Integrated Assessment of AutomotiveSPICE 3.0, Functional Safety ISO 26262, Cybersecurity SAE J3061
|
|
- Eleanore Brown
- 5 years ago
- Views:
Transcription
1 Integrated Assessment of AutomotiveSPICE 3.0, Functional Safety ISO 26262, Cybersecurity SAE J3061 Christian Kreiner Institute of Technical Informatics TUGraz Richard Messnarz ISCN GesmbH The AQU project is financially supported by the European Commission in the Erasmus+ Programme under the project number CZ01-KA P1 TUG. This website and the project s publications reflect the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein. EuroSPI
2 Workgroup hot topics: Institute of Technical Informatics Industrial Informatics Workgroup Functional safety and embedded systems security ISO 26262, IEC61508, J3061 ECQA Certified Training Provider for Functional Safety ECQA Certified Training Provider for AQUA Development methods Product Line Engineering Standard Quality models (AutomotiveSPICE) Agile Systems Engineering Model-based system development Domain specific languages (Embedded) software architecture Component and middleware architectures Contact: EuroSPI
3 Contact: Dr Richard Messnarz, Accreditated intacs training provider for ISO/IEC and Automotive SPICE VDA-QMC certified training provider ECQA Certified Training Provider for Functional Safety Moderator of SoQrates group > 20 leading German and Austrian companies share knowledge concerning process improvement, safety, security. 3 EuroSPI
4 Contents Example integration of ASPICE, Functional Safety and Cybersecurity (ASQ SQP Volumes) Extended and integrated review and assessment approach (SOQRATES Working Group) Future of Static and Dynamic Cybersecurity System Architectures and Function Groups in Cars 4 EuroSPI
5 Running example: Electronic Power Steering (EPS) EuroSPI
6 Integrated Teams HW Safety & Security Designer Mechatronic Designer System Safety & Security Engineer SW Safety & Security Designer Assembler Manufacturer Technical Project Leader 6 EuroSPI
7 AUTOMOTIVE SPICE 3.0 EuroSPI
8 Automotive SPICE 3.0 terminology: "Element", "Component", "Unit", and "Item" The relationships between element, component, software unit, and item, which are used consistently in the system and software engineering processes. EuroSPI
9 Automotive SPICE key concept: Traceability of System Design and Domain Plug-Ins System Architectural Design describes system functions and their decomposition into hardware, software, mechanical components and functions EuroSPI
10 Automotive SPICE key concept: Traceability and Consistency between the life cycle phases EuroSPI
11 STEERING EuroSPI
12 Classic EPS scope Typical Scope of Supplier ASIL-D ASIL-D ASIL-D EuroSPI
13 Risk Classification 13 EuroSPI
14 Risk Classification 14 EuroSPI
15 Risk Classification 15 EuroSPI
16 Requirements, safety requirements, and traceability Customer Requirements e.g. Steering angle assured by ASIL-D e.g. Mechanical and software based steering endstop Hazard Analysis Identification and classification of safety risks and hazards. e.g. Safety Goal : no uncontrolled actuation of steering system Risk: uncontrolled actuation can happen with wrong sensor input or steering command FMEA / FMEDA Analysis of hazards and safety risks and measures by FMEA and FMEDA e.g. Measure: redundant and diverse rotor position sensors, comparing internal steering angle with external (ADAS command) steering angle. Building a Requirements Traceability as Part of the Safety Case System Requirements e.g. Steering angle is measured internally and reported on the bus. System Requirements Specification Safety Requirements e.g. we need to trust the steering angle at ASIL D, 2 redundant diverse rotor positions, plausi check, safe state in case of deviation. Safe state is assured by a 6 or 12 phase motor with a limp home mode (in ADAS mode with no driver interference). EuroSPI
17 Decomposition (ISO 26262) Independence of elements after decomposition: No dependent failures or Dependent failures have safety mechanism Independent confirmation measures [ISO , Tab1]: Confirmation reviews F.Safety audit F.Safety assessment 17 EuroSPI
18 Functional flow ASIL-D Sin,Cos,Index Pos 1 ASIL-D Sin,Cos,Index Pos 2 Functional Signal Flow Rotor Position 1 Rotor Position 2 ASIL-B ASIL-B ASIC ASIL-D EuroSPI
19 INTEGRATION OF AUTOMOTIVE SPICE, FUNCTIONAL SAFETY, CYBERSECURITY EuroSPI
20 Functional flow for ADAS scenarios Network around the car Steering Command ASIL-D need external steering commands with ASIL-D ASIL-D Sin,Cos,Index Pos 1 ASIL-D Sin,Cos,Index Pos 2 Rotor Position 1 Rotor Position 2 ASIL-B Functional Signal Flow ASIL-B ASIC ASIL-D EuroSPI
21 IT Secure vehicle Understanding interference from IT Security Prio 1: Analyse IT Threats which can lead to the hazardouus failure Prio 2: Analyse additional IT Security Threats 21 EuroSPI
