Integrated Assessment of AutomotiveSPICE 3.0, Functional Safety ISO 26262, Cybersecurity SAE J3061

Size: px
Start display at page:

Download "Integrated Assessment of AutomotiveSPICE 3.0, Functional Safety ISO 26262, Cybersecurity SAE J3061"

Transcription

1 Integrated Assessment of AutomotiveSPICE 3.0, Functional Safety ISO 26262, Cybersecurity SAE J3061 Christian Kreiner Institute of Technical Informatics TUGraz Richard Messnarz ISCN GesmbH The AQU project is financially supported by the European Commission in the Erasmus+ Programme under the project number CZ01-KA P1 TUG. This website and the project s publications reflect the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein. EuroSPI

2 Workgroup hot topics: Institute of Technical Informatics Industrial Informatics Workgroup Functional safety and embedded systems security ISO 26262, IEC61508, J3061 ECQA Certified Training Provider for Functional Safety ECQA Certified Training Provider for AQUA Development methods Product Line Engineering Standard Quality models (AutomotiveSPICE) Agile Systems Engineering Model-based system development Domain specific languages (Embedded) software architecture Component and middleware architectures Contact: EuroSPI

3 Contact: Dr Richard Messnarz, Accreditated intacs training provider for ISO/IEC and Automotive SPICE VDA-QMC certified training provider ECQA Certified Training Provider for Functional Safety Moderator of SoQrates group > 20 leading German and Austrian companies share knowledge concerning process improvement, safety, security. 3 EuroSPI

4 Contents Example integration of ASPICE, Functional Safety and Cybersecurity (ASQ SQP Volumes) Extended and integrated review and assessment approach (SOQRATES Working Group) Future of Static and Dynamic Cybersecurity System Architectures and Function Groups in Cars 4 EuroSPI

5 Running example: Electronic Power Steering (EPS) EuroSPI

6 Integrated Teams HW Safety & Security Designer Mechatronic Designer System Safety & Security Engineer SW Safety & Security Designer Assembler Manufacturer Technical Project Leader 6 EuroSPI

7 AUTOMOTIVE SPICE 3.0 EuroSPI

8 Automotive SPICE 3.0 terminology: "Element", "Component", "Unit", and "Item" The relationships between element, component, software unit, and item, which are used consistently in the system and software engineering processes. EuroSPI

9 Automotive SPICE key concept: Traceability of System Design and Domain Plug-Ins System Architectural Design describes system functions and their decomposition into hardware, software, mechanical components and functions EuroSPI

10 Automotive SPICE key concept: Traceability and Consistency between the life cycle phases EuroSPI

11 STEERING EuroSPI

12 Classic EPS scope Typical Scope of Supplier ASIL-D ASIL-D ASIL-D EuroSPI

13 Risk Classification 13 EuroSPI

14 Risk Classification 14 EuroSPI

15 Risk Classification 15 EuroSPI

16 Requirements, safety requirements, and traceability Customer Requirements e.g. Steering angle assured by ASIL-D e.g. Mechanical and software based steering endstop Hazard Analysis Identification and classification of safety risks and hazards. e.g. Safety Goal : no uncontrolled actuation of steering system Risk: uncontrolled actuation can happen with wrong sensor input or steering command FMEA / FMEDA Analysis of hazards and safety risks and measures by FMEA and FMEDA e.g. Measure: redundant and diverse rotor position sensors, comparing internal steering angle with external (ADAS command) steering angle. Building a Requirements Traceability as Part of the Safety Case System Requirements e.g. Steering angle is measured internally and reported on the bus. System Requirements Specification Safety Requirements e.g. we need to trust the steering angle at ASIL D, 2 redundant diverse rotor positions, plausi check, safe state in case of deviation. Safe state is assured by a 6 or 12 phase motor with a limp home mode (in ADAS mode with no driver interference). EuroSPI

17 Decomposition (ISO 26262) Independence of elements after decomposition: No dependent failures or Dependent failures have safety mechanism Independent confirmation measures [ISO , Tab1]: Confirmation reviews F.Safety audit F.Safety assessment 17 EuroSPI

18 Functional flow ASIL-D Sin,Cos,Index Pos 1 ASIL-D Sin,Cos,Index Pos 2 Functional Signal Flow Rotor Position 1 Rotor Position 2 ASIL-B ASIL-B ASIC ASIL-D EuroSPI

19 INTEGRATION OF AUTOMOTIVE SPICE, FUNCTIONAL SAFETY, CYBERSECURITY EuroSPI

20 Functional flow for ADAS scenarios Network around the car Steering Command ASIL-D need external steering commands with ASIL-D ASIL-D Sin,Cos,Index Pos 1 ASIL-D Sin,Cos,Index Pos 2 Rotor Position 1 Rotor Position 2 ASIL-B Functional Signal Flow ASIL-B ASIC ASIL-D EuroSPI

21 IT Secure vehicle Understanding interference from IT Security Prio 1: Analyse IT Threats which can lead to the hazardouus failure Prio 2: Analyse additional IT Security Threats 21 EuroSPI

22 Dependable vehicle Understanding interference from Cybersecurity Attack Type* Impact How Spoofing Commands Messages on CAN are used to simulate car is stopping. Checksum algorithm and message structure hacked. Sending a wrong steering command with the correct encryption and identification. Denial of service Tampering Messages on CAN are used to simulate car is never stopping. Changing configuration data in a memory (setting speed limit for activating steering lock) Overloading the bus with speed < 3 km/h so that the steering lock is activated. Changing parking mode from < 10 kmh to < 200 kmh so that parking mode steering is used at high speed (resulting in a too big steering angle) *Following STRIDE security analysis method EuroSPI

