Designing Cost-Effective Ethernet Automotive E/E Architecture Against Security Threats IEEE-SA Ethernet & Automotive Technology Day
|
|
- Vernon Henry
- 6 years ago
- Views:
Transcription
1 Designing Cost-Effective Ethernet Automotive E/E Architecture Against Security Threats 2017 IEEE-SA Ethernet & Automotive Technoogy Day
2 2 Agenda Connected vehice attack surfaces High eve security needs Hardware security protection Ecosystem management Network Partitioning for security Hardware-secured TLS Ethernet switching requirements Exampe of secure Ethernet IVN
3 3 Cars Are Aready Connected More than 20% of vehices sod wordwide in 2015 incuded embedded connectivity soutions The new question: More than 50% of vehices sod wordwide in 2015 to be connected (either embedded, tethered or smartphone integration) Every new car to be connected in mutipe ways by 2025 Wi these cars be connected with a foundation of security in mind?
4 High Visibiity Hacks Infuencing Market Trend Resuting in new reguations and OEM cybersecurity specs 4
5 5 Attack Surface Keeps Growing Increasing remote attack interfaces On-board diagnostic port Teematics Wi-Fi hotspot & ong-range wireess connectivity 3G, 4G, LTE Buetooth connections (smartphones) Passive entry / keyess systems Infotainment Storage media (CD, USB, SD card) Attack scenarios Safety critica (Brakes, engine contro ) Obstructive (Instrument reading, ights, infotainment ) No security on CAN2.0 & imited bandwidth to impement Ethernet VLANs for traffic separation not security
6 6 High-Leve Security Needs Ease of integration into existing architecture & Engine Contro Units (ECUs) Scaabe across patform modes Fexibe migration to next-generation architecture Common methodoogy across a types of In-Vehice Networking (IVN) Intrusion detection and OTA updates Cost effective tota soution!!
7 7 Attributes of Automotive Hardware Security Devices Secure Key Storage Trusted Ethernet nodes with secure boot & firmware update TLS key protection CAN communication keys & certificates storage CAN communication session key(s) storage Ease of Integration Less code = ower cost Minima code updates on node microcontroer (MCU) Node Authentication & Key Agreement ECU authentication & key agreement scheme Encrypted and authenticated command sessions Hardware Crypto Acceerators Symmetric and asymmetric agorithms High quaity random number generators HMAC & CMAC for seria communication protection Automotive Grade-1 High-security storage
8 8 Unprotected Hardware Attack Microprobe to See Interna Device Nodes and Extract Keys Software can NOT protect private keys!
9 9 How Keys are Protected Matters! HW Crypto Devices Strong Muti-Leve HW Security Starts with active shied Pus a mutitude of environmenta tampers Protection modes Abiity to erase keys Designed to Defend Against Microprobe attacks Timing attacks Emissions anaysis attacks Faut, invaid command attacks Power cycing, cock gitches Standard Devices
10 10 Security Considerations at every Node in the Vehice SAE J3061 Consider risks associated with each vehice system
11 11 Ecosystem Management Protect your brand OEM s can manage approved suppiers for each node Ony approved safety critica nodes operate in the vehice X.509 certificates can hep in authentication genuine components
12 12 Digita Certificates The x.509 Digita Certificate is a unique verifiabe form of identity for the node It comprises three main components: The device pubic key A signature to enabe verification of the authenticity Data capturing any attributes the owner intends as part of the identity Certificates are standards driven forms of identity for the Internet Static Data (SN, mode number, etc.) Dynamic Data (Date, time, etc.) K PUB_DEVICE Device Pubic Key Signature
13 13 Creating a Certificate (Provisioning) 3. Owner embeds certificate into device K PUB_DEVICE HW Security Device K PUB_DEVICE Device Static & Dynamic Data Signature Certificate K PRIV_DEVICE 1. Create a unique key pair for each participant Hash SIGN MCHP or OEM 2. MCHP or OEM creates device certificate K PUB_OWNER K PRI_OWNER Remember: private keys, no matter which, must remain secret!
