Connected and Automated Vehicles and the Cybersecurity Threat



Similar documents
Cybersecurity And The Automotive Industry

STATEMENT THE ALLIANCE OF AUTOMOBILE MANUFACTURERS APRIL 14, 2016 PRESENTED BY:

Statement of Steve Douglas Senior Director of Environmental Affairs,

Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk

The relevance of cyber-security to functional safety of connected and automated vehicles

Overview of TPMS TPR Application Release

Science Fiction to Reality: The Future of Automobile Insurance and Transportation Technology

Light-Duty Automotive Technology, Carbon Dioxide Emissions, and Fuel Economy Trends: 1975 Through Executive Summary

TRW Automotive TRW Automotive Profile 2012

Existing safety technology is the driverless vehicle already here? Matthew Avery Safety Research Director

Frost & Sullivan Cybersecurity Presentation

How To Buy A Car In Chile

2014 Manufacturer Volume Status. Large- and Intermediate-Volume Manufacturer 2014 Vehicle Production Delivered for Sale in OR

hub bearing and why is it critical to your safety? A: See inside. It could save your life.

Automotive Companies Save Costs, Gain Advantages with Red Bend s FOTA. Case Study

Connected Car Forecast: Global Connected Car Market to Grow Threefold Within Five Years

Quantifying the risk of the connected and autonomous vehicle

Executive Summary On Target Marketing On-Demand Marketing from Payment Alliance International (PAI)

Information Technology in the Automotive Aftermarket

Auto Insurance in the Era of Autonomous Vehicles

How To Reprogram A J2534 With An Obd Ii With A J 2534 With A Power Control (J2534) With A Usb Cable And A Power Remote (J 2534)

Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute

All replacement hub units are not created equal. What you don t know can cost you time, money, and customers.

An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID Abstract

Cyber-Security in the Connected Car Age

Security risk analysis approach for on-board vehicle networks

JEREMY SALINGER Innovation Program Manager Electrical & Control Systems Research Lab GM Global Research & Development

Automotive and Industrial Data Security

Automated Vehicles and the Impact on the Insurance Industry. Casualty Actuarial Society Alyce Chow Matt Antol July 15th, 2014

U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE

New Jersey Motor Vehicle Warranty Act

2012 SuRe (Supplier Relationship) index

Automotive Monitor. August 2014 Automotive Monitor

New car dealerships (June 2013) (see Attachment 1 Map of existing auto dealerships in Bellevue).

Greenhouse Gas Emission Standards for Light-Duty Vehicles

2016 European Anti-Hacking Technology for Connected Cars New Product Innovation Award

Supported by BMW Group, ESG, HUF & Vodafone Group. Innovation & Security for Connected Cars. White Paper INNOVATIONEN INSTITUT

How Clean is Your Car Brand?

Security in Vehicle Networks

Autonomous Vehicle Technologies for Passenger and Freight Mobility

RETHINKING CYBER SECURITY Changing the Business Conversation

Auditing After a Cyber Attack JAX IIA Chapter Meeting Cybersecurity and Law Enforcement

TNCs Autonomous Vehicles (AVs) & California's Low Cost Auto Insurance Program

CO 2. emissions performance of car manufacturers in 2010

INTELLIGENT TRANSPORTATION SYSTEMS. Vehicle-to-Vehicle Technologies Expected to Offer Safety Benefits, but a Variety of Deployment Challenges Exist

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

Autonomous Vehicles & the Insurance Industry - Mike Stienstra, FCAS MAAA

AAA AUTOMOTIVE ENGINEERING

Cybersecurity: Protecting Your Business. March 11, 2015

Extended Warranties for New and Used Cars in Europe

In-Vehicle Infotainment. A View of the European Marketplace

POLICIES TO MITIGATE CYBER RISK

Longitudinal and lateral dynamics

Corporate Finance in the Automotive Arena. - Navigating the next decade. of auto industry transformation -

SGS GLOBAL WARRANTY SURVEY 2014 SURVEY OVERVIEW

How To Deal With A Converged Threat From A Cloud And Mobile Device To A Business Or A Customer'S Computer Or Network To A Cloud Device

The Growing Role of Electronics in Automobiles A Timeline of Electronics in Cars June 2, 2011

Automotive: Part III Internet s Effect on Advertising

2011 Ford Key & Prox

2016 North American Over-the-air Update Enabling Technology Leadership Award

Cyber Risks in the Boardroom

Rovaniemi. Oulu. Oulu

ANSYS SCADE Model-Based Development Solutions for AUTOMOTIVE. Critical Systems & Software Development Solutions

STATE OF THE U.S. AUTOMOTIVE INDUSTRY: Investment, Innovation, Jobs and America s Economic Competitiveness Investment, Innovation, Jobs and America s

for Vehicle Cyber Security

Adopting a Cybersecurity Framework for Governance and Risk Management

December 2013 Copyright 2013 GSM Association

Technology.Transfer.Application.