23 Dependable vehicle Understanding interference from Cybersecurity Attack Type* Impact How Identity Spoofing Information Disclosure Spoofing identity of garage Spoofing identity of message Memory dump and copying of data, gaining knolwedge about encryption keys, checksum algorithms. Presumptipon of above scenarios. Presumptipon of above scenarios. Elevation of privilege Access to the gateway and access to the priviliged bus in the car Presumptipon of above scenarios. *Following STRIDE security analysis method EuroSPI

24 Dependable vehicle Understanding interference from Cybersecurity Information Disclosure Spoofing Identity Spoofing of Commands Denial of service Maintenan ce tools, listening tools Vehicle Bus and Gateway Vehicle Steering Related ECUs Vehicle Function Steering Lock Automotive Defense Layer 1 Elevation of Priviliges Automotive Defense Layer 2 Tampering Automotive Defense Layer 3 Compared to function chains in Safety, we have to analyse a completely different - intrusion - structure Spoofing of Commands leading to locking ASIL-D 24 EuroSPI

25 Dependable vehicle Understanding interference from Cybersecurity Attack Type* Impact How Spoofing Commands Messages on CAN are used to simulate car is stopping. Checksum algorithm and message structure hacked. Sending a wrong steering command with the correct encryption and identification. Denial of service Tampering Messages on CAN are used to simulate car is never stopping. Changing configuration data in a memory (setting speed limit for activating steering lock) Overloading the bus with speed < 3 km/h so that the steering lock is activated. Changing parking mode from < 10 kmh to < 200 kmh so that parking mode steering is used at high speed (resulting in a too big steering angle) EuroSPI

26 Safety Security traceability Traceability Threat Specification per Safety Goal EuroSPI

27 Automotive Defense Layers SPOOFING OF COMMANDS LEADING TO UNINTENDED STEERING EuroSPI

28 Dynamic Flow through Layers Flow Case 1 : vehicle infrastructure Flow Case 2 service garage Defence Mechanisms Layer 1 GW Gateway Indicator: steering command OBD On Board Diganose Defence Mechanisms Layer 2 Indicators to be monitored: Combining steering command e.g. with speed (active steering), requested torque, etc. DDC Dynamic Drive Control Defence Mechanisms Layer 3 Indicator: Comparing steering angle with internally measured angle by rotor position Electronic sensors Steering ECU and Sensors Defence Mechanisms Layer 4 Motor and Steering Rack Automotive Defense Layer 1 Automotive Defense Layer 2 Automotive Defense Layer 3 Automotive Defense Layer 4 28 Flows are highlighted by variables that can be monitored EuroSPI

29 Defence Layer Model FUNCTION GROUP POWERTRAIN Modelling New Car Architectures and App-Communication FUNCTION GROUP STEERING Gearbo x APP Motor Control APP Steering Lock APP Steerin g APP PLA APP Realtime VM Secure Ethernet Realtime VM Safe Operating System Safe Operating System X (e.g. 10) -Core HW X (e.g. 10) -Core HW 29 EuroSPI

30 Customer SSL Apps FUNCTION GROUP POWERTRAIN Modelling New Car Architectures and App-Communication FUNCTION GROUP STEERING Gearbo x APP Motor Control APP Supplier APP Encryption By Customer Custom er SSL Realtime VM Secure Ethernet Encryption by e.g. Autosar Realtime VM Safe Operating System Safe Operating System X (e.g. 10) -Core HW X (e.g. 10) -Core HW Function Flow with Autosar Encryption plus Internal Customer SSL Encryption on Application Layer (all signals along this critical path are encrypted) 30 EuroSPI

31 SDN Driven System CAR 1 The System is not just the car any more! What is the system scope? CAR i Node with Service A[1] Realtime VM Node with Service B[1] A[n] B[n] C[n] Node with Service A[i] Node with Service B[i] Realtime VM Node with Service C[i].. Safe Operating System Safe Operating System X (e.g. 10) -Core HW X (e.g. 10) -Core HW SDN Software Defined Network is a methid for a network set up where the dependency on the hardware architecture is substituted by a software controlled network where comtrolers offer services in the network. 31 EuroSPI

32 ASPICE 3.0 Integration Integrating Into Base Practices Extended Assessment Questions (ASPICE) SYS.2.BP3 Analyze the impact on the operating environment. Determine the interfaces between the system requirements and other components of the operating environment, and the impact that the requirements will have. [Outcome 3] ISO , Specification of the technical safety requirements ISO , The technical safety requirements shall be specified in accordance with the functional safety concept, the preliminary architectural assumptions of the item and the following system properties: a) the external interfaces, such as communication and user interfaces, if applicable; b) the constraints, e.g. environmental conditions or functional constraints; and c) the system configuration requirements. NOTE: The ability to reconfigure a system for alternative applications is a strategy to reuse existing systems. NOTE: See questions for ISO , and ENG.2 BP1. (Security) SAE J3061, Feature Definition The feature definition defines the system being developed to which the Cybersecurity process will be applied. The feature definition identifies the physical boundaries, Cybersecurity perimeter, and trust boundaries of the feature, including the network perimeter of the feature. 32 EuroSPI