14 14 Monoithic Approach to Securing Ethernet KEY STORAGE MULTI-PORT ETHERNET SWITCH VLAN ACL PTP DPI Ingress Poicing DEBUG, TEST, SCAN APPLICATION SOFTWARE Secure Coding CPU Secure Boot Authentication ü Compex X Fexibe X Scaabe X Common methodoogy X Existing architecture? Cost effective? Secure Encryption Downoad / OTA Physica protection / Tamper-proof à Impractica à Partition network
15 15 Partitioning Network for Security Separate common network security from data traffic processing Common Network Functions Physica defence mechanisms Secure boot & downoad Authentication Key management Ecosystem and certificate chain management Network Specific Processing Virtua LANs Access contro Deep packet inspection Ingress / egress poicing Intrusion detection / protection Optimizes security performance, fexibiity and cost Any ECU, any architecture, any configuration, any bus
16 16 Scaabe Security for IVN Ethernet Ethernet MOST Processor or Microcontroer Processor or Microcontroer Processor or Microcontroer Processor or Microcontroer Processor or Microcontroer Secure Boot & Ethernet TLS Secure Boot, CAN Security, Ethernet TLS Secure boot & HDCP Secure Boot, Upgradabe to CAN security Secure Boot, CAN Security CAN Bus CAN Bus CAN Bus Security IC Addresses arge number of ECU architectures Secure Boot at each node
17 17 Software-Ony TLS Authentication Authentication Request Performs cryptographic functions in software in the device MCU Requires more code space Requires more processing oad or Main Software Stack Crypto API Cipher Suite SW Modue & KEYS Houses keys in software and unsecured memory Sma nodes with ow-end processors are too sow Device main MCU Software-ony TLS is vunerabe! TLS = Transport Layer Security
18 18 Hardware Secured TLS Authentication Authentication Request Hardware-TLS offoads cryptographic functions from the device MCU Access via HW-TLS API or Main Software Stack Microchip HW-TLS API Security IC Security IC handes a computation Minima code space & computationa oad Keys are generated & protected in secure hardware Device main MCU Authentication Key agreement Key storage Keys are secure!
19 19 Expoiting Automotive Ethernet Network Characteristics Fixed star / hybrid network topoogy Typicay maximum eight network ports on ECU Appications, traffic fows are known and pre-determined Network configuration is static (MAC, IP addresses) Broadcast, muticast and unicast traffic Limited use of protocos TCP/UDP, DoIP, PTP, SOME/IP. We-defined and bounded network Expoit to depoy intrusion detection / protection LEARN à MODEL à ANALYSE à ACT
20 Ethernet Switch Security Requirements Requires hardware features to support intrusion detection / protection Prevent typica attacks; spoofing, fooding, misuse / faiures Dynamicay update to adapt to changing network behavior 802.1Q VLAN AVB (time synchronized) 802.1Qci Ingress poicing and fitering (per stream per port) Extensive network statistics gathering (metadata) TCAM-based ayer 2,3,4 deep packet inspection Forward, drop, mirror Time stamp Count Modify packet Rate imit 802.1x Port and MAC authentication Enhanced diagnostics (harness defect detection) Seamess redundancy 20
21 21 Exampe Secure Ethernet IVN CAN Ethernet Antenna Teematics Fexibe, Scaabe Cost-effective & Secure! Infotainment AMP Dispay?? Head Unit Gateway OBD Door Sensor Fusion Lights Fan ADAS Body CAM CAM Lidar Radar Add tiny Security companion IC = Secure Link
22 22 Come and visit us at Booth #2 J Ethernet Gateway Security Demonstrator Ethernet AVB Streaming Demonstrator