22 Dependable vehicle Understanding interference from Cybersecurity Attack Type* Impact How Spoofing Commands Messages on CAN are used to simulate car is stopping. Checksum algorithm and message structure hacked. Sending a wrong steering command with the correct encryption and identification. Denial of service Tampering Messages on CAN are used to simulate car is never stopping. Changing configuration data in a memory (setting speed limit for activating steering lock) Overloading the bus with speed < 3 km/h so that the steering lock is activated. Changing parking mode from < 10 kmh to < 200 kmh so that parking mode steering is used at high speed (resulting in a too big steering angle) *Following STRIDE security analysis method EuroSPI
23 Dependable vehicle Understanding interference from Cybersecurity Attack Type* Impact How Identity Spoofing Information Disclosure Spoofing identity of garage Spoofing identity of message Memory dump and copying of data, gaining knolwedge about encryption keys, checksum algorithms. Presumptipon of above scenarios. Presumptipon of above scenarios. Elevation of privilege Access to the gateway and access to the priviliged bus in the car Presumptipon of above scenarios. *Following STRIDE security analysis method EuroSPI
24 Dependable vehicle Understanding interference from Cybersecurity Information Disclosure Spoofing Identity Spoofing of Commands Denial of service Maintenan ce tools, listening tools Vehicle Bus and Gateway Vehicle Steering Related ECUs Vehicle Function Steering Lock Automotive Defense Layer 1 Elevation of Priviliges Automotive Defense Layer 2 Tampering Automotive Defense Layer 3 Compared to function chains in Safety, we have to analyse a completely different - intrusion - structure Spoofing of Commands leading to locking ASIL-D 24 EuroSPI
25 Dependable vehicle Understanding interference from Cybersecurity Attack Type* Impact How Spoofing Commands Messages on CAN are used to simulate car is stopping. Checksum algorithm and message structure hacked. Sending a wrong steering command with the correct encryption and identification. Denial of service Tampering Messages on CAN are used to simulate car is never stopping. Changing configuration data in a memory (setting speed limit for activating steering lock) Overloading the bus with speed < 3 km/h so that the steering lock is activated. Changing parking mode from < 10 kmh to < 200 kmh so that parking mode steering is used at high speed (resulting in a too big steering angle) EuroSPI
26 Safety Security traceability Traceability Threat Specification per Safety Goal EuroSPI
27 Automotive Defense Layers SPOOFING OF COMMANDS LEADING TO UNINTENDED STEERING EuroSPI
28 Dynamic Flow through Layers Flow Case 1 : vehicle infrastructure Flow Case 2 service garage Defence Mechanisms Layer 1 GW Gateway Indicator: steering command OBD On Board Diganose Defence Mechanisms Layer 2 Indicators to be monitored: Combining steering command e.g. with speed (active steering), requested torque, etc. DDC Dynamic Drive Control Defence Mechanisms Layer 3 Indicator: Comparing steering angle with internally measured angle by rotor position Electronic sensors Steering ECU and Sensors Defence Mechanisms Layer 4 Motor and Steering Rack Automotive Defense Layer 1 Automotive Defense Layer 2 Automotive Defense Layer 3 Automotive Defense Layer 4 28 Flows are highlighted by variables that can be monitored EuroSPI
29 Defence Layer Model FUNCTION GROUP POWERTRAIN Modelling New Car Architectures and App-Communication FUNCTION GROUP STEERING Gearbo x APP Motor Control APP Steering Lock APP Steerin g APP PLA APP Realtime VM Secure Ethernet Realtime VM Safe Operating System Safe Operating System X (e.g. 10) -Core HW X (e.g. 10) -Core HW 29 EuroSPI
30 Customer SSL Apps FUNCTION GROUP POWERTRAIN Modelling New Car Architectures and App-Communication FUNCTION GROUP STEERING Gearbo x APP Motor Control APP Supplier APP Encryption By Customer Custom er SSL Realtime VM Secure Ethernet Encryption by e.g. Autosar Realtime VM Safe Operating System Safe Operating System X (e.g. 10) -Core HW X (e.g. 10) -Core HW Function Flow with Autosar Encryption plus Internal Customer SSL Encryption on Application Layer (all signals along this critical path are encrypted) 30 EuroSPI
31 SDN Driven System CAR 1 The System is not just the car any more! What is the system scope? CAR i Node with Service A[1] Realtime VM Node with Service B[1] A[n] B[n] C[n] Node with Service A[i] Node with Service B[i] Realtime VM Node with Service C[i].. Safe Operating System Safe Operating System X (e.g. 10) -Core HW X (e.g. 10) -Core HW SDN Software Defined Network is a methid for a network set up where the dependency on the hardware architecture is substituted by a software controlled network where comtrolers offer services in the network. 31 EuroSPI