33 SAFETY FUNCTIONS AND CONNECTED VEHICLES EuroSPI

34 Critical signal path scenario 1. Vehicle local sensors (correctness?) 2. signals sent to service infrastructure (correctly related to position etc.?) The world is bigger ADAS (connected) environments Cloud based infrastructure for driving support Driving events databases (OEM, authorities) Driving data analysis Cloud driving services 3. Cloud storage (corruption?) 4. merge with other cars signals (data poisoning?) in the current vicinity (correct location?) and those ever operated near the current position (depending on the algorithm for driving data analysis, and its correctness). Infrastructure base stations Mobile internet technologies Radio-navigation satellite systems 5. Up-to date steering angle recommendation & road conditions for the current position sent to all the cars (availablitiy, low latency, correctness, scalability?). Vehicles report driving Vehicles get driving situation, events into the cloud: recommendations, commands from the cloud: 6. Steering angle is applied to the cars E.g. position, speed, E.g. steering related: steering angle, obstacles * instantaneous steering angle of neighbor cars steering (correct in the current context?). detected,... * typical steering angle for road position, * obstacles detected,... EuroSPI

35 Proposed ASPICE extension for Automotive Service Infrastructure (ASI processes) Expected typical properties ASIL-D QoS (Quality of Service) service monitoring for correct operation, availability, scalability and low latency. Preparedness for interruption of connectivity - local take-over (challenging for eg. platooning) Cybersecurity of service infrastructure (eg. wrong data injected, services spoofed, stored data and algorithms tampered with, messages altered) Etc. EuroSPI

36 Extension of ASPICE for Automotive Service Infrastructure ASI processes By example: ASI.2 Requirements Analysis Base practice BP4 ASI.2.BP4: Analyze the interfaces between the vehicle and the service infrastructure. Analog and linked to SYS.2.BP4: Analyze the impact on the operating environment Identify the interfaces between the vehicle and the service infrastructure. Analyze the impact that the service infrastructure interfaces will have on the vehicle operating environment. OUTCOMES: Quality of Service (Availability), Defined reaction in case of no availability, criticality of information, safety classification (if provided as QM or validated among a set of data to be provided with an ASIL), encryption and identification mechanisms to be implemented. Extended Cybersecurity (SAE J3061:2016) Assessment Questions : Related to SAE J3061:2016, clauses Feature Definition identifies physical boundaries, Cybersecurity perimeter, and trust boundaries of the feature, including the network perimeter of the feature. The feature definition defines the scope and interfaces of the feature. EuroSPI Christian Kreiner,TUGraz Richard Messnarz, ISCN 36

37 RELATED SKILLS PROJECTS AQUA ECOSYSTEM EuroSPI

38 AQUA - Knowledge Alliance for Training Quality and Excellence in Automotive EU Sector Skills Alliance for Automotive Aims: A unique, sustainable strategic alliance for modern certified VET Curricula for the automotive sector Industry aligned Capable of Europe-wide implementation Certified VET training course: Integrated Quality, Functional Safety, and Six Sigma in Automotive Certification by European Certification and Qualification Association ( Incorporated into Automotive Clusters Qualification programmes University Education (TUGraz, Grenoble INP) This project has been funded with support from the European Commission under agreement EAC This publication/communication reflects the views only of the author, and the Commission cannot be held responsible for any use which may be made of the information contained therein. EuroSPI Christian Kreiner,TUGraz Richard Messnarz, ISCN 38

39 AQUA Skills Set Automotive Quality Manager with AQUA Skills UnitID Unit Name Element ID Element Name AQUA.U1 Introduction AQUA.U1.E1 Integration view and general part AQUA.U1.E2 Organisational readiness AQUA.U2 Product Development AQUA.U2.E1 AQUA.U2.E2 AQUA.U2.E3 Lifecycle Requirements Design Each element contains four views: integrated perspective Automotive SPICE perspective Functional Safety perspetcive Six Sigma perspective AQUA.U3 Quality and Safety management AQUA.U2.E4 AQUA.U3.E1 AQUA.U3.E2 AQUA.U3.E3 Integration and Testing Capability Hazard & Risk management Assessment and audit AQUA.U4 Measure AQUA.U4.E1 Measurements AQUA.U4.E2 Reliability EuroSPI

40 SafEUr - ECQA Certified Functional Safety Manager Industry training and TUGraz course: Functional Safety Introduction, Management, Engineering, Production, Legal, Qualification topics Modular: 15 course elements Face-to-face and online delivery Heavily based on Industry Best Practice ISO26262, IEC61508 Skills set aligned with Industry Europe-wide certification by European Certification and Qualification Association ( Contact: Christian.Kreiner@tugraz.at EuroSPI Christian Kreiner,TUGraz Richard Messnarz, ISCN 40

41 Automotive Quality Universities (AQU) AQUA alliance extension to higher education Partners VŠB - Technical University of Ostrava, CZ Graz University of Technology, AT UAS Joanneum, Graz, AT University of Maribor EE + CS, SLO ISCN IE/AT EMIRAcle (European Innovation in Manufacturing Association), BE/FR Grenoble INP (EMIRAcle) Hochschule Düsseldorf (EMIRAcle) ECQA Online Campus for Industry The AQU project is financially supported by the European Commission in the Erasmus+ Programme under the project number CZ01-KA P1 TUG. This website and the project s publications reflect the views only of the authors, and the Commission cannot be held responsible for any use which may be made EuroSPI Christian Kreiner 41 of the information contained therein.

