Designing Cost-Effective Ethernet Automotive E/E Architecture Against Security Threats IEEE-SA Ethernet & Automotive Technology Day

Size: px
Start display at page:

Download "Designing Cost-Effective Ethernet Automotive E/E Architecture Against Security Threats IEEE-SA Ethernet & Automotive Technology Day"

Transcription

1 Designing Cost-Effective Ethernet Automotive E/E Architecture Against Security Threats 2017 IEEE-SA Ethernet & Automotive Technoogy Day

2 2 Agenda Connected vehice attack surfaces High eve security needs Hardware security protection Ecosystem management Network Partitioning for security Hardware-secured TLS Ethernet switching requirements Exampe of secure Ethernet IVN

3 3 Cars Are Aready Connected More than 20% of vehices sod wordwide in 2015 incuded embedded connectivity soutions The new question: More than 50% of vehices sod wordwide in 2015 to be connected (either embedded, tethered or smartphone integration) Every new car to be connected in mutipe ways by 2025 Wi these cars be connected with a foundation of security in mind?

4 High Visibiity Hacks Infuencing Market Trend Resuting in new reguations and OEM cybersecurity specs 4

5 5 Attack Surface Keeps Growing Increasing remote attack interfaces On-board diagnostic port Teematics Wi-Fi hotspot & ong-range wireess connectivity 3G, 4G, LTE Buetooth connections (smartphones) Passive entry / keyess systems Infotainment Storage media (CD, USB, SD card) Attack scenarios Safety critica (Brakes, engine contro ) Obstructive (Instrument reading, ights, infotainment ) No security on CAN2.0 & imited bandwidth to impement Ethernet VLANs for traffic separation not security

6 6 High-Leve Security Needs Ease of integration into existing architecture & Engine Contro Units (ECUs) Scaabe across patform modes Fexibe migration to next-generation architecture Common methodoogy across a types of In-Vehice Networking (IVN) Intrusion detection and OTA updates Cost effective tota soution!!

7 7 Attributes of Automotive Hardware Security Devices Secure Key Storage Trusted Ethernet nodes with secure boot & firmware update TLS key protection CAN communication keys & certificates storage CAN communication session key(s) storage Ease of Integration Less code = ower cost Minima code updates on node microcontroer (MCU) Node Authentication & Key Agreement ECU authentication & key agreement scheme Encrypted and authenticated command sessions Hardware Crypto Acceerators Symmetric and asymmetric agorithms High quaity random number generators HMAC & CMAC for seria communication protection Automotive Grade-1 High-security storage

8 8 Unprotected Hardware Attack Microprobe to See Interna Device Nodes and Extract Keys Software can NOT protect private keys!

9 9 How Keys are Protected Matters! HW Crypto Devices Strong Muti-Leve HW Security Starts with active shied Pus a mutitude of environmenta tampers Protection modes Abiity to erase keys Designed to Defend Against Microprobe attacks Timing attacks Emissions anaysis attacks Faut, invaid command attacks Power cycing, cock gitches Standard Devices

10 10 Security Considerations at every Node in the Vehice SAE J3061 Consider risks associated with each vehice system

11 11 Ecosystem Management Protect your brand OEM s can manage approved suppiers for each node Ony approved safety critica nodes operate in the vehice X.509 certificates can hep in authentication genuine components

12 12 Digita Certificates The x.509 Digita Certificate is a unique verifiabe form of identity for the node It comprises three main components: The device pubic key A signature to enabe verification of the authenticity Data capturing any attributes the owner intends as part of the identity Certificates are standards driven forms of identity for the Internet Static Data (SN, mode number, etc.) Dynamic Data (Date, time, etc.) K PUB_DEVICE Device Pubic Key Signature

13 13 Creating a Certificate (Provisioning) 3. Owner embeds certificate into device K PUB_DEVICE HW Security Device K PUB_DEVICE Device Static & Dynamic Data Signature Certificate K PRIV_DEVICE 1. Create a unique key pair for each participant Hash SIGN MCHP or OEM 2. MCHP or OEM creates device certificate K PUB_OWNER K PRI_OWNER Remember: private keys, no matter which, must remain secret!