32 ASPICE 3.0 Integration Integrating Into Base Practices Extended Assessment Questions (ASPICE) SYS.2.BP3 Analyze the impact on the operating environment. Determine the interfaces between the system requirements and other components of the operating environment, and the impact that the requirements will have. [Outcome 3] ISO , Specification of the technical safety requirements ISO , The technical safety requirements shall be specified in accordance with the functional safety concept, the preliminary architectural assumptions of the item and the following system properties: a) the external interfaces, such as communication and user interfaces, if applicable; b) the constraints, e.g. environmental conditions or functional constraints; and c) the system configuration requirements. NOTE: The ability to reconfigure a system for alternative applications is a strategy to reuse existing systems. NOTE: See questions for ISO , and ENG.2 BP1. (Security) SAE J3061, Feature Definition The feature definition defines the system being developed to which the Cybersecurity process will be applied. The feature definition identifies the physical boundaries, Cybersecurity perimeter, and trust boundaries of the feature, including the network perimeter of the feature. 32 EuroSPI
33 SAFETY FUNCTIONS AND CONNECTED VEHICLES EuroSPI
34 Critical signal path scenario 1. Vehicle local sensors (correctness?) 2. signals sent to service infrastructure (correctly related to position etc.?) The world is bigger ADAS (connected) environments Cloud based infrastructure for driving support Driving events databases (OEM, authorities) Driving data analysis Cloud driving services 3. Cloud storage (corruption?) 4. merge with other cars signals (data poisoning?) in the current vicinity (correct location?) and those ever operated near the current position (depending on the algorithm for driving data analysis, and its correctness). Infrastructure base stations Mobile internet technologies Radio-navigation satellite systems 5. Up-to date steering angle recommendation & road conditions for the current position sent to all the cars (availablitiy, low latency, correctness, scalability?). Vehicles report driving Vehicles get driving situation, events into the cloud: recommendations, commands from the cloud: 6. Steering angle is applied to the cars E.g. position, speed, E.g. steering related: steering angle, obstacles * instantaneous steering angle of neighbor cars steering (correct in the current context?). detected,... * typical steering angle for road position, * obstacles detected,... EuroSPI
35 Proposed ASPICE extension for Automotive Service Infrastructure (ASI processes) Expected typical properties ASIL-D QoS (Quality of Service) service monitoring for correct operation, availability, scalability and low latency. Preparedness for interruption of connectivity - local take-over (challenging for eg. platooning) Cybersecurity of service infrastructure (eg. wrong data injected, services spoofed, stored data and algorithms tampered with, messages altered) Etc. EuroSPI
36 Extension of ASPICE for Automotive Service Infrastructure ASI processes By example: ASI.2 Requirements Analysis Base practice BP4 ASI.2.BP4: Analyze the interfaces between the vehicle and the service infrastructure. Analog and linked to SYS.2.BP4: Analyze the impact on the operating environment Identify the interfaces between the vehicle and the service infrastructure. Analyze the impact that the service infrastructure interfaces will have on the vehicle operating environment. OUTCOMES: Quality of Service (Availability), Defined reaction in case of no availability, criticality of information, safety classification (if provided as QM or validated among a set of data to be provided with an ASIL), encryption and identification mechanisms to be implemented. Extended Cybersecurity (SAE J3061:2016) Assessment Questions : Related to SAE J3061:2016, clauses Feature Definition identifies physical boundaries, Cybersecurity perimeter, and trust boundaries of the feature, including the network perimeter of the feature. The feature definition defines the scope and interfaces of the feature. EuroSPI Christian Kreiner,TUGraz Richard Messnarz, ISCN 36
37 RELATED SKILLS PROJECTS AQUA ECOSYSTEM EuroSPI
38 AQUA - Knowledge Alliance for Training Quality and Excellence in Automotive EU Sector Skills Alliance for Automotive Aims: A unique, sustainable strategic alliance for modern certified VET Curricula for the automotive sector Industry aligned Capable of Europe-wide implementation Certified VET training course: Integrated Quality, Functional Safety, and Six Sigma in Automotive Certification by European Certification and Qualification Association ( Incorporated into Automotive Clusters Qualification programmes University Education (TUGraz, Grenoble INP) This project has been funded with support from the European Commission under agreement EAC This publication/communication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein. EuroSPI Christian Kreiner,TUGraz Richard Messnarz, ISCN 38