42 Regular student s course from 2014 AQUA university course for industry (TU Graz Life-long-learning progm. & ECQA) 1st ECVET-ECTS bridge between university and industry education Coordinator of AQUA project - EU funded Sector Skills Alliance Automotive Quality Universities EU project (partner) TU Graz Christian Kreiner EuroSPI

43 The AQUA ecosystem current state AQU - AQUA Quality Universities (EQF Level 6-8) AQUA for ROC (EQF Level 4-5) Planned AQUA extension Integrated Cybersecurity automotive & medical & automation Yellow Belt Orange Belt Green Belt Black Belt ECQA Functional Safety Manager /Engineer AQUA MOOCs? SPI manager/facilitator Integrated, interdisciplinary Innovation and improvment intacs Automotive SPICE ECQA Integrated Design Engineer More Christian Kreiner EuroSPI

ECQA Certified Integrated Designer

ECQA Certified Integrated Designer Become an ECQA Certified Integrated Designer How? www.ecqa.org Through an ECQA Certified Online Training Campus When? Starting date 10. 5. 2010 (free of cost) Starting date 27. 7. 2010 (free of cost) Who?

More information

INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061

INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061 INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061 23rd EuroAsiaSPI Conference, Graz, Austria Georg Macher AVL List GmbH (Headquarters) INTEGRATING

More information

Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist

Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist Internet of Things Group 2 Internet of Things Group 3 Autonomous systems: computing platform Intelligent eyes Vision. Intelligent

More information

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost?

Deriving safety requirements according to ISO for complex systems: How to avoid getting lost? Deriving safety requirements according to ISO 26262 for complex systems: How to avoid getting lost? Thomas Frese, Ford-Werke GmbH, Köln; Denis Hatebur, ITESYS GmbH, Dortmund; Hans-Jörg Aryus, SystemA GmbH,

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

ECQA Certified EU Project Manager

ECQA Certified EU Project Manager Become an ECQA Certified EU Project Manager www.ecqa.org How? Through an ECQA Certified Online Training Campus When? 1. 2. 2010 26. 2. 2010 7. 4. 2010 30. 4. 2010 7. 6. 2010 2. 7. 2010 4. 10. 2010 29.

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

Safety and Security for Automotive using Microkernel Technology

Safety and Security for Automotive using Microkernel Technology Informationstag "Das Automobil als IT-Sicherheitsfall" Berlin, 11.05.2012 Safety and Security for Automotive using Microkernel Technology Dr.-Ing. Matthias Gerlach OpenSynergy TwoBirds withonestone Safety

More information

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,

More information

Security and Privacy in Car2Car Adhoc Networks

Security and Privacy in Car2Car Adhoc Networks Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2

More information

Software architecture in ASPICE and Even-André Karlsson

Software architecture in ASPICE and Even-André Karlsson Software architecture in ASPICE and 26262 Even-André Karlsson Agenda Overall comparison (3 min) Why is the architecture documentation difficult? (2 min) ASPICE requirements (8 min) 26262 requirements (12

More information

Click ISO to edit Master title style Update on development of the standard

Click ISO to edit Master title style Update on development of the standard Click ISO 26262 to edit Master title style Update on development of the standard Dr David Ward Head of Functional Safety January 2016 Agenda Why update ISO 26262? What is the process for updating the standard?

More information

10 th AUTOSAR Open Conference

10 th AUTOSAR Open Conference 10 th AUTOSAR Open Conference Dr. Moritz Neukirchner Elektrobit Automotive GmbH Building Performance ECUs with Adaptive AUTOSAR AUTOSAR Nov-2017 Major market trends and their impact Trends Impact on E/E

More information

Europe wide Industry Certification Using Standard Procedures based on ISO 17024

Europe wide Industry Certification Using Standard Procedures based on ISO 17024 Europe wide Industry Certification Using Standard Procedures based on ISO 17024 Richard Messnarz, Damjan Ekert International Software Consulting Network GesmbH (ISCN) Austria {dekert, rmess}@iscn.com Prof.

More information

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) Koji NAKAO, NICT, Japan (Expert of UNECE WP29/TFCS) General Flow of works in WP29/TFCS and OTA Data protection

More information

Certified Automotive Software Tester Sample Exam Paper Syllabus Version 2.0

Certified Automotive Software Tester Sample Exam Paper Syllabus Version 2.0 Surname, Name: Gender: male female Company address: Telephone: Fax: E-mail-address: Invoice address: Training provider: Trainer: Certified Automotive Software Tester Sample Exam Paper Syllabus Version

More information

Secure Product Design Lifecycle for Connected Vehicles

Secure Product Design Lifecycle for Connected Vehicles Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards

More information

IOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT

IOT FLAGSHIP PROJECT. Dr. Mario Drobics, AIT IOT FLAGSHIP PROJECT Dr. Mario Drobics, AIT Challenge Digitalization over the entire product lifecycle accelerates the development, validation, instrumentation and deployment of complex industrial products

More information

Failure Diagnosis and Prognosis for Automotive Systems. Tom Fuhrman General Motors R&D IFIP Workshop June 25-27, 2010

Failure Diagnosis and Prognosis for Automotive Systems. Tom Fuhrman General Motors R&D IFIP Workshop June 25-27, 2010 Failure Diagnosis and Prognosis for Automotive Systems Tom Fuhrman General Motors R&D IFIP Workshop June 25-27, 2010 Automotive Challenges and Goals Driver Challenges Goals Energy Rising cost of petroleum

More information

Autonomous Driving needs Safety & Security. Embedded World 2018 Dr. Ciwan Gouma

Autonomous Driving needs Safety & Security. Embedded World 2018 Dr. Ciwan Gouma Autonomous Driving needs Safety & Security Embedded World 2018 Dr. Ciwan Gouma Autonomous Driving The Vision The vision is not new. Picture left (maybe you have seen this in other presentations) but why

More information

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes:

Controlled Document Page 1 of 6. Effective Date: 6/19/13. Approved by: CAB/F. Approved on: 6/19/13. Version Supersedes: Page 1 of 6 I. Common Principles and Approaches to Privacy A. A Modern History of Privacy a. Descriptions, definitions and classes b. Historical and social origins B. Types of Information a. Personal information