23 Thank You!
Connecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationIntroduction to USB Development
Introduction to USB Deveopment Introduction Technica Overview USB in Embedded Systems Recent Deveopments Extensions to USB USB as compared to other technoogies USB: Universa Seria Bus A seria bus standard
More informationngenius Instrumentation Overview
ngenius Instrumentation Overview NetScout Systems, Inc. 4 Technoogy Park Drive Westford, MA 01886 Teephone: 978-614-4000 Fax: 978-614-4004 Web: http://www.netscout.com NetScout is a registered trademark
More informationFour Circuit 4 Wire Unit With Dante Network Audio Interface
Network Audio 4 Wire Interface Four Circuit 4 Wire Unit With Dante Network Audio Interface GS-FW012 ip 4 Wire With Dante Interface Highights Four x 4 Wire Circuits Loca Cue Input Dante Network Audio Three
More informationSicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017
Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen Axel Freiwald 1/2017 All OEMs Will Implement Software OTA As Soon As Possible IHS Study Motivation: Save on recalls caused by software bugs Evolution
More informationIntrusion Detection Adapted for Automotive Challenges for Hardware - An Implementation Example
Intrusion Detection Adapted for Automotive Challenges for Hardware - An Implementation Example 2018 IEEE-SA Ethernet & IP @ Automotive Technology Day Harald Zweck, Infineon Technologies Ronny Schulze,
More informationCountermeasures against Cyber-attacks
Countermeasures against Cyber-attacks Case of the Automotive Industry Agenda Automotive Basics ECU, domains, CAN Automotive Security Motivation, trends Hardware and Software Security EVITA, SHE, HSM Secure
More informationMIGRATING TO CAN FD. Tony Adamson. Marketing Director CAN / LIN / FlexRay
MIGRATING TO CAN FD Tony Adamson Marketing Director CAN / LIN / FlexRay Agenda WHO ARE WE CAR NETWORKS UNDER TRANSFORMATION SPEED SRITY OUR MISSION AND STRATEGY 2 2 FEBRUARY 16, 2016 VECTOR CAN FD SYMPOSIUM
More informationThe 3ISYS-ETHG-4C4FC is managed redundant ring Ethernet switch. with 4x10/100/1000Base-T(X) and 4xGigabit Combo ports. With
PRODUCT OVERVIEW The 3ISYS-ETHG-4C4FC is managed redundant ring Ethernet switch with 4x10/100/1000Base-T(X) and 4xGigabit Combo ports. With compete support of Ethernet redundancy protoco, SYS-Ring (recovery
More informationAtmel Trusted Platform Module June, 2014
Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four
More informationIntroducing Hardware Security Modules to Embedded Systems
Introducing Hardware Security Modules to Embedded Systems for Electric Vehicles charging according to ISO/IEC 15118 V1.0 2017-03-17 Agenda Hardware Trust Anchors - General Introduction Hardware Trust Anchors
More informationTrusted Platform Modules Automotive applications and differentiation from HSM
Trusted Platform Modules Automotive applications and differentiation from HSM Cyber Security Symposium 2017, Stuttgart Martin Brunner, Infineon Technologies Axiom: Whatever is connected can (and will)
More informationAutomotive Security: Challenges and Solutions
Automotive Security: Challenges and Solutions 8 th Vector Congress 30 th November 2016 V2.01.00 2016-11-22 Agenda Introduction Services Embedded Security Mechanisms Tools Summary 2 Introduction Vehicle
More informationSecuring the future of mobility
Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need
More informationResilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security
More informationSymmetra. Product Overview. Redundancy. Scalability. Serviceability. Manageability. Components. How to Configure. Specifications.
