Cybersecurity And The Automotive Industry



Similar documents
Connected and Automated Vehicles and the Cybersecurity Threat

The relevance of cyber-security to functional safety of connected and automated vehicles

Tracking & Hacking: Security & Privacy Gaps Put American Drivers at Risk

Statement of Steve Douglas Senior Director of Environmental Affairs,

Frost & Sullivan Cybersecurity Presentation

Security in Vehicle Networks

2014 Manufacturer Volume Status. Large- and Intermediate-Volume Manufacturer 2014 Vehicle Production Delivered for Sale in OR

TRW Automotive TRW Automotive Profile 2012

Security risk analysis approach for on-board vehicle networks

Connected Car Forecast: Global Connected Car Market to Grow Threefold Within Five Years

NIST Cybersecurity Framework. ARC World Industry Forum 2014

U.S. HOUSE OF REPRESENTATIVES COMMITTEE ON ENERGY AND COMMERCE

Science Fiction to Reality: The Future of Automobile Insurance and Transportation Technology

Car Connections. Johan Lukkien. System Architecture and Networking

ANSYS SCADE Model-Based Development Solutions for AUTOMOTIVE. Critical Systems & Software Development Solutions

How To Buy A Car In Chile

STATEMENT THE ALLIANCE OF AUTOMOBILE MANUFACTURERS APRIL 14, 2016 PRESENTED BY:

Auto Insurance in the Era of Autonomous Vehicles

Light-Duty Automotive Technology, Carbon Dioxide Emissions, and Fuel Economy Trends: 1975 Through Executive Summary

Information Technology in the Automotive Aftermarket

Ohio Smart Mobility Initiative. Carla Bailo October 8, 2015

EVITA-Project.org: E-Safety Vehicle Intrusion Protected Applications

NHTSA S AUTOMOTIVE CYBERSECURITY RESEARCH. Arthur Carter, Frank Barickman, NHTSA

In-Vehicle Infotainment. A View of the European Marketplace

National Cybersecurity Challenges and NIST. Donna F. Dodson Chief Cybersecurity Advisor ITL Associate Director for Cybersecurity

TIRE PRESSURE MONITORING SYSTEM

Information Security Program CHARTER

Understanding Mobile Apps for Automotive. Kerry Johnson, Senior Automotive Product Manager

An Overview of NHTSA s Electronics Reliability and Cybersecurity Research Programs Paper ID Abstract

Automotive Companies Save Costs, Gain Advantages with Red Bend s FOTA. Case Study

U.S. Office of Personnel Management. Actions to Strengthen Cybersecurity and Protect Critical IT Systems

JOINT EXPLANATORY STATEMENT TO ACCOMPANY THE CYBERSECURITY ACT OF 2015

OT PRODUCTS AND SOLUTIONS MACHINE TO MACHINE

Executive Order 13636: The Healthcare Sector and the Cybersecurity Framework. September 23, 2014

Automotive and Industrial Data Security

ACEA PRINCIPLES OF DATA PROTECTION IN RELATION TO CONNECTED VEHICLES AND SERVICES

INTELLIGENT TRANSPORTATION SYSTEMS. Vehicle-to-Vehicle Technologies Expected to Offer Safety Benefits, but a Variety of Deployment Challenges Exist

POLICIES TO MITIGATE CYBER RISK

Fitting/Installation Guide - UNIVERSAL

Future directions in natural gas injection: Is CNG an alternative to gasoline or Diesel for passenger cars?

Cybersecurity Framework. Executive Order Improving Critical Infrastructure Cybersecurity

Vehicular On-board Security: EVITA Project

September 8th 8:30 AM 10:00 AM PL1: Reinventing Policy to Support the New ITS

Cyber-Security in the Connected Car Age

hub bearing and why is it critical to your safety? A: See inside. It could save your life.