14 14 Monoithic Approach to Securing Ethernet KEY STORAGE MULTI-PORT ETHERNET SWITCH VLAN ACL PTP DPI Ingress Poicing DEBUG, TEST, SCAN APPLICATION SOFTWARE Secure Coding CPU Secure Boot Authentication ü Compex X Fexibe X Scaabe X Common methodoogy X Existing architecture? Cost effective? Secure Encryption Downoad / OTA Physica protection / Tamper-proof à Impractica à Partition network

15 15 Partitioning Network for Security Separate common network security from data traffic processing Common Network Functions Physica defence mechanisms Secure boot & downoad Authentication Key management Ecosystem and certificate chain management Network Specific Processing Virtua LANs Access contro Deep packet inspection Ingress / egress poicing Intrusion detection / protection Optimizes security performance, fexibiity and cost Any ECU, any architecture, any configuration, any bus

16 16 Scaabe Security for IVN Ethernet Ethernet MOST Processor or Microcontroer Processor or Microcontroer Processor or Microcontroer Processor or Microcontroer Processor or Microcontroer Secure Boot & Ethernet TLS Secure Boot, CAN Security, Ethernet TLS Secure boot & HDCP Secure Boot, Upgradabe to CAN security Secure Boot, CAN Security CAN Bus CAN Bus CAN Bus Security IC Addresses arge number of ECU architectures Secure Boot at each node

17 17 Software-Ony TLS Authentication Authentication Request Performs cryptographic functions in software in the device MCU Requires more code space Requires more processing oad or Main Software Stack Crypto API Cipher Suite SW Modue & KEYS Houses keys in software and unsecured memory Sma nodes with ow-end processors are too sow Device main MCU Software-ony TLS is vunerabe! TLS = Transport Layer Security

18 18 Hardware Secured TLS Authentication Authentication Request Hardware-TLS offoads cryptographic functions from the device MCU Access via HW-TLS API or Main Software Stack Microchip HW-TLS API Security IC Security IC handes a computation Minima code space & computationa oad Keys are generated & protected in secure hardware Device main MCU Authentication Key agreement Key storage Keys are secure!

19 19 Expoiting Automotive Ethernet Network Characteristics Fixed star / hybrid network topoogy Typicay maximum eight network ports on ECU Appications, traffic fows are known and pre-determined Network configuration is static (MAC, IP addresses) Broadcast, muticast and unicast traffic Limited use of protocos TCP/UDP, DoIP, PTP, SOME/IP. We-defined and bounded network Expoit to depoy intrusion detection / protection LEARN à MODEL à ANALYSE à ACT

20 Ethernet Switch Security Requirements Requires hardware features to support intrusion detection / protection Prevent typica attacks; spoofing, fooding, misuse / faiures Dynamicay update to adapt to changing network behavior 802.1Q VLAN AVB (time synchronized) 802.1Qci Ingress poicing and fitering (per stream per port) Extensive network statistics gathering (metadata) TCAM-based ayer 2,3,4 deep packet inspection Forward, drop, mirror Time stamp Count Modify packet Rate imit 802.1x Port and MAC authentication Enhanced diagnostics (harness defect detection) Seamess redundancy 20

21 21 Exampe Secure Ethernet IVN CAN Ethernet Antenna Teematics Fexibe, Scaabe Cost-effective & Secure! Infotainment AMP Dispay?? Head Unit Gateway OBD Door Sensor Fusion Lights Fan ADAS Body CAM CAM Lidar Radar Add tiny Security companion IC = Secure Link

22 22 Come and visit us at Booth #2 J Ethernet Gateway Security Demonstrator Ethernet AVB Streaming Demonstrator

23 Thank You!

Connecting Securely to the Cloud

Connecting Securely to the Cloud Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico

More information

Introduction to USB Development

Introduction to USB Development Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard

