testing. Alon Regev and Abhijit Lahiri

Cybersecurity And The Automotive Industry

Security risk analysis approach for on-board vehicle networks

Automotive and Industrial Data Security

Industrial Security for Process Automation

Developing software for Autonomous Vehicle Applications; a Look Into the Software Development Process

Security in Vehicle Networks

GE Oil & Gas. Cyber Security for NERC CIP Versions 5 & 6 Compliance

- Toward Trustful IoT Life -

Vehicular Security Hardware The Security for Vehicular Security Mechanisms

Automotive Software Development Challenges Virtualisation and Embedded Security

Symphony Plus Cyber security for the power and water industries

A Concise Model to Evaluate Security of SCADA Systems based on Security Standards

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Advanced Electronic Platform Technologies Supporting Development of Complicated Vehicle Control Software

Cyber Security. BDS PhantomWorks. Boeing Energy. Copyright 2011 Boeing. All rights reserved.

Cyber Security Seminar KTH

Lecture Embedded System Security A. R. Darmstadt, Introduction Mobile Security

NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA

Utility-Scale Applications of Microgrids: Moving Beyond Pilots Cyber Security

CTR System Report FISMA

Hardware Security Modules for Protecting Embedded Systems

Challenges for the European Automotive Software Industry

Connected and Automated Vehicles and the Cybersecurity Threat

PEDESTRIAN AND BICYCLE ACCIDENT DATA. Irene Isaksson-Hellman If Insurance Company P&C Ltd.

An Overview of Information Security Frameworks. Presented to TIF September 25, 2013

External Supplier Control Requirements

future data and infrastructure

Nuclear Security Requires Cyber Security

Supplier Security Assessment Questionnaire

Identification of Authenticity Requirements in Systems of Systems by Functional Security Analysis

Cyber Risk Mitigation via Security Monitoring. Enhanced by Managed Services

Car Connections. Johan Lukkien. System Architecture and Networking

Information Security Awareness Training

Threat Modeling: The Art of Identifying, Assessing, and Mitigating security threats

SCADA and Security Are they Mutually Exclusive? Terry M. Draper, PE, PMP

CycurHSM An Automotive-qualified Software Stack for Hardware Security Modules

Pervasive Computing und. Informationssicherheit

Thatcham Research The Insurers Automotive Research Centre

Document ID. Cyber security for substation automation products and systems

/ gridsecurity Cyber Security Global solutions for energy automation Answers for infrastructure and cities.

Emerging threats for the healthcare industry: The BYOD. By Luca Sambucci

Who s Doing the Hacking?

Oil & Gas Industry Towards Global Security. A Holistic Security Risk Management Approach.

Mitigating Server Breaches with Secure Computation. Yehuda Lindell Bar-Ilan University and Dyadic Security

The introduction covers the recent changes is security threats and the effect those changes have on how we protect systems.

Safety and security related features in AUTOSAR

Vehicular On-board Security: EVITA Project

In the pursuit of becoming smart

Single Sign-On Secure Authentication Password Mechanism

This is a preview - click here to buy the full publication

Security Threats on National Defense ICT based on IoT

Encyclopedia of Information Assurance Suggested Titles: March 25, 2013 The following titles have not been contracted.

Building The Human Firewall. Andy Sawyer, CISM, C CISO Director of Security Locke Lord

IT Networking and Security

EEI Business Continuity. Threat Scenario Project (TSP) April 4, EEI Threat Scenario Project

TNC is an open architecture for network access control. If you re not sure what NAC is, we ll cover that in a second. For now, the main point here is

Cyber Security for NERC CIP Version 5 Compliance

Claes Rytoft, ABB, Security in Power Systems. ABB Group October 29, 2009 Slide 1

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Risk Management, Equipment Protection, Monitoring and Incidence Response, Policy/Planning, and Access/Audit

Cyber Security: Beginners Guide to Firewalls

TASK TDSP Web Portal Project Cyber Security Standards Best Practices

ISA CERTIFIED AUTOMATION PROFESSIONAL (CAP ) CLASSIFICATION SYSTEM

References NYS Office of Cyber Security and Critical Infrastructure Coordination Best Practices and Assessment Tools for the Household

An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID Abstract

SPARKS Cybersecurity Technology and the NESCOR Failure Scenarios

Course Outline. Managing Enterprise Devices and Apps using System Center Configuration ManagerCourse 20696B: 5 days Instructor Led

Crucial Role of ICT for the Reinvention of the Car

Cyber Security Beginners Guide to Firewalls A Non-Technical Guide

Data Security Concerns for the Electric Grid

GE Measurement & Control. Cyber Security for Industrial Controls

Effective Defense in Depth Strategies

How To Make A Car A Car Into A Car With A Car Stereo And A Car Monitor

8/27/2015. Brad Schuette IT Manager City of Punta Gorda (941) Don t Wait Another Day

Breakthrough Cyber Security Strategies. Introducing Honeywell Risk Manager

A PRACTICAL APPROACH TO INCLUDE SECURITY IN SOFTWARE DEVELOPMENT

Smart Grid Security: A Look to the Future

Cyber Security Presentation. Ontario Energy Board Smart Grid Advisory Committee. Doug Westlund CEO, N-Dimension Solutions Inc.