More information

13W-AutoSPIN Automotive Cybersecurity

13W-AutoSPIN Automotive Cybersecurity 13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

Cyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies

Cyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies Cyber Security and Vehicle Diagnostics Mark Zachos DG Technologies SAE INTERNATIONAL SAE J3061 Cybersecurity Guidebook for Cyber-Physical Automotive Systems Published January 2016; drive to a risk-based,

More information

Functional Safety Architectural Challenges for Autonomous Drive

Functional Safety Architectural Challenges for Autonomous Drive Functional Safety Architectural Challenges for Autonomous Drive Ritesh Tyagi: August 2018 Topics Market Forces Functional Safety Overview Deeper Look Fail-Safe vs Fail-Operational Architectural Considerations

More information

An Evaluation of using SPICE in an Enterprise Environment A Concept for Integrating various Quality Standards

An Evaluation of using SPICE in an Enterprise Environment A Concept for Integrating various Quality Standards An Evaluation of using SPICE in an Enterprise Environment A Concept for Integrating various Quality Standards, Austria Philipp Hagenmeyer, ZF Friedrichshafen, Germany Cristina Romcea, Continental Engineering

More information

ISO Functional Safety Management in the Autonomous Car industry and the overview of the required safety lifecycle.

ISO Functional Safety Management in the Autonomous Car industry and the overview of the required safety lifecycle. ISO 26262 Functional Safety Management in the Autonomous Car industry and the overview of the required safety lifecycle TÜV SÜD America PSES San Diego Chapter Meeting Sep. 12, 2017 TÜV SÜD AG Slide 1 Functional

More information

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe.

Crises Control Cloud Security Principles. Transputec provides ICT Services and Solutions to leading organisations around the globe. Crises Control Cloud Security Principles Transputec provides ICT Services and Solutions to leading organisations around the globe. As a provider of these services for over 30 years, we have the credibility

More information

Automotive Functional Safety

Automotive Functional Safety Automotive Functional Safety Complexity, Confidence, Compliance, Certification Farmington, 2018-03-22 23.03.2018 150 years TÜV SÜD 150 years of inspiring trust Inspiring trust since 1866 The year 2016

More information

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery.

Security In A Box. Modular Security Services Offering - BFSI. A new concept to Security Services Delivery. Modular Security Services Offering - BFSI Security In A Box A new concept to Security Services Delivery. 2017 Skillmine Technology Consulting Pvt. Ltd. The information in this document is the property

More information

Securing the future of mobility

Securing the future of mobility Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need

More information

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018 Securely Connecting People, Applications, and Devices Ted Shorter Chief Technology Officer CSS Ted.Shorter@css-security.com

More information

Is This What the Future Will Look Like?

Is This What the Future Will Look Like? Is This What the Future Will Look Like? Implementing fault tolerant system architectures with AUTOSAR basic software Highly automated driving adds new requirements to existing safety concepts. It is no

More information

Driving virtual Prototyping of Automotive Electronics

Driving virtual Prototyping of Automotive Electronics Driving virtual Prototyping of Electronics B. Hellenthal, AUDI AG, Competence Center Electronics & Semiconductor, DVCon, Munich, October 17 th, 2017 Project Idea More space for passengers enabled by decreasing

More information

The Safe State: Design Patterns and Degradation Mechanisms for Fail- Operational Systems

The Safe State: Design Patterns and Degradation Mechanisms for Fail- Operational Systems The Safe State: Design Patterns and Degradation Mechanisms for Fail- Operational Systems Alexander Much 2015-11-11 Agenda About EB Automotive Motivation Comparison of different architectures Concept for

More information

IoT & SCADA Cyber Security Services

IoT & SCADA Cyber Security Services RIOT SOLUTIONS PTY LTD P.O. Box 10087 Adelaide St Brisbane QLD 4000 BRISBANE HEAD OFFICE Level 22, 144 Edward St Brisbane, QLD 4000 T: 1300 744 028 Email: sales@riotsolutions.com.au www.riotsolutions.com.au

More information

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT

More information

Security Challenges with ITS : A law enforcement view

Security Challenges with ITS : A law enforcement view Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr

More information

Alexandre Esper, Geoffrey Nelissen, Vincent Nélis, Eduardo Tovar

Alexandre Esper, Geoffrey Nelissen, Vincent Nélis, Eduardo Tovar Alexandre Esper, Geoffrey Nelissen, Vincent Nélis, Eduardo Tovar Current status MC model gradually gaining in sophistication Current status MC model gradually gaining in sophistication Issue Safety-related

More information

ECQA Certified Terminology Manager Basic: Great acceptance of the community internationally after launching the online platform

ECQA Certified Terminology Manager Basic: Great acceptance of the community internationally after launching the online platform ECQA Conference 2010 ECQA Certified Terminology Manager Basic: Great acceptance of the community internationally after launching the online platform Launch, policy and future perspectives Blanca Nájera

More information

Designing a software framework for automated driving. Dr.-Ing. Sebastian Ohl, 2017 October 12 th

Designing a software framework for automated driving. Dr.-Ing. Sebastian Ohl, 2017 October 12 th Designing a software framework for automated driving Dr.-Ing. Sebastian Ohl, 2017 October 12 th Challenges Functional software architecture with open interfaces and a set of well-defined software components

More information

In Accountable IoT We Trust

In Accountable IoT We Trust In Accountable IoT We Trust AIOTI WG3 Security & Privacy-in-IoT Taskforces, and H2020 CSA CREATE-IoT & LSPs AG Trust in IoT Arthur van der Wees Managing Director Arthur s Legal, the global tech-by-design

More information

Compute solutions for mass deployment of autonomy

Compute solutions for mass deployment of autonomy Compute solutions for mass deployment of autonomy Rod Watt Director of Vehicle Architecture and System Analysis Introduction 2 From inception to now 1990 Joint venture between Acorn Computers and Apple.