Storage Cloud Infrastructures

AN INTEL COMPANY WIND RIVER AUTOMOTIVE SOLUTIONS

Introduction CHAPTER 1

TIRE PRESSURE MONITORING SYSTEM

Secure software updates for ITS communications devices

Ohio Smart Mobility Initiative. Carla Bailo October 8, 2015

TomTom HAD story How TomTom enables Highly Automated Driving

cyberr by e-management The Leader in Cybersecurity Risk Intelligence (RI) Cybersecurity Risk: What You Don t Know CAN Hurt You!

Tomorrow Today Safe-Driving Technologies of Tomorrow, Here Today

Automotive Software Development Challenges Virtualisation and Embedded Security

Auto Insurers Adventure in US Highway Safety

THE SECURITY EXECUTIVE S GUIDE TO A SECURE INBOX. How to create a thriving business through trust

CONSULTING IMAGE PLACEHOLDER

Security Breach: 10 Industries Impacted

Essentials of Management Information Systems

Cybersecurity Report on Small Business: Study Shows Gap between Needs and Actions

Transcription:

Connected and Automated Vehicles and the Cybersecurity Threat How the Industry is Responding Dr Andrew Brown, Jr, PE, FESD, FSAE, NAE Vice President & Chief Technologist CAR Breakfast Briefing Series February 17, 2015 Livonia, Michigan

Agenda Delphi Overview The Road Toward Automated Driving Why Cybersecurity Matters? What Needs To Be Addressed? Delphi s Approach 2 Delphi Confidential

Delphi s Global Team At the center of technology innovation 19,000 engineers and scientists $17B 2014 revenue $17 B in Research & Development 126 manufacturing sites 15 major global technical centers 160,000 people in 32 countries 3 Delphi Confidential

Delphi Changing the way transportation is delivered In the next 10 years: 50% more vehicles on the road Stricter fuel economy regulations @ 545 MPG by 2025 Automated driving reality And, Delphi technologies are creating a world with: 50% fewer accidents 50% less emissions 100% better fuel economy 1000% more computational power in the vehicle 4 Delphi Confidential

The Road Toward Automated Driving First Engine Speed Governor Cloud Connectivity Prometheus DARPA Grand Challenge Collision Imminent Automated Project Sensor Fusion Steering Intervention Cruise Transmissions Radar ACC with Autobraking V2X Control 1788 1945 1939 1952 1987 1980 1994 2000 2010 2020 World s Fair Dickmann s Robot Autonomous Vehicle Car Demo Automated Highway System ACC Stop and Go Pedestrian Detection Autobraking Semi-autonomous Urban Steering/Braking Sensing technology and electronic controls have been in development for decades, forming the building blocks of autonomous driving 5 Delphi Confidential

What s next? Convergence of technologies Today 2015 2020 2025 Conditional automation Safety eco-system Fully autonomous Assisted automation Increasing personalization Smartphone integration Full cloud connectivity Internet of everything 6 Delphi Confidential

Why Cybersecurity Matters? Malicious cyber activity could generate costs comparable to car crashes, piracy, pilferage, or drug trafficking Source: The Economic Impact of Cybercrime and Cyber Espionage Mc Afee Center for Strategic and International Studies July 2013 7 Delphi Confidential

Why Cybersecurity Matters On December 2, 2013, Senator Edward J Markey [D MA] sent letters to 20 major automobile manufacturers requesting information about how consumers are protected from cyber attack or unwarranted violations of privacy Letters sent to Volvo, Volkswagen, Toyota, Tesla, Subaru, Porsche, Nissan, Mitsubishi, Mercedes Benz, Mazda, Lamborghini, Jaguar, Hyundai, Honda, GM, Ford, Chrysler, BMW, Audi, and Aston Martin 2014: Data security is the name of the game across all industries April: the "Heartbleed" flaw was made public (1/2-million servers exposed; 50 million Android phones vulnerable) June: AT&T confirmed insider data breach occurred in April July: JP Morgan revealed data breach affected 76 million households and 7 small businesses August: celebrity photo hack November: Sony Pictures Entertainment hack December: More than 46 million North American Snapchat users phone numbers and usernames leaked online 2015: Health insurer Anthem hit by hackers Breach gets away with names, social security numbers of customers, employees 8 Delphi Confidential