Don t Fall Victim to Cybercrime:

Testing the Internet of Things

CHANCES AND RISKS FOR SECURITY IN MULTICORE PROCESSORS

The Importance of Information Technology (IT) for Transportation Security

OCIE CYBERSECURITY INITIATIVE

Security Policy JUNE 1, SalesNOW. Security Policy v v

U.S. Department of Homeland Security s National Cybersecurity and Communications Integration Center

Transcription:

Guidelines for Vehicle Cyber Security Hiro Onishi Alpine Electronics Research of America, Inc. honishi@alpine la.com 2013 Alpine Electronics, Inc. Not for commercial distribution. 1

INDEX 1. Cyber Physical System Risks 2. Vehicle Cyber Risks Vulnerabilities in maintaining vehicle cyber security 3. Vehicle Cyber Security Approaches Risk analysis Concept of system security 4. Vehicle Cyber Security Guidelines European project EVITA Japanese agency (IPA) sguide SAE committee s approach 5. Summary 2

1. Risks for Cyber Physical System Case 1 Davis Besse Nuclear Plant, Ohio (Jan. 25, 03) 16:00: Noticed network slow down 16:50: Safety Parameter Display System (SPDS) crashed 17:13: Plant process computer crashed (had analog backup) Reference: Edward Fok. (Dec. 7, 11) Introduction d i to Cyber Cb Security Issues for Transportation [Web seminar] 3

1. Risks for Cyber Physical System Case 2 Air plane manipulation (Apr. 13, US) + Security consultants pointed out: They were able to manipulate airplane s navigation system with android application *. + 4 days later, Dept. of Transportation denied the possibility **. Reference: *: ~ WIRED www.wired.co.uk/news/archive/2013 04/11/android plane hijack **: ~ Information Weekly www.informationweek.com/security/application security /faa dismisses android app airplane takeo/240152838 4

1. Risks for Cyber Physical System Case 3 Lodz, Poland (Jan. 08) 4 light rail trams derailed, 12 people injured Tool used: Converted television IRremote Exploit: Locks, disabling track changes when vehicle presented were not installed Reference: Edward Fok. (Dec. 7, 11) Introduction to Cyber Security Issues for Transportation [Web seminar] Pictures: Courtesy of EUROPICS 5

1. Cyber Physical System Risks Currently, Cyber physical b h i lsystem risks ik can be a serious social concern, as it may impact the following: + (Nuclear / chemical) plants + Military facilities and weapons + Government facilities and systems + Transportation (Trains, Airplanes, Vehicles, Ships, etc) + Utilities i (Electric grid, id Water line, etc) + Finance (ATM, Ticket machines, etc) + Medical / Health related equipment and others 6

2. Vehicle Cyber Risks Vehicles can be targets of cyber attacks, because + Vehicles can be used to inflict serious bodily injury + Vehicles are high value items + Vehicles are frequently parked in un secured locations + Vehicle could be targeted for anti social activity (ex. terrorism) Stop/control massive number of vehicles Cause massive panic through false information References: ~ A. Weimerskirch, Do Vehicles Need Data Security? SAE World Congress, Detroit, MI, Apr. 11 ~ Information Technology Promotion Agency. (Apr. 11) Movements of Vehicle Cyber Security, (Japanese) 7

2. Vehicle Cyber Risks Cruise control ABS Car Telephone?? Air Bag Telematics V2I communication Navigation ACC V2V communication Emergency call LDW Autonomous driving electronics based Modern cars can come with up to 80 CPUs, 2 miles of cable, several hundred MB of software, and 5 in vehicle networks, Vehicle is NO longer just a Mechanical System Reference: A. Weimerskirch ESCRYPT, Security Considerations for Connected Vehicles, in SAE Government and Industry Meeting, Washington DC, Jan. 12 8

2. Vehicle Cyber Risks Internet Smart-phone Hacker Music-player Computer Virus or malware carried in smart phones or music players can easily invade automotive electronics 9

2. Vehicle Cyber Risks Special risks CASE 1 Communication for crash avoidance Limited time (100ms order) CASE 2 Vehicles are only able to communicate externally through mobile phones Base station Vehicle Vehicle A Mobile phone Vehicle ce B 10