More information

Certified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team

Certified Software Quality Engineer Preparation On Demand, Web-Based Course Offered by The Westfall Team Certified Software Quality Engineer (CSQE) Preparation course is an on demand, web-based course design to be a comprehensive, in-depth review of the topics in the ASQ s Certified Software Quality Engineer

More information

German OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer

German OWASP Day 2016 CarIT Security: Facing Information Security Threats. Tobias Millauer German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer Daimler Business Units German OWASP Day 2016 CarIT Security: Facing Information Security Threats Tobias Millauer

More information

Cyber Security Technologies

Cyber Security Technologies 1 / Cyber Security Technologies International Seminar on Cyber Security: An Action to Establish the National Cyber Security Center Lisbon, 12 th September 2013 23 / Key highlights - Thales Group Thales

More information

Applying and Evaluating Architectural IEC Safety Patterns

Applying and Evaluating Architectural IEC Safety Patterns Applying and Evaluating Architectural IEC 61508 Safety Patterns Christopher Preschern, Nermin Kajtazovic, and Christian Kreiner Abstract An important step for developing a safety-critical system is the

More information

Manchester Metropolitan University Information Security Strategy

Manchester Metropolitan University Information Security Strategy Manchester Metropolitan University Information Security Strategy 2017-2019 Document Information Document owner Tom Stoddart, Information Security Manager Version: 1.0 Release Date: 01/02/2017 Change History

More information

Communication Patterns in Safety Critical Systems for ADAS & Autonomous Vehicles Thorsten Wilmer Tech AD Berlin, 5. March 2018

Communication Patterns in Safety Critical Systems for ADAS & Autonomous Vehicles Thorsten Wilmer Tech AD Berlin, 5. March 2018 Communication Patterns in Safety Critical Systems for ADAS & Autonomous Vehicles Thorsten Wilmer Tech AD Berlin, 5. March 2018 Agenda Motivation Introduction of Safety Components Introduction to ARMv8

More information

TRAINING COURSE CERTIFICATION (TCC) COURSE REQUIREMENTS

TRAINING COURSE CERTIFICATION (TCC) COURSE REQUIREMENTS TRAINING COURSE CERTIFICATION (TCC) COURSE REQUIREMENTS Quality Management System (QMS) Internal Auditor Training Course Exemplar Global International Training Certification Programs Exemplar Global, Inc.

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

Information Security Management System

Information Security Management System Information Security Management System Based on ISO/IEC 17799 Houman Sadeghi Kaji Spread Spectrum Communication System PhD., Cisco Certified Network Professional Security Specialist BS7799 LA info@houmankaji.net

More information

Certified Information Security Manager (CISM) Course Overview

Certified Information Security Manager (CISM) Course Overview Certified Information Security Manager (CISM) Course Overview This course teaches students about information security governance, information risk management, information security program development,

More information

The Remote Exploitation of Unaltered Passenger Vehicles Revisited. 20 th October 2016 Mark Pitchford, Technical Manager, EMEA

The Remote Exploitation of Unaltered Passenger Vehicles Revisited. 20 th October 2016 Mark Pitchford, Technical Manager, EMEA The Remote Exploitation of Unaltered Passenger Vehicles Revisited 20 th October 2016 Mark Pitchford, Technical Manager, EMEA Today s hot topic A few years ago, Lynx presentations at events such as this

More information

KPIT S Connected Vehicle Practice

KPIT S Connected Vehicle Practice KPIT S Connected Vehicle Practice Vehicle Telematics Vehicle-to-Anything (V2X) Cybersecurity With an intent to shape up the futuristic Internet-of-Vehicles era, KPIT offers Vehicle-to-anything (V2X) solutions

More information

Functional Safety and Cyber-Security Experiences and Trends

Functional Safety and Cyber-Security Experiences and Trends Functional Safety and Cyber-Security Experiences and Trends Dr. Christof Ebert, Vector Consulting Services V1.0 2017-12-11 Welcome Vector Consulting Services Experts for product development, product strategy

More information

Cyber security mechanisms for connected vehicles

Cyber security mechanisms for connected vehicles Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX

More information

Automotive Anomaly Monitors and Threat Analysis in the Cloud

Automotive Anomaly Monitors and Threat Analysis in the Cloud Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications

More information

Background JPG

Background JPG International Software-Experts for Collaborative Networks I.S.C.N. GesmbH Liebenauer Hauptstrasse 2-6 Freiraum Büro Centre Stiege D, 1 st Floor A-8041 Graz, Austria Tel.: +43 (0)316 815910 Fax.: +43 316

More information

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act'' CEN Identification number in the EC register: 63623305522-13 CENELEC Identification number in the EC register: 58258552517-56 CEN and CENELEC Position Paper on the draft regulation ''Cybersecurity Act''

More information

November 16, TTTech Computertechnik AG / TTTech Auto AG Copyright TTTech Auto AG. All rights reserved

November 16, TTTech Computertechnik AG / TTTech Auto AG Copyright TTTech Auto AG. All rights reserved Future Mobility Approaches and Required Developments for On-board Networks and ADAS Computers Andreas ECKEL, Teamlead Grants Jan RADKE, Cooperation Manager TTTech Computertechnik AG / TTTech Auto AG November