FERPA: Data & Transport Security Best Practices

How To Write A Cybersecurity Framework

FEDERAL HOUSING FINANCE AGENCY ADVISORY BULLETIN AB Cyber Risk Management Guidance. Purpose

Essentials of Management Information Systems

Information Security Policy and Handbook Overview. ITSS Information Security June 2015

Enterprise Cybersecurity: Building an Effective Defense

for Vehicle Cyber Security

Greenhouse Gas Emission Standards for Light-Duty Vehicles

Legislative Language

Preemptive security solutions for healthcare

Leveraging innovative security solutions for government. Helping to protect government IT infrastructure, meet compliance demands and reduce costs

How To Reprogram A J2534 With An Obd Ii With A J 2534 With A Power Control (J2534) With A Usb Cable And A Power Remote (J 2534)

Car Cybersecurity: What do the automakers really think? 2015 Survey of Automakers and Suppliers Conducted by Ponemon Institute

FINRA Publishes its 2015 Report on Cybersecurity Practices

HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY IDENTIFIABLE INFORMATION BUT COULD IMPROVE CERTAIN INFORMATION SECURITY CONTROLS

How To Understand And Manage Cybersecurity Risk

Cloud Cyber Incident Sharing Center (CISC) Jim Reavis CEO, Cloud Security Alliance

The Internet of Things (IoT) Opportunities and Risks

Cybersecurity Framework: Current Status and Next Steps

Perspectives on Cybersecurity in Healthcare June 2015

HEC Security & Compliance

AIRDEFENSE SOLUTIONS PROTECT YOUR WIRELESS NETWORK AND YOUR CRITICAL DATA SECURITY AND COMPLIANCE

[STAFF WORKING DRAFT]

PROTIVITI FLASH REPORT

Using the HITRUST CSF to Assess Cybersecurity Preparedness 1 of 6

Bellevue University Cybersecurity Programs & Courses

Coverity White Paper. Managing Risk: Ensure Software Quality and Security Across the Automotive Supply Chain

The Internet on Wheels and Hitachi, Ltd. By Hitachi Data Systems

2016 European Anti-Hacking Technology for Connected Cars New Product Innovation Award

Building Security In:

One Million Electric Vehicles By February 2011 Status Report

Perspectives on In-Vehicle Infotainment Systems and Telematics

The Problem: Automotive safety recalls, Control Systems Diagnostics, Stability Control, Traction Control, Anti-lock Braking, Adaptive Cruise Control

New car dealerships (June 2013) (see Attachment 1 Map of existing auto dealerships in Bellevue).

El costo oculto de las aplicaciones Vulnerables. Faustino Sanchez. WW Security Sales Enablement. IBM Canada

By: Gerald Gagne. Community Bank Auditors Group Cybersecurity What you need to do now. June 9, 2015

Technology.Transfer.Application.

VEHICLE CYBERSECURITY. DOT and Industry Have Efforts Under Way, but DOT Needs to Define Its Role in Responding to a Realworld

CLIENT UPDATE CRITICAL INFRASTRUCTURE CYBERSECURITY: U.S. GOVERNMENT RESPONSE AND IMPLICATIONS

Transcription:

Cybersecurity And The Automotive Industry Dr Andrew Brown, Jr PE, FESD, FSAE, NAE Vice President & Chief Technologist Delphi 2014 Global Symposium on Connected Vehicles & Infrastructure April 21-23, 2014 Ann Arbor, Michigan

Agenda Delphi Overview Why Cybersecurity Matters? What Needs To Be Addressed? Delphi s Approach Delphi Confidential 2

Delphi s global team at the center of technology innovation 19,000 engineers and scientists $17 B in Research & Development 126 manufacturing sites 15 major global technical centers $165B 2013 revenue 160,000 people in 32 countries Delphi Confidential 3

Megatrends drive our technology portfolio Safe Green Connected - Active Safety Systems - Driver State Alerts - Safety Electronics - Battery Disconnects - Human Machine Interface - Occupant Classification Systems - Gasoline Direct Injection - Diesel Fuel Injection Systems - Fuel Economy & Performance Technologies - Next Generation Energy Efficient AC - Hybrid & Electric Vehicle Technologies - Vehicle Infrastructure Interface (VII) & Vehicle-to-Vehicle Interface - Telematics - Digital Receivers - Connected Vehicle - Satellite, Audio, Video & Data Systems Focused on solutions to customers problems 4

Delphi changing the way transportation is delivered In the next 10 years: 50% more vehicles on the road Stricter fuel economy regulations @ 545 MPG by 2025 Automated driving reality And, Delphi technologies are creating a world with: 50% fewer accidents 50% less emissions 100% better fuel economy 1000% more computational power in the vehicle Delphi Confidential 5