39 AQUA Skills Set Automotive Quality Manager with AQUA Skills UnitID Unit Name Element ID Element Name AQUA.U1 Introduction AQUA.U1.E1 Integration view and general part AQUA.U1.E2 Organisational readiness AQUA.U2 Product Development AQUA.U2.E1 AQUA.U2.E2 AQUA.U2.E3 Lifecycle Requirements Design Each element contains four views: integrated perspective Automotive SPICE perspective Functional Safety perspetcive Six Sigma perspective AQUA.U3 Quality and Safety management AQUA.U2.E4 AQUA.U3.E1 AQUA.U3.E2 AQUA.U3.E3 Integration and Testing Capability Hazard & Risk management Assessment and audit AQUA.U4 Measure AQUA.U4.E1 Measurements AQUA.U4.E2 Reliability EuroSPI
40 SafEUr - ECQA Certified Functional Safety Manager Industry training and TUGraz course: Functional Safety Introduction, Management, Engineering, Production, Legal, Qualification topics Modular: 15 course elements Face-to-face and online delivery Heavily based on Industry Best Practice ISO26262, IEC61508 Skills set aligned with Industry Europe-wide certification by European Certification and Qualification Association ( Contact: Christian.Kreiner@tugraz.at EuroSPI Christian Kreiner,TUGraz Richard Messnarz, ISCN 40
41 Automotive Quality Universities (AQU) AQUA alliance extension to higher education Partners VŠB - Technical University of Ostrava, CZ Graz University of Technology, AT UAS Joanneum, Graz, AT University of Maribor EE + CS, SLO ISCN IE/AT EMIRAcle (European Innovation in Manufacturing Association), BE/FR Grenoble INP (EMIRAcle) Hochschule Düsseldorf (EMIRAcle) ECQA Online Campus for Industry The AQU project is financially supported by the European Commission in the Erasmus+ Programme under the project number CZ01-KA P1 TUG. This website and the project s publications reflect the views only of the authors, and the Commission cannot be held responsible for any use which may be made EuroSPI Christian Kreiner 41 of the information contained therein.
42 Regular student s course from 2014 AQUA university course for industry (TU Graz Life-long-learning progm. & ECQA) 1st ECVET-ECTS bridge between university and industry education Coordinator of AQUA project - EU funded Sector Skills Alliance Automotive Quality Universities EU project (partner) TU Graz Christian Kreiner EuroSPI
43 The AQUA ecosystem current state AQU - AQUA Quality Universities (EQF Level 6-8) AQUA for ROC (EQF Level 4-5) Planned AQUA extension Integrated Cybersecurity automotive & medical & automation Yellow Belt Orange Belt Green Belt Black Belt ECQA Functional Safety Manager /Engineer AQUA MOOCs? SPI manager/facilitator Integrated, interdisciplinary Innovation and improvment intacs Automotive SPICE ECQA Integrated Design Engineer More Christian Kreiner EuroSPI
ECQA Certified Integrated Designer
Become an ECQA Certified Integrated Designer How? www.ecqa.org Through an ECQA Certified Online Training Campus When? Starting date 10. 5. 2010 (free of cost) Starting date 27. 7. 2010 (free of cost) Who?
More informationINTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061
INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061 23rd EuroAsiaSPI Conference, Graz, Austria Georg Macher AVL List GmbH (Headquarters) INTEGRATING
More informationRiccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist
Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist Internet of Things Group 2 Internet of Things Group 3 Autonomous systems: computing platform Intelligent eyes Vision. Intelligent
More informationDeriving safety requirements according to ISO for complex systems: How to avoid getting lost?
Deriving safety requirements according to ISO 26262 for complex systems: How to avoid getting lost? Thomas Frese, Ford-Werke GmbH, Köln; Denis Hatebur, ITESYS GmbH, Dortmund; Hans-Jörg Aryus, SystemA GmbH,
More informationMASP Chapter on Safety and Security
MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio
More informationECQA Certified EU Project Manager
Become an ECQA Certified EU Project Manager www.ecqa.org How? Through an ECQA Certified Online Training Campus When? 1. 2. 2010 26. 2. 2010 7. 4. 2010 30. 4. 2010 7. 6. 2010 2. 7. 2010 4. 10. 2010 29.
More informationThe Key Principles of Cyber Security for Connected and Automated Vehicles. Government
The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational
More informationSafety and Security for Automotive using Microkernel Technology
Informationstag "Das Automobil als IT-Sicherheitsfall" Berlin, 11.05.2012 Safety and Security for Automotive using Microkernel Technology Dr.-Ing. Matthias Gerlach OpenSynergy TwoBirds withonestone Safety
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More informationSecurity and Privacy in Car2Car Adhoc Networks
Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2
More informationSoftware architecture in ASPICE and Even-André Karlsson
Software architecture in ASPICE and 26262 Even-André Karlsson Agenda Overall comparison (3 min) Why is the architecture documentation difficult? (2 min) ASPICE requirements (8 min) 26262 requirements (12
More informationClick ISO to edit Master title style Update on development of the standard
Click ISO 26262 to edit Master title style Update on development of the standard Dr David Ward Head of Functional Safety January 2016 Agenda Why update ISO 26262? What is the process for updating the standard?