2. Cyber Risks for Vehicle Additional vulnerabilities, compared to computer/internet t tsecurity. VULNERABILITY 1: Limited vehicle external connectivity Difficulty in updating security software Difficulty in monitoring automotive electronics status VULNERABILITY2: Limitedcomputational performance, Due to high endurance and long vehicle life cycle (10 years) Vulnerability to compete against hacker s PC VULNERABILITY 3: Real time operation OEM VULNERABILITY 4: Vehicle consists of various components/parts. Large g industry pyramid from suppliers to OEM VULNERABILITY 5: Unpredictable attack scenarios and threats VULNERABILITY 6: Hazard to drivers and passengers lives Tier 1 Tier 2 Parts suppliers Reference: ~ Information Technology Promotion Agency (of Japanese government). (Apr. 11) 10 report: Movements of Vehicle Cyber security, (Japanese) ~ A. Weimerskirch, Security Considerations for Connected Vehicles, in SAE Government and Industry Meeting, Washington DC, Jan. 12 ~ P. Kleberger, T. Olovsson and E. Jonsson, "Security aspects of the in vehicle network in the connected car, Intelligent Vehicles Symposium (IV), 11 IEEE, vol., no., pp.528 533, 5 9 Jun. 11 11

3. Vehicle Cyber Security Approaches Additional complicated vulnerabilities, compared to computer/internet security Industry expects both proper guidelines & competitive approaches. To dfi define proper guidelines, well defined risk analysis is required. 12

3. Vehicle Cyber Security Approaches Proper security requires well defined riskanalysis. Vehicle cyber security is vulnerable, but Risk = Vulnerability Inputs: Risk=function(Vulnerability, Hackers motivation/skills, Hazard) Vulnerability: Vulnerability of system security Hackers motivation/skills: Adversary ROI Investment /risk /return Hazard: aad Magnitude of hazards, when security is compromised. Reference: ~ D. Etue (SafeNet), web seminar Cyber Security in Highly Innovative World, (Jul, 13) 13

3. Vehicle Cyber Security Approaches Risk analysis: Hackers motivations/skills New types Aims Hacker Type Target Approaches Type (potential) ) Skill Financial Financial, Harm to individual Harm to individual Damage to community Vehicle, Components/parts Driver, Driver s property Driver Community Classic: Steal vehicle, components or parts Acquire driving log or history and physically attack drivers or steal/damage drivers property Manipulate single or small number of vehicles to cause (severe) accidents Manipulate large number of (e.g. police) vehicles to cause (severe) accidents and damage to community Individual, Group Individual, Group Individual, Group Group, Organization (i.e. terrorism) Low, Medium Medium Medium, High High + In general, the person who invents a tool to break security possesses a much higher skills than the person who is only using the tool. e.g.: the case of immobilizer cutter + Inside hackers possess deeper knowledge about the security mechanism. References: ~ A. Weimerskirch, Do Vehicles Need Data Security? SAE World Congress, Detroit, MI, Apr. 11 ~ Information Technology Promotion Agency. (Apr. 11) Movements of Vehicle Cyber Security, (Japanese) ~EVITA deliverable D2.3 Security requirements for automotive on board networks based on dark side scenarios ( 09) 14 14

3. Vehicle Cyber Security Approaches * Risk analysis: Hazard assessment ISO 26262(Automotive Functional Safety) ) Functions CD/DVD control Sample of hazard assessment Vehicle center console Sample Malfunctions CD/DVD is not working Erroneous guidance, Navigation e.g. opposite direction on freeway Emergency call is not placed at accident Rearview camera When backing up, image of rear view (Monitoring) camera freezes (shows old image) Air conditioner Heater is not working during the winter in Canada Exposure Controllability Severity ASIL E3 C1 S1 QM E2 C2 S3 Emergency Call E1 C3 S3 A E3 C2 S2 A Control E3 C3 S3 Turn signal Shows signal activation in cluster, In cluster panel though actual signal is not working E1 C2 S3 ** Power window Unwanted window closing E2 C2 S3 A Air bag Fault activation during driving E4 C3 S3 A C QM D Reference: *: H. Onishi, Approach for Vehicle Cyber Security with Functional Safety Concept in SAE World Congress, Detroit, MI, Apr. 13 **: R. Hamann et al., ISO 26262 Release Just Ahead: Remaining Problems and Proposals for Solutions" in SAE World Congress, Detroit, MI, Apr. 11 15

3. Vehicle Cyber Security Approaches Concepts of system security + 6 security phases should be covered by both process/management and technologies ~CIP(Critical Infrastructure Protection)byNERC(North American Electric Reliability Corporation) * 6 phases Analysis and Assessment Remediation Indications and Warnings Mitigation ii i Incident Response Reconstitution + New concept: Trustworthy (computing)design approaches ** Initialdesignsystem system in consideration of Security, Privacy, Reliability and Business Integrity. e.g. Brake should be reliable Rf References: *: http://en.wikipedia.org/wiki/critical_infrastructure_protection **: Craig Mundie (Microsoft CTO and Senior VP), ( 02) 16