More information

ngenius Instrumentation Overview

ngenius Instrumentation Overview ngenius Instrumentation Overview NetScout Systems, Inc. 4 Technoogy Park Drive Westford, MA 01886 Teephone: 978-614-4000 Fax: 978-614-4004 Web: http://www.netscout.com NetScout is a registered trademark

More information

Four Circuit 4 Wire Unit With Dante Network Audio Interface

Four Circuit 4 Wire Unit With Dante Network Audio Interface Network Audio 4 Wire Interface Four Circuit 4 Wire Unit With Dante Network Audio Interface GS-FW012 ip 4 Wire With Dante Interface Highights Four x 4 Wire Circuits Loca Cue Input Dante Network Audio Three

More information

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017 Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen Axel Freiwald 1/2017 All OEMs Will Implement Software OTA As Soon As Possible IHS Study Motivation: Save on recalls caused by software bugs Evolution

More information

Intrusion Detection Adapted for Automotive Challenges for Hardware - An Implementation Example

Intrusion Detection Adapted for Automotive Challenges for Hardware - An Implementation Example Intrusion Detection Adapted for Automotive Challenges for Hardware - An Implementation Example 2018 IEEE-SA Ethernet & IP @ Automotive Technology Day Harald Zweck, Infineon Technologies Ronny Schulze,

More information

Countermeasures against Cyber-attacks

Countermeasures against Cyber-attacks Countermeasures against Cyber-attacks Case of the Automotive Industry Agenda Automotive Basics ECU, domains, CAN Automotive Security Motivation, trends Hardware and Software Security EVITA, SHE, HSM Secure

More information

MIGRATING TO CAN FD. Tony Adamson. Marketing Director CAN / LIN / FlexRay

MIGRATING TO CAN FD. Tony Adamson. Marketing Director CAN / LIN / FlexRay MIGRATING TO CAN FD Tony Adamson Marketing Director CAN / LIN / FlexRay Agenda WHO ARE WE CAR NETWORKS UNDER TRANSFORMATION SPEED SRITY OUR MISSION AND STRATEGY 2 2 FEBRUARY 16, 2016 VECTOR CAN FD SYMPOSIUM

More information

The 3ISYS-ETHG-4C4FC is managed redundant ring Ethernet switch. with 4x10/100/1000Base-T(X) and 4xGigabit Combo ports. With

The 3ISYS-ETHG-4C4FC is managed redundant ring Ethernet switch. with 4x10/100/1000Base-T(X) and 4xGigabit Combo ports. With PRODUCT OVERVIEW The 3ISYS-ETHG-4C4FC is managed redundant ring Ethernet switch with 4x10/100/1000Base-T(X) and 4xGigabit Combo ports. With compete support of Ethernet redundancy protoco, SYS-Ring (recovery

More information

Atmel Trusted Platform Module June, 2014

Atmel Trusted Platform Module June, 2014 Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four

More information

Introducing Hardware Security Modules to Embedded Systems

Introducing Hardware Security Modules to Embedded Systems Introducing Hardware Security Modules to Embedded Systems for Electric Vehicles charging according to ISO/IEC 15118 V1.0 2017-03-17 Agenda Hardware Trust Anchors - General Introduction Hardware Trust Anchors

More information

Trusted Platform Modules Automotive applications and differentiation from HSM

Trusted Platform Modules Automotive applications and differentiation from HSM Trusted Platform Modules Automotive applications and differentiation from HSM Cyber Security Symposium 2017, Stuttgart Martin Brunner, Infineon Technologies Axiom: Whatever is connected can (and will)

More information

Automotive Security: Challenges and Solutions

Automotive Security: Challenges and Solutions Automotive Security: Challenges and Solutions 8 th Vector Congress 30 th November 2016 V2.01.00 2016-11-22 Agenda Introduction Services Embedded Security Mechanisms Tools Summary 2 Introduction Vehicle

More information

Securing the future of mobility

Securing the future of mobility Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need

More information

Resilient IoT Security: The end of flat security models

Resilient IoT Security: The end of flat security models Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security

More information

Symmetra. Product Overview. Redundancy. Scalability. Serviceability. Manageability. Components. How to Configure. Specifications.