Why Cybersecurity Matters? About 40 million card accounts breached by Target credit card hack between Black Friday November 27 and December 15, 2013 On December 2, 2013, Senator Edward J Markey [D MA] sent letters to 20 major automobile manufacturers requesting information about how consumers are protected from cyberattack or unwarranted violations of privacy Letters sent to Volvo, Volkswagen, Toyota, Tesla, Subaru, Porsche, Nissan, Mitsubishi, Mercedes Benz, Mazda, Lamborghini, Jaguar, Hyundai, Honda, GM, Ford, Chrysler, BMW, Audi, and Aston Martin On April 7, 2014 the "Heartbleed" flaw in encryption protocol OpenSSL was made public: More than a Half-Million servers exposed to Heartbleed flaw Heartbleed makes 50 Million Android phones vulnerable, data shows Sources: http://wwwmarkeysenategov/recordcfm?id=348146 http://wwwmarkeysenategov/markey_letters_to_car_companies_on_cyber_security_privacycfm http://wwwfoxnewscom/us/2013/12/19/target-says-40m-accounts-may-be-affected-by-data-breach/ http://enwikipediaorg/wiki/heartbleed http://wwwtheguardiancom/technology/2014/apr/15/heartbleed-android-phones-vulnerable-data-shows 6

Why Cybersecurity Matters? Connected cars are becoming ubiquitous More than 60 percent of new cars worldwide will be connected directly to the Internet by 2017 (ABI Research, July 2012 ) Two primary manifestations Cars as giant rolling smartphones providing information, entertainment and communications V2V/V2I communications enabling cars to talk to each other and transportation infrastructure to avoid accidents, speed commutes 96 percent of new cars and light trucks are equipped with black boxes Customers are demanding that their cars be technologically sophisticated 39 percent of drivers surveyed said in-car technology was their primary consideration in choosing a new auto (Accenture, December 2013) Compared with 14 percent who cite vehicle driving performance Source: Bloomberg Government Cybersecurity, Privacy and the Auto Sector Presentation to the American Automotive Leasing Association March 6, 2014 - Sanford Reback, Robert Litan 7

Why Cybersecurity Matters? Technological Advances in the Auto Sector Bring Public Policy Concerns Cybersecurity Industry as a whole One of 16 designated critical-infrastructure sectors Individual vehicles Increased concern about car hacking Safety concerns, such as making vehicles crash Privacy concerns related to information transmitted Privacy Infotainment services produce a wealth of personal information in data streams Who owns the data? How will information be safeguarded? Black boxes record extensive information about driving habits How will law enforcement, insurance companies gain access to this data? Source: Bloomberg Government Cybersecurity, Privacy and the Auto Sector Presentation to the American Automotive Leasing Association March 6, 2014 - Sanford Reback, Robert Litan 8

Why Cybersecurity Matters? Scope of Problem(s) Prevention of taking control of in-vehicle electronic systems via wireless or wired means Related Areas Security of mobile media information such as copyrighted video and audio being used in the car Security of in-vehicle parameters such as engine calibrations, odometer, etc Accuracy and validity of in-vehicle parameters such as vehicle speed Will involve Functional Safety ISO 26262 Integrity of emissions-control systems Detection of counterfeit ECUs Heightened Threats Personal Device Integration, Telematics, Cloud Access, V2X, Source: Delphi Automated Driving 9

What Needs To Be Addressed? Cybersecurity Policy 2013: A very busy year for cybersecurity President Barack Obama s February Executive Order 13636 kicked off several administration initiatives The year started with a concerted US focus on Chinese cyber hacking, but that was eclipsed by the National Security Agency surveillance controversy The Target breach refocused attention on the impact on consumers Congress made limited progress on legislation; the Cyber Intelligence Sharing and Protection Act stalled again NIST was assigned to build the Cybersecurity Framework 2014: NIST Framework Version 10 released on February 12 The Framework gathers existing global standards and practices to help organizations understand, communicate, and manage their cyber risks Each of the Framework components (the Framework Core, Profiles, and Tiers) reinforces the connection between business drivers and cybersecurity activities The Framework also offers guidance regarding privacy and civil liberties considerations that may result from cybersecurity activities The Framework Core is a set of cybersecurity activities and informative references that are common across critical infrastructure sectors The cybersecurity activities are grouped by five functions -- Identify, Protect, Detect, Respond, Recover -- that provide a highlevel view of an organization s management of cyber risks The Profiles can help organizations align their cybersecurity activities with business requirements, risk tolerances, and resources Companies can use the Profiles to understand their current cybersecurity state, support prioritization, and to measure progress towards a target state The Tiers provide a mechanism for organizations to view their approach and processes for managing cyber risk The Tiers range from Partial (Tier 1) to Adaptive (Tier 4) and describe an increasing degree of rigor in risk management practices, the extent to which cybersecurity risk management is informed by business needs, and its integration into an organization s overall risk management practices Source: http://wwwwhitehousegov/the-press-office/2014/02/12/launch-cybersecurity-framework 10