4. Vehicle Cyber Security Guidelines Guidelines samples for cyber physical systems Guideline Name Publisher IEC62443 (Industrial network & system security) Domain Industrial system Contents Process Technology Description Cover broader industrial systems NIST 800 61 Guide to Industrial Control System security CIP (Critical Infrastructure Protection) NIST NERC PC/internet & Industrial system Industrial system PC/internet & Industrial system (mainly) (part of) Handle incidents (including attack analysis, recovery, etc) Cover broader industrial systems, from management & technical sides Cover broader critical infrastructures, Considering, 6 phases (e.g. mitigation, recovery) EVITA deliverables Vehicle information security guide EU agency IPA Vehicle Vehicle Outputs from research project J3061(Cyber security Guidebook for Cyber Physical Automotive Systems) ) ** Vehicle Under development References: *: www.nerc.com/pa/stand/pages/cipstandards.aspx **: www.sae.org/servlets/works/documenthome.do?comtid=tevees18&docid=j3061&inputpage=docdetails 17

4. Vehicle Cyber Security Guidelines European project EVITA Created possible attack trees for selected use cases (18 use case for 6 groups). Attack goal Attack methods Sample of attacktree Compromise driver s privacy Reference: ~EVITA deliverable D2.3 Security requirements for automotive on board networks based on dark side scenarios ( 09) 18

4. Vehicle Cyber Security Guidelines European project EVITA Provide security requirements, based on the identified attack trees. Sample of security requirements Privacy/confidentiality Reference: ~EVITA deliverable D2.3 Security requirements for automotive on board networks based on dark side scenarios ( 09) 19

4. Vehicle Cyber Security Guidelines European project EVITA Provide reference architecture including HSW(Hardware( Security Module) ) + Development of Hardware Security Modules deployed with ECUs Key protection Trusted computing base Secured Storage Cost effective + In car cryptographic protocols to secure ECU ECU and sensor communication + Software framework integrating authentication, encryption & access control, etc Reference: ~ B. Weyl, et al., The EVITA Project: Securing the Networked Vehicle in escar (Dresden, Gemany 11) 20

4. Vehicle Cyber Security Guidelines Japanese agency (IPA) s guide + Covers whole life cycle of vehicle ( Planning ~ Disposal ). + Covers all players related to vehicle life cycle. Information Technology Promotion Agency Reference: ~ http://www.ipa.go.jp/files/000033402.pdf 21

4. Vehicle Cyber Security Guidelines Japanese agency (IPA) s guide Vehicle system model of IPA guideline Categorized functions in 3 groups Reference: ~ http://www.ipa.go.jp/files/000033402.pdf 22

4. Vehicle Cyber Security Guidelines Japanese agency (IPA) s guide Threats and countermeasures (based on vehicle system model) : Direct threats thru physical I/O : Indirect threats thru vehicle bus :Potentialeffective countermeasures Reference: ~ http://www.ipa.go.jp/files/000033402.pdf 23

4. Vehicle Cyber Security Guidelines SAE Electrical system security committee s approach Automotive Security Guidelines & Risk Management Taskforce (under Vehicle Electrical System Security committee ) + Creates Cyber security Guidebook for Cyber Physical Automotive Systems Complies with Risk Methodology in ISO 26262 Functional Safety Standard Contains automotive cyber security framework and processes Evaluates Threat Analysis and Risk Assessment (TARA) methods Follows simple approach to allow effective implementation across the automotive industry Contains elements of existing industry security standards Provides definitions, Acronyms and sample templates + Expected to be completed by Mid 2014 Reference: ~L. Boran (SAE Committee Chair) Automotive Cyber Security, escar (Nov, 13, Frankfurt, Germany) 24

5. Summary Vulnerabilities in vehicle cyber security: Limited vehicle external connectivity Limited computational performance Real time operation Various components/parts from various suppliers Unpredictable attack scenario and threats Hazardto driversand passengers lives Proper security requires well defined riskanalysis Risk depends on hackers motivation/skills, magnitude of hazard and vulnerability of security. Many guidelines have been issued or are under development for the automotive industry. EVITA(E safety vehicle intrusion protected applications) guideline IPA(Information ( Promotion Agency) guideline SAE guideline under development 25

Thank you for your attention!! Hiro Onishi Alpine Electronics Research of America, Inc. honishi@alpine la.com Tel: +1 310 783 7281 Slide design: Mari Hatazawa mhatazawa@alpine la.com l 26