Symmetra. Product Overview. Redundancy. Scalability. Serviceability. Manageability. Components. How to Configure. Specifications. Introducing Symmetra, the Word's First Power Array, and the foundation for Buiding Near-Continuous Avaiabiity Power Systems Power Array Symmetra What is a "Power Array?" Product Overview Legacy UPS vs

More information

Automotive Gateway: A Key Component to Securing the Connected Car

Automotive Gateway: A Key Component to Securing the Connected Car Automotive : A Key Component to Securing the Connected Car Introduction Building vehicles with gateways electronic devices that enable secure and reliable communications among a vehicle s electronic systems

More information

Automotive Security An Overview of Standardization in AUTOSAR

Automotive Security An Overview of Standardization in AUTOSAR Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver

More information

10 th AUTOSAR Open Conference

10 th AUTOSAR Open Conference 10 th AUTOSAR Open Conference Dr. Moritz Neukirchner Elektrobit Automotive GmbH Building Performance ECUs with Adaptive AUTOSAR AUTOSAR Nov-2017 Major market trends and their impact Trends Impact on E/E

More information

Automotive Anomaly Monitors and Threat Analysis in the Cloud

Automotive Anomaly Monitors and Threat Analysis in the Cloud Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications

More information

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016 Secure Ethernet Communication for Autonomous Driving Jared Combs June 2016 Agenda Motivation for Security The Multi-Level Security Architecture Proposal Level 1: Restrict access to the network Level 2:

More information

Securing IoT with the ARM mbed ecosystem

Securing IoT with the ARM mbed ecosystem Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into

More information

Intelligent Machinery Protection

Intelligent Machinery Protection Inteigent Machinery Protection Bearing and Shaft Vibration Shaft and Thrust Position Speed and Tachometer DN26 G3 from Sensonics...the scaabe and compact soution The need to protect your critica pant equipment

More information

Cyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies

Cyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies Cyber Security and Vehicle Diagnostics Mark Zachos DG Technologies SAE INTERNATIONAL SAE J3061 Cybersecurity Guidebook for Cyber-Physical Automotive Systems Published January 2016; drive to a risk-based,

More information

How to protect Automotive systems with ARM Security Architecture

How to protect Automotive systems with ARM Security Architecture How to protect Automotive systems with ARM Security Architecture Thanks to this app You can manoeuvre The new Forpel Using your smartphone! Too bad it s Not my car Successful products will be attacked

More information

MAXPRO IP Video Solutions LEARN ONE, KNOW THEM ALL. Open, Flexible and Scalable Video Surveillance Platform

MAXPRO IP Video Solutions LEARN ONE, KNOW THEM ALL. Open, Flexible and Scalable Video Surveillance Platform MAXPRO IP Video Soutions LEARN ONE, KNOW THEM ALL Open, Fexibe and Scaabe Video Surveiance Patform 1 LEARN ONE, KNOW THEM ALL Are you ooking for... Systems that are interoperabe with a wide range of surveiance

More information

Cyber security mechanisms for connected vehicles

Cyber security mechanisms for connected vehicles Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX

More information

Turbocharging Connectivity Beyond Cellular

Turbocharging Connectivity Beyond Cellular Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Turbocharging Connectivity Beyond Cellular Scott Beutler, Head of Interior Division

More information

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and

More information

Market Trends and Challenges in Vehicle Security

Market Trends and Challenges in Vehicle Security Market Trends and Challenges in Vehicle Security FTF-AUT-F0080 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Microcontrollers and Digital Networking Processors A Global Leader

More information

Commentary Unit With Talkback And Dante Network Audio Interface

Commentary Unit With Talkback And Dante Network Audio Interface Network Audio Commentary Interface ensound Commentary Unit With Takback And Dante Network Audio Interface VITA Network Audio Commentary Interface Highights For Commentary Or Takback Two Assignabe 4 Wire

More information

Scalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018

Scalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018 Scalable and Flexible Software Platforms for High-Performance ECUs Christoph Dietachmayr Sr. Engineering Manager, November 8, Agenda A New E/E Architectures and High-Performance ECUs B Non-Functional Aspects:

More information

MOST Networking Approach for Video-Camera Systems in ADAS. Dr. Bernd Sostawa, Senior Manager of Business Development, Microchip Technology Inc.