Why Cybersecurity Matters? Even low-end cars have embedded more than 30-50 so-called Electronic Control Units (ECUs) that talk over Controller Area Networks (CANs) Modern high-end car features around 100 million lines of code, and this number is planned to grow to 200-300 millions in the near future with the advents of Connected Vehicle and Automated Driving A F-22 fighter jet is less than 2 million, a Boeing 787 is around 14 million and even a cumbersome operating system such as Windows Vista is only 50 million Sources: (1) Information is Beautiful http://wwwinformationisbeautifulnet/visualizations/million-lines-of-code/ (2) Andrea Busnelli June 26, 2014 https://wwwlinkedincom/pulse/20140626152045-3625632-car-software-100m-lines-of-code-and-counting 9 Delphi Confidential

What Needs To Be Addressed? Scope of Problem(s) Prevention of taking control of in-vehicle electronic systems via wireless or wired means Related Areas Security of mobile media information such as copyrighted video and audio being used in the car Security of in-vehicle parameters such as engine calibrations, odometer, etc Accuracy and validity of in-vehicle parameters such as vehicle speed Will involve Functional Safety ISO 26262 Integrity of emissions-control systems Detection of counterfeit ECUs Heightened Threats Most of today s vehicle networks were not intended to be secure Personal Device Integration Telematics Cloud Access V2X Automated Driving 10 Delphi Confidential

What Needs To Be Addressed? Automotive Initiatives Cyber security is a global concern and is a real and growing threat for the automotive industry Like other industries, the automotive industry would benefit from a concerted, industry-wide approach SAE is proposing a shared, secure and common platform for the automotive industry to communicate, analyze, exchange, and share information on imminent cyber security threats SAE International, through its Industry Technologies Consortia, is assembling a global consortia of major automotive manufacturers to define the need, scope and operational requirements The Alliance of Automobile Manufacturers and the Association of Global Automakers are spearheading the formation of an ISAC (Auto-ISAC) to help share information about cyber threats Source: SAE International, CYBER SECURITY & THE AUTOMOTIVE INDUSTRY, 2014 SAE World Congress 11 Delphi Confidential

Delphi s Approach Designs are secure Products are manufactured reliably Vehicles need to operate safely Integrity of the people in the system Delphi is developing standards for: Embedded controller (ECU), Cloud computing platforms, IT infrastructure, Network operations, Encryption, Device connection, Anomaly detection, Intrusion prevention We are working with a number of national and international organizations to ensure a coordinated approach Internally, we have a dedicated team of engineers, IT professionals and attorneys to provide the necessary oversight in the area of cyber security and connected vehicles from supply to delivery and aftermarket 12 Source: SAE International, CYBER SECURITY & THE AUTOMOTIVE INDUSTRY, 2014 SAE World Congress Delphi Confidential

Delphi Cybersecurity Organization Office of Chief Technologist Cybersecurity Steering Committee DPSS CTO Executive Sponsor Chief Technologist Chief Information Security Officer, Co-Chairs Manufacturing Excellence TT Information Technology Legal Oversight & Patent Support Engineering Task Team Enterprise Risk Committee Global Supplier Management Independent Third Party Information E&S Technical Review EEA Powertrain Thermal Security Board Vehicle Cybersecurity Steering Committee Charter To enable a safe and secure vehicle experience through the identification and mitigation of cybersecurity risks A d v i s o r y & S u p p o r t Vehicle Cybersecurity Mission Statement Enhance Delphi s reputation as a leader in the development of safe and secure vehicle systems by providing awareness and training, adopting standards and implementing procedures The team will engage with standards-setting bodies, government groups, academic institutions, and leading industry organizations 13 Delphi Confidential

Connected and Automated Vehicles and the Cybersecurity Threat How Industry is Responding Data security is the name of the game across all industries The economic impact of cybercrime may reach $100 billion annually Connected and Automated Vehicles technology heightens the cybersecurity challenges for the Automotive Industry Humongous tasks to be planned and executed! Cross-industry collaboration Solid foundations to build upon for turning the challenges into business opportunities for Safe and Secure Connected Vehicles SAE s Initiative Auto-ISAC Battelle s CyberAuto Challenge 14 Delphi Confidential

What Needs To Be Addressed? SAE International to Join Battelle CyberAuto Challenge July 13-17, 2015 at 5725 Delphi Drive, Troy, MI Practicum based challenge week Real current model full-feature cars Real equipment Real communication protocols Real industry/government experts Ethical White Hat hackers Value Proposition: Cooperative relationships building Bottom-up learning Interns/employees recruitment 15 Source: Battelle

Recommended Industry Approach Designs are secure Products are manufactured reliably Vehicles need to operate safely Integrity of the people in the system 16 Delphi Confidential