More information

ISO meets AUTOSAR - First Lessons Learned Dr. Günther Heling

ISO meets AUTOSAR - First Lessons Learned Dr. Günther Heling ISO 26262 meets AUTOSAR - First Lessons Learned Dr. Günther Heling Agenda 1. ISO 26262 and AUTOSAR Two Basic Contradictions Top-Down vs. Reuse Concentration vs. Distribution 2. Approach Mixed ASIL System

More information

Online Student Exam Guide. for. ECQA Certified Professions

Online Student Exam Guide. for. ECQA Certified Professions Page: 1/26 Online Student Exam Guide for ECQA Certified Professions R. Messnarz (ISCN) D. Ekert (ISCN) Status: Name: Date: Signature: Draft: R. Messnarz, D. Ekert 14.2.2008 n.n. electronically Reviewed:

More information

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Paul Wooderson Vehicle cybersecurity concerns Privacy vehicle as a data hub Theft physical cybersecurity Safety - impacts of

More information

Architecture concepts in Body Control Modules

Architecture concepts in Body Control Modules Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Course 7 www.continental-corporation.com Interior Body and Security Table Of Contents

More information

ARM processors driving automotive innovation

ARM processors driving automotive innovation ARM processors driving automotive innovation Chris Turner Director of advanced technology marketing, CPU group ARM tech forums, Seoul and Taipei June/July 2016 The ultimate intelligent connected device

More information

COMPANION FINAL EVENT 14 TH & 15 TH September 2016

COMPANION FINAL EVENT 14 TH & 15 TH September 2016 COMPANION FINAL EVENT 14 TH & 15 TH September 2016 Update on recent developments related to Connected and Automated Driving Myriam COULON CANTUER Smart Mobility & Living Communication Networks, Content

More information

Safety Argument based on GSN for Automotive Control Systems. Yutaka Matsubara Nagoya University

Safety Argument based on GSN for Automotive Control Systems. Yutaka Matsubara Nagoya University 1 Safety Argument based on GSN for Automotive Control Systems Yutaka Matsubara Nagoya University yutaka@ertl.jp 02.26.2014 2 Agenda 1. Safety argument in ISO26262 2. Requirements related to safety argument

More information

MIGRATING TO CAN FD. Tony Adamson. Marketing Director CAN / LIN / FlexRay

MIGRATING TO CAN FD. Tony Adamson. Marketing Director CAN / LIN / FlexRay MIGRATING TO CAN FD Tony Adamson Marketing Director CAN / LIN / FlexRay Agenda WHO ARE WE CAR NETWORKS UNDER TRANSFORMATION SPEED SRITY OUR MISSION AND STRATEGY 2 2 FEBRUARY 16, 2016 VECTOR CAN FD SYMPOSIUM

More information

The Digitising European Industry strategy & H2020 calls related to Cyber-Physical Systems

The Digitising European Industry strategy & H2020 calls related to Cyber-Physical Systems The Digitising European Industry strategy & H2020 calls related to Cyber-Physical Systems #DigitiseEU Dr. Werner Steinhögl European Commission - DG CONNECT Technologies and Systems for Digitising Industry

More information

Taking the Right Turn with Safe and Modular Solutions for the Automotive Industry

Taking the Right Turn with Safe and Modular Solutions for the Automotive Industry Taking the Right Turn with Safe and Modular Solutions for the Automotive Industry A Time-Triggered Middleware for Safety- Critical Automotive Applications Ayhan Mehmet, Maximilian Rosenblattl, Wilfried

More information

Advent IM Ltd ISO/IEC 27001:2013 vs

Advent IM Ltd ISO/IEC 27001:2013 vs Advent IM Ltd ISO/IEC 27001:2013 vs 2005 www.advent-im.co.uk 0121 559 6699 bestpractice@advent-im.co.uk Key Findings ISO/IEC 27001:2013 vs. 2005 Controls 1) PDCA as a main driver is now gone with greater

More information

AUTOSAR proofs to be THE automotive software platform for intelligent mobility

AUTOSAR proofs to be THE automotive software platform for intelligent mobility AUTOSAR proofs to be THE automotive software platform for intelligent mobility Dr.-Ing. Thomas Scharnhorst AUTOSAR Spokesperson Simon Fürst, BMW AG Stefan Rathgeber, Continental Corporation Lorenz Slansky,

More information

Security

Security Security +617 3222 2555 info@citec.com.au Security With enhanced intruder technologies, increasingly sophisticated attacks and advancing threats, your data has never been more susceptible to breaches from

More information

INDUSTRIAL SECURITY STORMSHIELD PROTECTION FOR OPERATIONAL NETWORKS. Unified Threat Management and Next-Generation Firewalls Solutions

INDUSTRIAL SECURITY STORMSHIELD PROTECTION FOR OPERATIONAL NETWORKS. Unified Threat Management and Next-Generation Firewalls Solutions INDUSTRIAL SECURITY STORMSHIELD PROTECTION FOR OPERATIONAL NETWORKS Unified Threat Management and Next-Generation Firewalls Solutions Our mission To make the digital world a sustainable and trustworthy

More information

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe

VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe Author Date VdTÜV-WG Cybersecurity October, 3 rd 2015 VdTÜV Statement on the Communication from the EU Commission A Digital Single Market Strategy for Europe VdTÜV e.v. welcomes the Communication on a

More information

ACARE WG 4 Security Overview

ACARE WG 4 Security Overview ACARE WG 4 Security Overview ART WS ATM Security and Cybersecurity Kristof Lamont ATM & Cyber Security Expert 23 March 2016 ACARE Advisory Council for Aviation Research and Innovation in Europe http://www.acare4europe.com/