MOST Networking Approach for Video-Camera Systems in ADAS. Dr. Bernd Sostawa, Senior Manager of Business Development, Microchip Technology Inc. MOST Networking Approach for Video-Camera Systems in ADAS Dr. Bernd Sostawa, Senior Manager of Business Development, Microchip Technology Inc. Evolution of E/E Architecture Driver assistance will become

More information

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco

BGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco BGP-Based SPF IETF 96, Berin Keyur Pate, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopa, Cisco 1 Data Center Routing Routing Probem Space Routing scaing for Massivey Scaabe

More information

Building the Web of Things

Building the Web of Things Buiding the Web of Things Interoperabiity for Connected Devices Dave Raggett W3C Track 14 Apri 2016 Many Potentia IoT Appication Areas each evoving rich capabiities Smart Homes Wearabes Heathcare Power

More information

OTA and Remote Diagnostics

OTA and Remote Diagnostics OTA and Remote Diagnostics Vector ongress 26, Stuttgart, 26--29 V. 26--29 onnectivity offers greater Benefit to the automotive industry At a glance onnectivity offers greater benefit to the Automotive

More information

Archive Software with value add services:

Archive Software with value add services: E-Mai Archive Software with vaue add services: Protect your emais from data oss through reasonabe and secure backup features. Increase the productivity of your team by using the integrated search engine

More information

Solutions for Broadcast and Production. Loudness Measurement

Solutions for Broadcast and Production. Loudness Measurement Soutions for Broadcast and Production Loudness Measurement Loudness Anaysis Loudness Anaysis and Handing in TV and Radio Broadcast A reiabe and standardized method for evauating program oudness today is

More information

The CANoe.Ethernet Solution

The CANoe.Ethernet Solution Use in Praxis V1.0 2016-11-23 Agenda 1. Ethernet the Newcomer in Automotive 2. Why an Automotive Ethernet Option for CANoe? 3. Brief Look to CANoe 4. First Hand Usecase from Field 2/20 Network Topology

More information

WAP Security. Helsinki University of Technology S Security of Communication Protocols

WAP Security. Helsinki University of Technology S Security of Communication Protocols WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP

More information

Realizing Automated Driving Systems using Ethernet TSN and Adaptive AUTOSAR

Realizing Automated Driving Systems using Ethernet TSN and Adaptive AUTOSAR Realizing Automated Driving Systems using Ethernet TSN and Adaptive AUTOSAR Prathap Venugopal, November 1-2, 2017 San Jose, CA, USA Agenda n Automated driving communication needs n Ethernet TSN standard

More information

Cyber security of automated vehicles

Cyber security of automated vehicles Cyber security of automated vehicles B. Steurich Infineon Technologies Conference Sep. 2017, Berlin Building blocks of automated driving: Cooperation of multiple system and disciplines Data Processing

More information

Confidence in measurement

Confidence in measurement Confidence in measurement Caibration Goba caibration network www.kister.com Tech Center Tech Office Production Center Kister caibration network Acceerometers Data Acquisition (Crash) Whee Force Transducers

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Advanced Memory Management Advanced Functionaity Now we re going to ook at some advanced functionaity that the OS can provide appications using

More information

>2033AUPS UNINTERRUPTIBLE P O W E R SUPPLIES

>2033AUPS UNINTERRUPTIBLE P O W E R SUPPLIES >2033AUPS UNINTERRUPTIBLE P O W E R SUPPLIES Mitsubishi The Leader in UPS Technoogy, Quaity & Reiabiity ONE-LINE DIAGRAM 2033A SERIES UPS OPERATION MENU Superior Performance, Reiabiity and Safety Come