Introducing Symmetra, the Word's First Power Array, and the foundation for Buiding Near-Continuous Avaiabiity Power Systems Power Array Symmetra What is a "Power Array?" Product Overview Legacy UPS vs
More informationAutomotive Gateway: A Key Component to Securing the Connected Car
Automotive : A Key Component to Securing the Connected Car Introduction Building vehicles with gateways electronic devices that enable secure and reliable communications among a vehicle s electronic systems
More informationAutomotive Security An Overview of Standardization in AUTOSAR
Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver
More information10 th AUTOSAR Open Conference
10 th AUTOSAR Open Conference Dr. Moritz Neukirchner Elektrobit Automotive GmbH Building Performance ECUs with Adaptive AUTOSAR AUTOSAR Nov-2017 Major market trends and their impact Trends Impact on E/E
More informationAutomotive Anomaly Monitors and Threat Analysis in the Cloud
Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications
More informationSecure Ethernet Communication for Autonomous Driving. Jared Combs June 2016
Secure Ethernet Communication for Autonomous Driving Jared Combs June 2016 Agenda Motivation for Security The Multi-Level Security Architecture Proposal Level 1: Restrict access to the network Level 2:
More informationSecuring IoT with the ARM mbed ecosystem
Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into
More informationIntelligent Machinery Protection
Inteigent Machinery Protection Bearing and Shaft Vibration Shaft and Thrust Position Speed and Tachometer DN26 G3 from Sensonics...the scaabe and compact soution The need to protect your critica pant equipment
More informationCyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies
Cyber Security and Vehicle Diagnostics Mark Zachos DG Technologies SAE INTERNATIONAL SAE J3061 Cybersecurity Guidebook for Cyber-Physical Automotive Systems Published January 2016; drive to a risk-based,
More informationHow to protect Automotive systems with ARM Security Architecture
How to protect Automotive systems with ARM Security Architecture Thanks to this app You can manoeuvre The new Forpel Using your smartphone! Too bad it s Not my car Successful products will be attacked
More informationMAXPRO IP Video Solutions LEARN ONE, KNOW THEM ALL. Open, Flexible and Scalable Video Surveillance Platform
MAXPRO IP Video Soutions LEARN ONE, KNOW THEM ALL Open, Fexibe and Scaabe Video Surveiance Patform 1 LEARN ONE, KNOW THEM ALL Are you ooking for... Systems that are interoperabe with a wide range of surveiance
More informationCyber security mechanisms for connected vehicles
Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX
More informationTurbocharging Connectivity Beyond Cellular
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Turbocharging Connectivity Beyond Cellular Scott Beutler, Head of Interior Division
More informationSecuring IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region
Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and
More informationMarket Trends and Challenges in Vehicle Security
Market Trends and Challenges in Vehicle Security FTF-AUT-F0080 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Microcontrollers and Digital Networking Processors A Global Leader
More informationCommentary Unit With Talkback And Dante Network Audio Interface
Network Audio Commentary Interface ensound Commentary Unit With Takback And Dante Network Audio Interface VITA Network Audio Commentary Interface Highights For Commentary Or Takback Two Assignabe 4 Wire
More informationScalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018
Scalable and Flexible Software Platforms for High-Performance ECUs Christoph Dietachmayr Sr. Engineering Manager, November 8, Agenda A New E/E Architectures and High-Performance ECUs B Non-Functional Aspects:
More informationMOST Networking Approach for Video-Camera Systems in ADAS. Dr. Bernd Sostawa, Senior Manager of Business Development, Microchip Technology Inc.