What Needs To Be Addressed? Cybersecurity Policy NIST Framework Version 10 Framework Core Structure Notional Information and Decision Flows Source: http://wwwnistgov/cyberframework/upload/cybersecurity-framework-021214-finalpdf 11

What Needs To Be Addressed? Cybersecurity Policy Source: Bloomberg Government 2014 Cybersecurity Policy Outlook February 5, 2014 - Sanford Reback, Stacy O Mara 12

What Needs To Be Addressed? Broader Industry Initiatives European EVITA (E-Safety Vehicle Intrusion Protected Applications) Co-funded by the European Commission and the automotive industry 6 Million 4-year project (2008 2011) Objectives: To design, to verify, and to prototype an architecture for secure automotive on-board networks To provides a basis for the secure deployment of electronic safety aids based on V2V and V2I Approach: Security Requirements Analysis Secure On-Board Architecture Design Development of Hardware Security Modules deployed with ECUs In-Car cryptographic protocols to secure ECU-to-ECU and sensor communications Software framework integrating authentication, encryption and access control Prototype-based Demonstration Dissemination of Results Source: http://wwwevita-projectorg/evita_factsheetpdf 13

What Needs To Be Addressed? Broader Industry Initiatives Japanese Information-technology Promotion Agency s (IPA) guide Covers whole life-cycle of vehicle Three Categories of Functions Basic Control Functions Expanded Functions General Functions Lifecycle of Automotive Systems IPA Car System Model Source: IT Security Center, IPA Information Technology Promotion Agency, Japan, Approaches for Vehicle Information Security, August 2013 14

What Needs To Be Addressed? SAE Initiative Cyber security is a global concern and is a real and growing threat for the automotive industry Like other industries, the automotive industry would benefit from a concerted, industry-wide approach SAE is proposing a shared, secure and common platform for the automotive industry to communicate, analyze, exchange, and share information on imminent cyber security threats SAE International, through its Industry Technologies Consortia, is assembling a global consortia of major automotive manufacturers to define the need, scope and operational requirements Initial efforts will leverage the US Information Sharing and Analysis Centers (ISAC) model that is recognized by DHS and has been currently adopted by multiple industries Source: SAE International, CYBER SECURITY & THE AUTOMOTIVE INDUSTRY, 2014 SAE World Congress 15

Delphi Cybersecurity Organization Steering Committee - Governance Office of Chief Technologist DPSS CTO Executive Sponsor Chief Technologist Chief Information Security Officer, Co-Chairs Manufacturing Excellence TT Legal Oversight & Patent Support Engineering Task Team Enterprise Risk Committee Information E&S Technical Review EEA Powertrain Thermal Security Board Cybersecurity Steering Committee Information Technology Global Supplier Management Independent Third Party A d v i s o r y & S u p p o r t Source: Delphi 16

Delphi Cybersecurity Organization Vehicle Cybersecurity Steering Committee Charter To enable a safe and secure vehicle experience through the identification and mitigation of cybersecurity risks Source: Delphi 17

What Needs To Be Addressed? Battelle s Initiative Battelle Cyberauto Challenge July 13-18, 2014 at 5725 Delphi Drive, Troy, M Practicum based challenge week Real current model full-feature cars, Real equipment Real communication protocols Real industry/government experts Ethical White Hat hackers Value Proposition: Cooperative relationships building Bottom-up learning Interns/employees recruitment Source: Battelle 18

Cybersecurity And The Automotive Industry 2014 is the wake-up year for cybersecurity for all industry- and governmentrelated activities: Target security breach, Heartbleed vulnerability, NHTSA s rulemaking decision for V2V mandate Connected Vehicles technology heightens the cybersecurity challenges for the Automotive Industry Humongous tasks to be planned and executed! Solid foundations to build upon for turning the challenges into business opportunities for Safe and Secure Connected Vehicles NIST Cybersecurity Framework European EVITA Japanese IPA s guidelines SAE s Initiatives Battelle s cyberauto challenge Source: Delphi 19