More information

New Approaches to Connected Device Security

New Approaches to Connected Device Security New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the

More information

Windows 10 IoT Core Azure Connectivity and Security

Windows 10 IoT Core Azure Connectivity and Security Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a

More information

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT

More information

Cisco Secure Boot and Trust Anchor Module Differentiation

Cisco Secure Boot and Trust Anchor Module Differentiation Solution Overview Cisco Secure Boot and Trust Anchor Module Differentiation Cisco Trust Anchor Technologies provide the foundation for Cisco Trustworthy Systems. Cisco Secure Boot helps ensure that the

More information

wepresent SharePod User's Manual Version: 1.1

wepresent SharePod User's Manual Version: 1.1 wepresent SharePod User's Manua Version: 1.1 1 Tabe of Contents 1 OVERVIEW... 3 2 PACKAGE CONTENTS... 4 3 PHYSICAL DETAILS... 4 4 WHAT YOU NEED... 5 5 WEPRESENT SHAREPOD PAIRING... 5 5.1 AUTO PAIRING...

More information

Advanced DisplayPort Testing. Lexus Lee Program Manager

Advanced DisplayPort Testing. Lexus Lee Program Manager Advanced DispayPort Testing Lexus Lee Program Manager 03/05/2018 Overview Aion DispayPort Services Advanced DispayPort Testing About Aion Labs, Inc. 2 Aion DispayPort Services 3 DispayPort Authorized Test

More information

whitepaper ClickShare Security

whitepaper ClickShare Security ClickShare Security www.barco.com/clickshare Introduction ClickShare was introduced in 2012. Four years later, in 2016, a new generation of ClickShare Enterprise products was presented to the market. New

More information

Smart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017

Smart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017 Smart Antennas and : Enabling Secure Convergence July 5, 2017 About OpenSynergy OpenSynergy develops software solutions for embedded automotive systems. OpenSynergy s product portfolio includes key software

More information

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,

More information

Provisioning secure Identity for Microcontroller based IoT Devices

Provisioning secure Identity for Microcontroller based IoT Devices Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling

CSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing

More information

Mentor Automotive. Vehicle Network Design to meet the needs of ADAS and Autonomous Driving

Mentor Automotive. Vehicle Network Design to meet the needs of ADAS and Autonomous Driving Mentor Automotive Vehicle Network Design to meet the needs of ADAS and Autonomous Driving Presented to AESIN Conference 2016 By Martin Wennberg October 2016 Abstract With the new automotive trends such

More information

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017 Automotive Security: Challenges, Standards and Solutions Alexander Much 12 October 2017 Driver s fears are being fueled by recent news Connected Cars, new opportunities for hackers Autonomous Driving Concepts

More information

SOLUTIONS FOR CAR MULTIPLEXING

SOLUTIONS FOR CAR MULTIPLEXING Repacing a cassica harness with a mutipexing (mux) network makes cars more competitive as it increases their fexibiity and simpifies the wiring is the eading protoco for car mux systems thanks to its arge

More information

Product Design & Development

Product Design & Development Product Design & Deveopment Product Architecture 1 2 1 What is Product Architecture? Product architecture is the assignment of the product's functions to physica buiding bocks or "chunks". Product modue

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792

More information

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS

A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,

More information

Multi-MANO interworking for the management of multi-domains networks and network slicing Functionality & Demos

Multi-MANO interworking for the management of multi-domains networks and network slicing Functionality & Demos Muti-MANO interworking for the management of muti-domains networks and network sicing Functionaity & Demos Acknowedgement & Open Source Soutions NECOS project: NFVi Sicing http://aurabaea.com/necos/ SONATA

More information

#RSAC #RSAC Thing Thing Thing Thing Thing Thing Edge Edge Gateway Gateway Cut costs Create value Find information in data then act Maintain Things Enrol Authorized Users & Things Authentication