MOST Networking Approach for Video-Camera Systems in ADAS Dr. Bernd Sostawa, Senior Manager of Business Development, Microchip Technology Inc. Evolution of E/E Architecture Driver assistance will become
More informationBGP-Based SPF IETF 96, Berlin. Keyur Patel, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopal, Cisco
BGP-Based SPF IETF 96, Berin Keyur Pate, Cisco Acee Lindem, Cisco Derek Yeung, Cisco Abhay Roy, Cisco Venu Venugopa, Cisco 1 Data Center Routing Routing Probem Space Routing scaing for Massivey Scaabe
More informationBuilding the Web of Things
Buiding the Web of Things Interoperabiity for Connected Devices Dave Raggett W3C Track 14 Apri 2016 Many Potentia IoT Appication Areas each evoving rich capabiities Smart Homes Wearabes Heathcare Power
More informationOTA and Remote Diagnostics
OTA and Remote Diagnostics Vector ongress 26, Stuttgart, 26--29 V. 26--29 onnectivity offers greater Benefit to the automotive industry At a glance onnectivity offers greater benefit to the Automotive
More informationArchive Software with value add services:
E-Mai Archive Software with vaue add services: Protect your emais from data oss through reasonabe and secure backup features. Increase the productivity of your team by using the integrated search engine
More informationSolutions for Broadcast and Production. Loudness Measurement
Soutions for Broadcast and Production Loudness Measurement Loudness Anaysis Loudness Anaysis and Handing in TV and Radio Broadcast A reiabe and standardized method for evauating program oudness today is
More informationThe CANoe.Ethernet Solution
Use in Praxis V1.0 2016-11-23 Agenda 1. Ethernet the Newcomer in Automotive 2. Why an Automotive Ethernet Option for CANoe? 3. Brief Look to CANoe 4. First Hand Usecase from Field 2/20 Network Topology
More informationWAP Security. Helsinki University of Technology S Security of Communication Protocols
WAP Security Helsinki University of Technology S-38.153 Security of Communication Protocols Mikko.Kerava@iki.fi 15.4.2003 Contents 1. Introduction to WAP 2. Wireless Transport Layer Security 3. Other WAP
More informationRealizing Automated Driving Systems using Ethernet TSN and Adaptive AUTOSAR
Realizing Automated Driving Systems using Ethernet TSN and Adaptive AUTOSAR Prathap Venugopal, November 1-2, 2017 San Jose, CA, USA Agenda n Automated driving communication needs n Ethernet TSN standard
More informationCyber security of automated vehicles
Cyber security of automated vehicles B. Steurich Infineon Technologies Conference Sep. 2017, Berlin Building blocks of automated driving: Cooperation of multiple system and disciplines Data Processing
More informationConfidence in measurement
Confidence in measurement Caibration Goba caibration network www.kister.com Tech Center Tech Office Production Center Kister caibration network Acceerometers Data Acquisition (Crash) Whee Force Transducers
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Advanced Memory Management
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Advanced Memory Management Advanced Functionaity Now we re going to ook at some advanced functionaity that the OS can provide appications using
More information>2033AUPS UNINTERRUPTIBLE P O W E R SUPPLIES
>2033AUPS UNINTERRUPTIBLE P O W E R SUPPLIES Mitsubishi The Leader in UPS Technoogy, Quaity & Reiabiity ONE-LINE DIAGRAM 2033A SERIES UPS OPERATION MENU Superior Performance, Reiabiity and Safety Come
More informationNew Approaches to Connected Device Security
New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the
More informationWindows 10 IoT Core Azure Connectivity and Security
Windows 10 IoT Core Azure Connectivity and Security Published July 27, 2016 Version 1.0 Table of Contents Introduction... 2 Device identities... 2 Building security into the platform... 3 Security as a
More informationPENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017
PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT
More informationCisco Secure Boot and Trust Anchor Module Differentiation
Solution Overview Cisco Secure Boot and Trust Anchor Module Differentiation Cisco Trust Anchor Technologies provide the foundation for Cisco Trustworthy Systems. Cisco Secure Boot helps ensure that the
More informationwepresent SharePod User's Manual Version: 1.1
wepresent SharePod User's Manua Version: 1.1 1 Tabe of Contents 1 OVERVIEW... 3 2 PACKAGE CONTENTS... 4 3 PHYSICAL DETAILS... 4 4 WHAT YOU NEED... 5 5 WEPRESENT SHAREPOD PAIRING... 5 5.1 AUTO PAIRING...