More information10 th AUTOSAR Open Conference
10 th AUTOSAR Open Conference Dr. Moritz Neukirchner Elektrobit Automotive GmbH Building Performance ECUs with Adaptive AUTOSAR AUTOSAR Nov-2017 Major market trends and their impact Trends Impact on E/E
More informationEurope wide Industry Certification Using Standard Procedures based on ISO 17024
Europe wide Industry Certification Using Standard Procedures based on ISO 17024 Richard Messnarz, Damjan Ekert International Software Consulting Network GesmbH (ISCN) Austria {dekert, rmess}@iscn.com Prof.
More informationUNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)
UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) Koji NAKAO, NICT, Japan (Expert of UNECE WP29/TFCS) General Flow of works in WP29/TFCS and OTA Data protection
More informationCertified Automotive Software Tester Sample Exam Paper Syllabus Version 2.0
Surname, Name: Gender: male female Company address: Telephone: Fax: E-mail-address: Invoice address: Training provider: Trainer: Certified Automotive Software Tester Sample Exam Paper Syllabus Version
More informationSecure Product Design Lifecycle for Connected Vehicles
Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards
More informationIOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT
IOT FLAGSHIP PROJECT Dr. Mario Drobics, AIT Challenge Digitalization over the entire product lifecycle accelerates the development, validation, instrumentation and deployment of complex industrial products
More informationFailure Diagnosis and Prognosis for Automotive Systems. Tom Fuhrman General Motors R&D IFIP Workshop June 25-27, 2010
Failure Diagnosis and Prognosis for Automotive Systems Tom Fuhrman General Motors R&D IFIP Workshop June 25-27, 2010 Automotive Challenges and Goals Driver Challenges Goals Energy Rising cost of petroleum
More informationAutonomous Driving needs Safety & Security. Embedded World 2018 Dr. Ciwan Gouma
Autonomous Driving needs Safety & Security Embedded World 2018 Dr. Ciwan Gouma Autonomous Driving The Vision The vision is not new. Picture left (maybe you have seen this in other presentations) but why
More informationControlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:
Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information
More information13W-AutoSPIN Automotive Cybersecurity
13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationCyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies
Cyber Security and Vehicle Diagnostics Mark Zachos DG Technologies SAE INTERNATIONAL SAE J3061 Cybersecurity Guidebook for Cyber-Physical Automotive Systems Published January 2016; drive to a risk-based,
More informationFunctional Safety Architectural Challenges for Autonomous Drive
Functional Safety Architectural Challenges for Autonomous Drive Ritesh Tyagi: August 2018 Topics Market Forces Functional Safety Overview Deeper Look Fail-Safe vs Fail-Operational Architectural Considerations
More informationAn Evaluation of using SPICE in an Enterprise Environment A Concept for Integrating various Quality Standards
An Evaluation of using SPICE in an Enterprise Environment A Concept for Integrating various Quality Standards, Austria Philipp Hagenmeyer, ZF Friedrichshafen, Germany Cristina Romcea, Continental Engineering
More informationISO Functional Safety Management in the Autonomous Car industry and the overview of the required safety lifecycle.
ISO 26262 Functional Safety Management in the Autonomous Car industry and the overview of the required safety lifecycle TÜV SÜD America PSES San Diego Chapter Meeting Sep. 12, 2017 TÜV SÜD AG Slide 1 Functional
More informationCrises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.
Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility
More informationAutomotive Functional Safety
Automotive Functional Safety Complexity, Confidence, Compliance, Certification Farmington, 2018-03-22 23.03.2018 150 years TÜV SÜD 150 years of inspiring trust Inspiring trust since 1866 The year 2016
More informationSecurity In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.
Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property
More informationSecuring the future of mobility
Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need
More informationConquering Complexity: Addressing Security Challenges of the Connected Vehicle
Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018 Securely Connecting People, Applications, and Devices Ted Shorter Chief Technology Officer CSS Ted.Shorter@css-security.com
More informationIs This What the Future Will Look Like?