More information

Computing devices have become increasingly mobile at the client end, and the

Computing devices have become increasingly mobile at the client end, and the Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized

More information

Architecture concepts in Body Control Modules

Architecture concepts in Body Control Modules Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Course 7 www.continental-corporation.com Interior Body and Security Table Of Contents

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1

ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation April 2012 Copyright 2012 Algorithmic Research This document

More information

KPIT S Connected Vehicle Practice

KPIT S Connected Vehicle Practice KPIT S Connected Vehicle Practice Vehicle Telematics Vehicle-to-Anything (V2X) Cybersecurity With an intent to shape up the futuristic Internet-of-Vehicles era, KPIT offers Vehicle-to-anything (V2X) solutions

More information

Microsoft Visual Studio 2005 Professional Tools. Advanced development tools designed for professional developers

Microsoft Visual Studio 2005 Professional Tools. Advanced development tools designed for professional developers Microsoft Visua Studio 2005 Professiona Toos Advanced deveopment toos designed for professiona deveopers If you re a professiona deveoper, Microsoft has two new ways to fue your deveopment efforts: Microsoft

More information

Device to Cloud. Software Hardware Know How

Device to Cloud. Software Hardware Know How Device to Cloud Software Hardware Know How Who we are q Innovative Australian based company working in Embedded Bluetooth and Wi-Fi for more than 16 years q World leading expertise in embedded Bluetooth

More information

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability

Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 25,

More information

Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague

Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July 2017 -- IETF 99 th, Prague 2 What do we mean by security? Communication Security Aims

More information

ETHERNET JOURNEY AT JAGUAR LAND ROVER CHALLENGES IN THE DEVELOPMENT OF AN ETHERNET BACKBONE

ETHERNET JOURNEY AT JAGUAR LAND ROVER CHALLENGES IN THE DEVELOPMENT OF AN ETHERNET BACKBONE ETHERNET JOURNEY AT JAGUAR LAND ROVER CHALLENGES IN THE DEVELOPMENT OF AN ETHERNET BACKBONE Vector GB Ltd Annual Conference 2017 Wednesday, September 27th, 2017 Syreeta Bath - Technical Specialist Vehicle

More information

Create. Collaborate. Inspire.

Create. Collaborate. Inspire. Create. Coaborate. Inspire. Touchscreen Manufacturer of the Year INAVATION AWARDS TECHNOLOGY WINNER 2018 #cevertouch cevertouch.com Introduction Workspace AV is integra to the modern office environment.

More information

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE.

INTERNET PROTOCOL SECURITY (IPSEC) GUIDE. INTERNET PROTOCOL SECURITY (IPSEC) GUIDE www.insidesecure.com INTRODUCING IPSEC NETWORK LAYER PACKET SECURITY With the explosive growth of the Internet, more and more enterprises are looking towards building

More information

Understanding Cisco Cybersecurity Fundamentals

Understanding Cisco Cybersecurity Fundamentals 210-250 Understanding Cisco Cybersecurity Fundamentals NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 210-250 Exam on Understanding Cisco

More information

Intel Server System SR1600 and SR2600 Family

Intel Server System SR1600 and SR2600 Family Product Brief Inte Server Systems SR1600UR, SR1625UR, SR2600UR, and SR2625UR Inte Server System SR1600 and SR2600 Famiy Rack-Optimized, Highy Integrated Server Systems for High-Density, Energy-Efficient

More information

Design of IP Networks with End-to. to- End Performance Guarantees

Design of IP Networks with End-to. to- End Performance Guarantees Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice

More information

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) Koji NAKAO, NICT, Japan (Expert of UNECE WP29/TFCS) General Flow of works in WP29/TFCS and OTA Data protection

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 7. Network Security Network Attacks Cryptographic Technologies Message Integrity and Authentication Key Distribution Firewalls Transport Layer

More information

Amazon Elastic Compute Cloud. Amazon Elastic Compute Cloud. Amazon Elastic Compute Cloud 7/12/17. Compute. Instance.