More informationAdvanced DisplayPort Testing. Lexus Lee Program Manager
Advanced DispayPort Testing Lexus Lee Program Manager 03/05/2018 Overview Aion DispayPort Services Advanced DispayPort Testing About Aion Labs, Inc. 2 Aion DispayPort Services 3 DispayPort Authorized Test
More informationwhitepaper ClickShare Security
ClickShare Security www.barco.com/clickshare Introduction ClickShare was introduced in 2012. Four years later, in 2016, a new generation of ClickShare Enterprise products was presented to the market. New
More informationSmart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017
Smart Antennas and : Enabling Secure Convergence July 5, 2017 About OpenSynergy OpenSynergy develops software solutions for embedded automotive systems. OpenSynergy s product portfolio includes key software
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationCSE120 Principles of Operating Systems. Prof Yuanyuan (YY) Zhou Scheduling
CSE120 Principes of Operating Systems Prof Yuanyuan (YY) Zhou Scheduing Announcement Homework 2 due on October 25th Project 1 due on October 26th 2 CSE 120 Scheduing and Deadock Scheduing Overview In discussing
More informationMentor Automotive. Vehicle Network Design to meet the needs of ADAS and Autonomous Driving
Mentor Automotive Vehicle Network Design to meet the needs of ADAS and Autonomous Driving Presented to AESIN Conference 2016 By Martin Wennberg October 2016 Abstract With the new automotive trends such
More informationAutomotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017
Automotive Security: Challenges, Standards and Solutions Alexander Much 12 October 2017 Driver s fears are being fueled by recent news Connected Cars, new opportunities for hackers Autonomous Driving Concepts
More informationSOLUTIONS FOR CAR MULTIPLEXING
Repacing a cassica harness with a mutipexing (mux) network makes cars more competitive as it increases their fexibiity and simpifies the wiring is the eading protoco for car mux systems thanks to its arge
More informationProduct Design & Development
Product Design & Deveopment Product Architecture 1 2 1 What is Product Architecture? Product architecture is the assignment of the product's functions to physica buiding bocks or "chunks". Product modue
More informationComputer Networks. College of Computing. Copyleft 2003~2018
Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Internet Contro Message Protoco (ICMP), RFC 792
More informationA HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS
A HIGH PERFORMANCE, LOW LATENCY, LOW POWER AUDIO PROCESSING SYSTEM FOR WIDEBAND SPEECH OVER WIRELESS LINKS Etienne Cornu 1, Aain Dufaux 2, and David Hermann 1 1 AMI Semiconductor Canada, 611 Kumpf Drive,
More informationMulti-MANO interworking for the management of multi-domains networks and network slicing Functionality & Demos
Muti-MANO interworking for the management of muti-domains networks and network sicing Functionaity & Demos Acknowedgement & Open Source Soutions NECOS project: NFVi Sicing http://aurabaea.com/necos/ SONATA
More information#RSAC #RSAC Thing Thing Thing Thing Thing Thing Edge Edge Gateway Gateway Cut costs Create value Find information in data then act Maintain Things Enrol Authorized Users & Things Authentication
More informationComputing devices have become increasingly mobile at the client end, and the
Pronto: Mobie Gateway With Pubish- Subscribe Paradigm Over Wireess Network Eiko Yoneki University of Cambridge Pronto, a messaging middeware system for mobie appications, provides both centraized and decentraized
More informationArchitecture concepts in Body Control Modules
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Course 7 www.continental-corporation.com Interior Body and Security Table Of Contents
More informationThe Key Principles of Cyber Security for Connected and Automated Vehicles. Government
The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational
More informationARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1
ARX (Algorithmic Research) PrivateServer Hardware version 4.7 Firmware version 4.8.1 FIPS 140-2 Non-Proprietary Security Policy Level 3 Validation April 2012 Copyright 2012 Algorithmic Research This document