Is This What the Future Will Look Like? Implementing fault tolerant system architectures with AUTOSAR basic software Highly automated driving adds new requirements to existing safety concepts. It is no
More informationDriving virtual Prototyping of Automotive Electronics
Driving virtual Prototyping of Electronics B. Hellenthal, AUDI AG, Competence Center Electronics & Semiconductor, DVCon, Munich, October 17 th, 2017 Project Idea More space for passengers enabled by decreasing
More informationThe Safe State: Design Patterns and Degradation Mechanisms for Fail- Operational Systems
The Safe State: Design Patterns and Degradation Mechanisms for Fail- Operational Systems Alexander Much 2015-11-11 Agenda About EB Automotive Motivation Comparison of different architectures Concept for
More informationIoT & SCADA Cyber Security Services
RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au
More informationPENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017
PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT
More informationSecurity Challenges with ITS : A law enforcement view
Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr
More informationAlexandre Esper, Geoffrey Nelissen, Vincent Nélis, Eduardo Tovar
Alexandre Esper, Geoffrey Nelissen, Vincent Nélis, Eduardo Tovar Current status MC model gradually gaining in sophistication Current status MC model gradually gaining in sophistication Issue Safety-related
More informationECQA Certified Terminology Manager Basic: Great acceptance of the community internationally after launching the online platform
ECQA Conference 2010 ECQA Certified Terminology Manager Basic: Great acceptance of the community internationally after launching the online platform Launch, policy and future perspectives Blanca Nájera
More informationDesigning a software framework for automated driving. Dr.-Ing. Sebastian Ohl, 2017 October 12 th
Designing a software framework for automated driving Dr.-Ing. Sebastian Ohl, 2017 October 12 th Challenges Functional software architecture with open interfaces and a set of well-defined software components
More informationIn Accountable IoT We Trust
In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design
More informationCompute solutions for mass deployment of autonomy
Compute solutions for mass deployment of autonomy Rod Watt Director of Vehicle Architecture and System Analysis Introduction 2 From inception to now 1990 Joint venture between Acorn Computers and Apple.
More informationCertified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team
Certified Software Quality Engineer (CSQE) Preparation course is an on demand, web-based course design to be a comprehensive, in-depth review of the topics in the ASQ s Certified Software Quality Engineer
More informationGerman OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer
German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer Daimler Business Units German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer
More informationCyber Security Technologies
1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales
More informationApplying and Evaluating Architectural IEC Safety Patterns
Applying and Evaluating Architectural IEC 61508 Safety Patterns Christopher Preschern, Nermin Kajtazovic, and Christian Kreiner Abstract An important step for developing a safety-critical system is the
More informationManchester Metropolitan University Information Security Strategy
Manchester Metropolitan University Information Security Strategy 2017-2019 Document Information Document owner Tom Stoddart, Information Security Manager Version: 1.0 Release Date: 01/02/2017 Change History
More informationCommunication Patterns in Safety Critical Systems for ADAS & Autonomous Vehicles Thorsten Wilmer Tech AD Berlin, 5. March 2018
Communication Patterns in Safety Critical Systems for ADAS & Autonomous Vehicles Thorsten Wilmer Tech AD Berlin, 5. March 2018 Agenda Motivation Introduction of Safety Components Introduction to ARMv8
More informationTRAINING COURSE CERTIFICATION (TCC) COURSE REQUIREMENTS
TRAINING COURSE CERTIFICATION (TCC) COURSE REQUIREMENTS Quality Management System (QMS) Internal Auditor Training Course Exemplar Global International Training Certification Programs Exemplar Global, Inc.
More informationInnovation policy for Industry 4.0
Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda
More informationInformation Security Management System
Information Security Management System Based on ISO/IEC 17799 Houman Sadeghi Kaji Spread Spectrum Communication System PhD., Cisco Certified Network Professional Security Specialist BS7799 LA info@houmankaji.net
More informationCertified Information Security Manager (CISM) Course Overview
Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,
More informationThe Remote Exploitation of Unaltered Passenger Vehicles Revisited. 20 th October 2016 Mark Pitchford, Technical Manager, EMEA
The Remote Exploitation of Unaltered Passenger Vehicles Revisited 20 th October 2016 Mark Pitchford, Technical Manager, EMEA Today s hot topic A few years ago, Lynx presentations at events such as this
More informationKPIT S Connected Vehicle Practice
KPIT S Connected Vehicle Practice Vehicle Telematics Vehicle-to-Anything (V2X) Cybersecurity With an intent to shape up the futuristic Internet-of-Vehicles era, KPIT offers Vehicle-to-anything (V2X) solutions
More informationFunctional Safety and Cyber-Security Experiences and Trends