Amazon Elastic Compute Cloud. Amazon Elastic Compute Cloud. Amazon Elastic Compute Cloud 7/12/17. Compute. Instance. Amazon Eastic Compute Coud Compute - The amount of computationa power required to fufi your workoad Instance - Virtua machines - Charged per hour whie running - Virtua Hardware - AMI - Software (appications,

More information

Security+ SY0-501 Study Guide Table of Contents

Security+ SY0-501 Study Guide Table of Contents Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators

More information

Verizon Software Defined Perimeter (SDP).

Verizon Software Defined Perimeter (SDP). Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.

More information

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points

FIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points FIPS 140-2 Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points November 4, 2010 Version 2.2 Contents This security policy

More information

This Security Policy describes how this module complies with the eleven sections of the Standard:

This Security Policy describes how this module complies with the eleven sections of the Standard: Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights

More information

CCNA Security 1.0 Student Packet Tracer Manual

CCNA Security 1.0 Student Packet Tracer Manual 1.0 Student Packet Tracer Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors

More information

13W-AutoSPIN Automotive Cybersecurity

13W-AutoSPIN Automotive Cybersecurity 13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview

More information

The Adaptive Platform for Future Use Cases

The Adaptive Platform for Future Use Cases The Adaptive Platform for Future Use Cases Vector Congress 2016 - Stuttgart, 2016-11-30 V0.1 2016-09-21 Agenda Introduction Adaptive AUTOSAR Architecture Use Cases and Requirements Adaptive AUTOSAR at

More information

Securing IoT devices with Hardware Secure Element. Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager

Securing IoT devices with Hardware Secure Element. Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager Securing IoT devices with Hardware Secure Element Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager 2 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris

More information

FIPS SECURITY POLICY FOR

FIPS SECURITY POLICY FOR FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes

More information

Security in NVMe Enterprise SSDs

Security in NVMe Enterprise SSDs Security in NVMe Enterprise SSDs Radjendirane Codandaramane, Sr. Manager, Applications, Microsemi August 2017 1 Agenda SSD Lifecycle Security threats in SSD Security measures for SSD August 2017 2 SSD

More information

The case for a Vehicle Gateway.

The case for a Vehicle Gateway. The case for a Vehicle Gateway. Equipment and Tool Institute ETI-ToolTech_2015_Gateway.pptx 1 Vehicle Data Access Last year we proposed a Vehicle Station Gateway and its associated Unified Gateway Protocol

More information

Computer Networks. College of Computing. Copyleft 2003~2018

Computer Networks. College of Computing.   Copyleft 2003~2018 Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are

More information

Cisco Desktop Collaboration Experience DX650 Security Overview

Cisco Desktop Collaboration Experience DX650 Security Overview White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)

More information

SW-Update. Thomas Fleischmann June 5 th 2015

SW-Update. Thomas Fleischmann June 5 th 2015 Thomas Fleischmann June 5 th 2015 2 3 Agenda The big picture SW-Update today Diagnostics vs SW-Update Our solution for SW-Update The real challenges beyond getting a file into the car Elektrobit (EB),

More information

Subject: Intel D815EEA Desktop Board - Product Brief (http://channel.intel.com/business

Subject: Intel D815EEA Desktop Board - Product Brief (http://channel.intel.com/business Subject: Inte D815EEA Desktop Board - Product Brief (http://channe.inte.com/business Inte Desktop Board D815EEA for Inte Pentium III and Inte Ceeron Fexibe Graphics and Leading-Edge Performance The Inte

More information

Security Policy. 10 th March 2005

Security Policy. 10 th March 2005 DCAP Security Module FIPS 140-2 Level 3 Security Policy 10 th March 2005 Thales e-security Limited, Meadow View House, Long Crendon, Aylesbury, BUCKS HP18 9EQ United Kingdom Tel. +44 (0) 1844 201800 Fax.

More information

Introducing a Target-Based Approach to Rapid Prototyping of ECUs

Introducing a Target-Based Approach to Rapid Prototyping of ECUs Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,

More information