More informationKPIT S Connected Vehicle Practice
KPIT S Connected Vehicle Practice Vehicle Telematics Vehicle-to-Anything (V2X) Cybersecurity With an intent to shape up the futuristic Internet-of-Vehicles era, KPIT offers Vehicle-to-anything (V2X) solutions
More informationMicrosoft Visual Studio 2005 Professional Tools. Advanced development tools designed for professional developers
Microsoft Visua Studio 2005 Professiona Toos Advanced deveopment toos designed for professiona deveopers If you re a professiona deveoper, Microsoft has two new ways to fue your deveopment efforts: Microsoft
More informationDevice to Cloud. Software Hardware Know How
Device to Cloud Software Hardware Know How Who we are q Innovative Australian based company working in Embedded Bluetooth and Wi-Fi for more than 16 years q World leading expertise in embedded Bluetooth
More informationSmart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability
Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 25,
More informationTrusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July IETF 99 th, Prague
Trusted Execution Environments (TEE) and the Open Trust Protocol (OTrP) Hannes Tschofenig and Mingliang Pei 16 th July 2017 -- IETF 99 th, Prague 2 What do we mean by security? Communication Security Aims
More informationETHERNET JOURNEY AT JAGUAR LAND ROVER CHALLENGES IN THE DEVELOPMENT OF AN ETHERNET BACKBONE
ETHERNET JOURNEY AT JAGUAR LAND ROVER CHALLENGES IN THE DEVELOPMENT OF AN ETHERNET BACKBONE Vector GB Ltd Annual Conference 2017 Wednesday, September 27th, 2017 Syreeta Bath - Technical Specialist Vehicle
More informationCreate. Collaborate. Inspire.
Create. Coaborate. Inspire. Touchscreen Manufacturer of the Year INAVATION AWARDS TECHNOLOGY WINNER 2018 #cevertouch cevertouch.com Introduction Workspace AV is integra to the modern office environment.
More informationINTERNET PROTOCOL SECURITY (IPSEC) GUIDE.
INTERNET PROTOCOL SECURITY (IPSEC) GUIDE www.insidesecure.com INTRODUCING IPSEC NETWORK LAYER PACKET SECURITY With the explosive growth of the Internet, more and more enterprises are looking towards building
More informationUnderstanding Cisco Cybersecurity Fundamentals
210-250 Understanding Cisco Cybersecurity Fundamentals NWExam.com SUCCESS GUIDE TO CISCO CERTIFICATION Exam Summary Syllabus Questions Table of Contents Introduction to 210-250 Exam on Understanding Cisco
More informationIntel Server System SR1600 and SR2600 Family
Product Brief Inte Server Systems SR1600UR, SR1625UR, SR2600UR, and SR2625UR Inte Server System SR1600 and SR2600 Famiy Rack-Optimized, Highy Integrated Server Systems for High-Density, Energy-Efficient
More informationDesign of IP Networks with End-to. to- End Performance Guarantees
Design of IP Networks with End-to to- End Performance Guarantees Irena Atov and Richard J. Harris* ( Swinburne University of Technoogy & *Massey University) Presentation Outine Introduction Mutiservice
More informationUNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)
UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) Koji NAKAO, NICT, Japan (Expert of UNECE WP29/TFCS) General Flow of works in WP29/TFCS and OTA Data protection
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 7. Network Security Network Attacks Cryptographic Technologies Message Integrity and Authentication Key Distribution Firewalls Transport Layer
More informationAmazon Elastic Compute Cloud. Amazon Elastic Compute Cloud. Amazon Elastic Compute Cloud 7/12/17. Compute. Instance.
Amazon Eastic Compute Coud Compute - The amount of computationa power required to fufi your workoad Instance - Virtua machines - Charged per hour whie running - Virtua Hardware - AMI - Software (appications,
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationVerizon Software Defined Perimeter (SDP).
Verizon Software Defined Perimeter (). 1 Introduction. For the past decade, perimeter security was built on a foundation of Firewall, network access control (NAC) and virtual private network (VPN) appliances.