Functional Safety and Cyber-Security Experiences and Trends Dr. Christof Ebert, Vector Consulting Services V1.0 2017-12-11 Welcome Vector Consulting Services Experts for product development, product strategy
More informationCyber security mechanisms for connected vehicles
Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX
More informationAutomotive Anomaly Monitors and Threat Analysis in the Cloud
Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications
More informationBackground JPG
International Software-Experts for Collaborative Networks I.S.C.N. GesmbH Liebenauer Hauptstrasse 2-6 Freiraum Büro Centre Stiege D, 1 st Floor A-8041 Graz, Austria Tel.: +43 (0)316 815910 Fax.: +43 316
More informationCEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''
CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''
More informationNovember 16, TTTech Computertechnik AG / TTTech Auto AG Copyright TTTech Auto AG. All rights reserved
Future Mobility Approaches and Required Developments for On-board Networks and ADAS Computers Andreas ECKEL, Teamlead Grants Jan RADKE, Cooperation Manager TTTech Computertechnik AG / TTTech Auto AG November
More informationISO meets AUTOSAR - First Lessons Learned Dr. Günther Heling
ISO 26262 meets AUTOSAR - First Lessons Learned Dr. Günther Heling Agenda 1. ISO 26262 and AUTOSAR Two Basic Contradictions Top-Down vs. Reuse Concentration vs. Distribution 2. Approach Mixed ASIL System
More informationOnline Student Exam Guide. for. ECQA Certified Professions
Page: 1/26 Online Student Exam Guide for ECQA Certified Professions R. Messnarz (ISCN) D. Ekert (ISCN) Status: Name: Date: Signature: Draft: R. Messnarz, D. Ekert 14.2.2008 n.n. electronically Reviewed:
More informationCybersecurity Engineering and Assurance for Connected and Automated Vehicles
Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Paul Wooderson Vehicle cybersecurity concerns Privacy vehicle as a data hub Theft physical cybersecurity Safety - impacts of
More informationArchitecture concepts in Body Control Modules
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Course 7 www.continental-corporation.com Interior Body and Security Table Of Contents
More informationARM processors driving automotive innovation
ARM processors driving automotive innovation Chris Turner Director of advanced technology marketing, CPU group ARM tech forums, Seoul and Taipei June/July 2016 The ultimate intelligent connected device
More informationCOMPANION FINAL EVENT 14 TH & 15 TH September 2016
COMPANION FINAL EVENT 14 TH & 15 TH September 2016 Update on recent developments related to Connected and Automated Driving Myriam COULON CANTUER Smart Mobility & Living Communication Networks, Content
More informationSafety Argument based on GSN for Automotive Control Systems. Yutaka Matsubara Nagoya University
1 Safety Argument based on GSN for Automotive Control Systems Yutaka Matsubara Nagoya University yutaka@ertl.jp 02.26.2014 2 Agenda 1. Safety argument in ISO26262 2. Requirements related to safety argument
More informationMIGRATING TO CAN FD. Tony Adamson. Marketing Director CAN / LIN / FlexRay
MIGRATING TO CAN FD Tony Adamson Marketing Director CAN / LIN / FlexRay Agenda WHO ARE WE CAR NETWORKS UNDER TRANSFORMATION SPEED SRITY OUR MISSION AND STRATEGY 2 2 FEBRUARY 16, 2016 VECTOR CAN FD SYMPOSIUM
More informationThe Digitising European Industry strategy & H2020 calls related to Cyber-Physical Systems
The Digitising European Industry strategy & H2020 calls related to Cyber-Physical Systems #DigitiseEU Dr. Werner Steinhögl European Commission - DG CONNECT Technologies and Systems for Digitising Industry
More informationTaking the Right Turn with Safe and Modular Solutions for the Automotive Industry
Taking the Right Turn with Safe and Modular Solutions for the Automotive Industry A Time-Triggered Middleware for Safety- Critical Automotive Applications Ayhan Mehmet, Maximilian Rosenblattl, Wilfried
More informationAdvent IM Ltd ISO/IEC 27001:2013 vs
Advent IM Ltd ISO/IEC 27001:2013 vs 2005 www.advent-im.co.uk 0121 559 6699 bestpractice@advent-im.co.uk Key Findings ISO/IEC 27001:2013 vs. 2005 Controls 1) PDCA as a main driver is now gone with greater
More informationAUTOSAR proofs to be THE automotive software platform for intelligent mobility
AUTOSAR proofs to be THE automotive software platform for intelligent mobility Dr.-Ing. Thomas Scharnhorst AUTOSAR Spokesperson Simon Fürst, BMW AG Stefan Rathgeber, Continental Corporation Lorenz Slansky,
More informationSecurity
Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from
More informationINDUSTRIAL SECURITY STORMSHIELD PROTECTION FOR OPERATIONAL NETWORKS. Unified Threat Management and Next-Generation Firewalls Solutions
INDUSTRIAL SECURITY STORMSHIELD PROTECTION FOR OPERATIONAL NETWORKS Unified Threat Management and Next-Generation Firewalls Solutions Our mission To make the digital world a sustainable and trustworthy
More informationVdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe
Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a
More informationACARE WG 4 Security Overview
ACARE WG 4 Security Overview ART WS ATM Security and Cybersecurity Kristof Lamont ATM & Cyber Security Expert 23 March 2016 ACARE Advisory Council for Aviation Research and Innovation in Europe http://www.acare4europe.com/
More informationTurbocharging Connectivity Beyond Cellular