More informationFIPS Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points
FIPS 140-2 Security Policy for Cisco Aironet Lightweight AP1131, AP1142, AP1242, AP1252, AP1262, CAP3502e, and CAP3502i Wireless LAN Access Points November 4, 2010 Version 2.2 Contents This security policy
More informationThis Security Policy describes how this module complies with the eleven sections of the Standard:
Vormetric, Inc Vormetric Data Security Server Module Firmware Version 4.4.1 Hardware Version 1.0 FIPS 140-2 Non-Proprietary Security Policy Level 2 Validation May 24 th, 2012 2011 Vormetric Inc. All rights
More informationCCNA Security 1.0 Student Packet Tracer Manual
1.0 Student Packet Tracer Manual This document is exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
More information13W-AutoSPIN Automotive Cybersecurity
13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview
More informationThe Adaptive Platform for Future Use Cases
The Adaptive Platform for Future Use Cases Vector Congress 2016 - Stuttgart, 2016-11-30 V0.1 2016-09-21 Agenda Introduction Adaptive AUTOSAR Architecture Use Cases and Requirements Adaptive AUTOSAR at
More informationSecuring IoT devices with Hardware Secure Element. Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager
Securing IoT devices with Hardware Secure Element Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager 2 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris
More informationFIPS SECURITY POLICY FOR
FIPS 140-2 SECURITY POLICY FOR SPECTRAGUARD ENTERPRISE SENSOR August 26, 2011 FIPS 140-2 LEVEL-2 SECURITY POLICY FOR AIRTIGHT NETWORKS SPECTRAGUARD ENTERPRISE SENSOR 1. Introduction This document describes
More informationSecurity in NVMe Enterprise SSDs
Security in NVMe Enterprise SSDs Radjendirane Codandaramane, Sr. Manager, Applications, Microsemi August 2017 1 Agenda SSD Lifecycle Security threats in SSD Security measures for SSD August 2017 2 SSD
More informationThe case for a Vehicle Gateway.
The case for a Vehicle Gateway. Equipment and Tool Institute ETI-ToolTech_2015_Gateway.pptx 1 Vehicle Data Access Last year we proposed a Vehicle Station Gateway and its associated Unified Gateway Protocol
More informationComputer Networks. College of Computing. Copyleft 2003~2018
Computer Networks Computer Networks Prof. Lin Weiguo Coege of Computing Copyeft 2003~2018 inwei@cuc.edu.cn http://icourse.cuc.edu.cn/computernetworks/ http://tc.cuc.edu.cn Attention The materias beow are
More informationCisco Desktop Collaboration Experience DX650 Security Overview
White Paper Cisco Desktop Collaboration Experience DX650 Security Overview Cisco Desktop Collaboration Experience DX650 Security Overview The Cisco Desktop Collaboration Experience DX650 (Cisco DX650)
More informationSW-Update. Thomas Fleischmann June 5 th 2015
Thomas Fleischmann June 5 th 2015 2 3 Agenda The big picture SW-Update today Diagnostics vs SW-Update Our solution for SW-Update The real challenges beyond getting a file into the car Elektrobit (EB),
More informationSubject: Intel D815EEA Desktop Board - Product Brief (http://channel.intel.com/business
Subject: Inte D815EEA Desktop Board - Product Brief (http://channe.inte.com/business Inte Desktop Board D815EEA for Inte Pentium III and Inte Ceeron Fexibe Graphics and Leading-Edge Performance The Inte
More informationSecurity Policy. 10 th March 2005
DCAP Security Module FIPS 140-2 Level 3 Security Policy 10 th March 2005 Thales e-security Limited, Meadow View House, Long Crendon, Aylesbury, BUCKS HP18 9EQ United Kingdom Tel. +44 (0) 1844 201800 Fax.
More informationIntroducing a Target-Based Approach to Rapid Prototyping of ECUs
Introducing a Target-Based Approach to Rapid Prototyping of ECUs FEBRUARY, 1997 Abstract This paper presents a target-based approach to Rapid Prototyping of Eectronic Contro Units (ECUs). With this approach,
More information