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Turbocharging Connectivity Beyond Cellular Scott Beutler, Head of Interior Division
More informationScalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018
Scalable and Flexible Software Platforms for High-Performance ECUs Christoph Dietachmayr Sr. Engineering Manager, November 8, Agenda A New E/E Architectures and High-Performance ECUs B Non-Functional Aspects:
More informationAutomotive Security Standardization activities and attacking trend
Automotive Standardization activities and attacking trend Ingo Dassow, Deloitte November 2017 Automotive Risk Overview Trends and risks for connected vehicles 2 Value and Components of a Car Autonomous
More informationCybersecurity, safety and resilience - Airline perspective
Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,
More informationA regulatory framework for connected and automated driving Towards a strengthened cooperation
A regulatory framework for connected and automated driving Towards a strengthened cooperation 3 rd SIP-adus WS TOKYO, JAPAN Friedemann Bruehl JAIA, on behalf of ACEA 2016 年 11 月 15 日 ( 火 ) ACEA MEMBERS
More informationINFORMATION ASSURANCE DIRECTORATE
National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such
More informationIntegrated design for tackling safety and security challenges of smart products and digital manufacturing
Integrated design for tackling safety and security challenges of smart products and digital manufacturing Andreas Riel, Christian Kreiner, Georg Macher, Richard Messnarz To cite this version: Andreas Riel,
More informationCurrent status and Future of AUTOSAR. Markus Bechter 7 th AUTOSAR Open Conference Oct. 22 nd -23 rd 2014, Detroit
Current status and Future of AUTOSAR Markus Bechter 7 th AUTOSAR Open Conference Oct. 22 nd -23 rd 2014, Detroit Overview Achievements AUTOSAR Products Future of AUTOSAR 3 Achievements new concepts in
More informationIntegrated C4isr and Cyber Solutions
Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a
More informationHow Microcontrollers help GPUs in Autonomous Drive
How Microcontrollers help GPUs in Autonomous Drive GTC 2017 Munich, 2017-10-12 Hans Adlkofer, VP Automotive System department Outline 1 Main Safety concepts 2 Sensor Fusion architecture and functionalities
More informationVoertuigconstructeurs en data economie
Voertuigconstructeurs en data economie STUDIEDAG VERKEERSVEILIGHEID VLAAMS HUIS VOOR DE VERKEERSVEILIGHEID DEPT MOW VLAAMS PARLEMENT, BRUSSEL 11 DECEMBER 2017 Saturday, 30 December 2017 AGENDA 1. Context
More informationOVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS
OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction L3Pilot: Pilot Testing INFRAMIX: Hybrid Infrastructure SAFERtec:Cyber-security / Security
More informationAutomotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017
Automotive Security: Challenges, Standards and Solutions Alexander Much 12 October 2017 Driver s fears are being fueled by recent news Connected Cars, new opportunities for hackers Autonomous Driving Concepts
More informationSPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001)
BELAC 2-405-ISMS R0 2017 SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001) The only valid versions of the documents
More informationWE IMPROVE THE WORLD THROUGH ENGINEERING!
WE IMPROVE THE WORLD THROUGH ENGINEERING! MARCH 2018 Assystem Technologies worldwide At a glance. 700m TURNOVER IN 2017 PORTFOLIO: Product Engineering Consulting In Service Offerings >9.000 EMPLOYEES OUR
More informationTRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS
TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS MATTHEW SHORT SR PRODUCT LINE MANAGER DIGITAL NETWORKING MATTHEW.SHORT@NXP.COM A NEW POSITION OF STRENGTH #1 Communications Processors #1 RF Power Transistors
More informationCTFL -Automotive Software Tester Sample Exam Paper Syllabus Version 2.0
Surname, Forename: Gender: male female Company address: Telephone: Fax: E-mail-address: Invoice address: Training provider: Trainer: CTFL -Automotive Software Tester Sample Exam Paper Syllabus Version
More informationBuilding a Resilient Security Posture for Effective Breach Prevention
SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.
More informationAutonomous Driving From Fail-Safe to Fail-Operational Systems
Autonomous Driving From Fail-Safe to Fail-Operational Systems Rudolf Grave December 3, 2015 Agenda About EB Automotive Autonomous Driving Requirements for a future car infrastructure Concepts for fail-operational
More informationAutomotive Security An Overview of Standardization in AUTOSAR
Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver
More informationVerification and Validation of High-Integrity Systems
Verification and Validation of High-Integrity Systems Chethan CU, MathWorks Vaishnavi HR, MathWorks 2015 The MathWorks, Inc. 1 Growing Complexity of Embedded Systems Emergency Braking Body Control Module
More informationCar2Car Forum Operational Security
Car2Car Forum 2012 14.11.2012 Operational Security Stefan Goetz, Continental Hervé Seudié, Bosch Working Group Security Task Force: In-vehicle Security and Trust Assurance Level 15/11/2012 C2C-CC Security
More informationCyber security of automated vehicles
Cyber security of automated vehicles B. Steurich Infineon Technologies Conference Sep. 2017, Berlin Building blocks of automated driving: Cooperation of multiple system and disciplines Data Processing
More information