More information

Turbocharging Connectivity Beyond Cellular

Turbocharging Connectivity Beyond Cellular Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Turbocharging Connectivity Beyond Cellular Scott Beutler, Head of Interior Division

More information

Scalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018

Scalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018 Scalable and Flexible Software Platforms for High-Performance ECUs Christoph Dietachmayr Sr. Engineering Manager, November 8, Agenda A New E/E Architectures and High-Performance ECUs B Non-Functional Aspects:

More information

Automotive Security Standardization activities and attacking trend

Automotive Security Standardization activities and attacking trend Automotive Standardization activities and attacking trend Ingo Dassow, Deloitte November 2017 Automotive Risk Overview Trends and risks for connected vehicles 2 Value and Components of a Car Autonomous

More information

Cybersecurity, safety and resilience - Airline perspective

Cybersecurity, safety and resilience - Airline perspective Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,

More information

A regulatory framework for connected and automated driving Towards a strengthened cooperation

A regulatory framework for connected and automated driving Towards a strengthened cooperation A regulatory framework for connected and automated driving Towards a strengthened cooperation 3 rd SIP-adus WS TOKYO, JAPAN Friedemann Bruehl JAIA, on behalf of ACEA 2016 年 11 月 15 日 ( 火 ) ACEA MEMBERS

More information

INFORMATION ASSURANCE DIRECTORATE

INFORMATION ASSURANCE DIRECTORATE National Security Agency/Central Security Service INFORMATION ASSURANCE DIRECTORATE CGS Signature Repository A Signature Repository provides a group of signatures for use by network security tools such

More information

Integrated design for tackling safety and security challenges of smart products and digital manufacturing

Integrated design for tackling safety and security challenges of smart products and digital manufacturing Integrated design for tackling safety and security challenges of smart products and digital manufacturing Andreas Riel, Christian Kreiner, Georg Macher, Richard Messnarz To cite this version: Andreas Riel,

More information

Current status and Future of AUTOSAR. Markus Bechter 7 th AUTOSAR Open Conference Oct. 22 nd -23 rd 2014, Detroit

Current status and Future of AUTOSAR. Markus Bechter 7 th AUTOSAR Open Conference Oct. 22 nd -23 rd 2014, Detroit Current status and Future of AUTOSAR Markus Bechter 7 th AUTOSAR Open Conference Oct. 22 nd -23 rd 2014, Detroit Overview Achievements AUTOSAR Products Future of AUTOSAR 3 Achievements new concepts in

More information

Integrated C4isr and Cyber Solutions

Integrated C4isr and Cyber Solutions Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a

More information

How Microcontrollers help GPUs in Autonomous Drive

How Microcontrollers help GPUs in Autonomous Drive How Microcontrollers help GPUs in Autonomous Drive GTC 2017 Munich, 2017-10-12 Hans Adlkofer, VP Automotive System department Outline 1 Main Safety concepts 2 Sensor Fusion architecture and functionalities

More information

Voertuigconstructeurs en data economie

Voertuigconstructeurs en data economie Voertuigconstructeurs en data economie STUDIEDAG VERKEERSVEILIGHEID VLAAMS HUIS VOOR DE VERKEERSVEILIGHEID DEPT MOW VLAAMS PARLEMENT, BRUSSEL 11 DECEMBER 2017 Saturday, 30 December 2017 AGENDA 1. Context

More information

OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS

OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction L3Pilot: Pilot Testing INFRAMIX: Hybrid Infrastructure SAFERtec:Cyber-security / Security

More information

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017 Automotive Security: Challenges, Standards and Solutions Alexander Much 12 October 2017 Driver s fears are being fueled by recent news Connected Cars, new opportunities for hackers Autonomous Driving Concepts

More information

SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001)

SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001) BELAC 2-405-ISMS R0 2017 SPECIFIC PROVISIONS FOR THE ACCREDITATION OF CERTIFICATION BODIES IN THE FIELD OF INFOR- MATION SECURITY MANAGEMENT SYSTEMS (ISO/IEC 27001) The only valid versions of the documents

More information

WE IMPROVE THE WORLD THROUGH ENGINEERING!

WE IMPROVE THE WORLD THROUGH ENGINEERING! WE IMPROVE THE WORLD THROUGH ENGINEERING! MARCH 2018 Assystem Technologies worldwide At a glance. 700m TURNOVER IN 2017 PORTFOLIO: Product Engineering Consulting In Service Offerings >9.000 EMPLOYEES OUR

More information

TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS

TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS MATTHEW SHORT SR PRODUCT LINE MANAGER DIGITAL NETWORKING MATTHEW.SHORT@NXP.COM A NEW POSITION OF STRENGTH #1 Communications Processors #1 RF Power Transistors

More information

CTFL -Automotive Software Tester Sample Exam Paper Syllabus Version 2.0

CTFL -Automotive Software Tester Sample Exam Paper Syllabus Version 2.0 Surname, Forename: Gender: male female Company address: Telephone: Fax: E-mail-address: Invoice address: Training provider: Trainer: CTFL -Automotive Software Tester Sample Exam Paper Syllabus Version

More information

Building a Resilient Security Posture for Effective Breach Prevention

Building a Resilient Security Posture for Effective Breach Prevention SESSION ID: GPS-F03B Building a Resilient Security Posture for Effective Breach Prevention Avinash Prasad Head Managed Security Services, Tata Communications Agenda for discussion 1. Security Posture 2.

More information

Autonomous Driving From Fail-Safe to Fail-Operational Systems

Autonomous Driving From Fail-Safe to Fail-Operational Systems Autonomous Driving From Fail-Safe to Fail-Operational Systems Rudolf Grave December 3, 2015 Agenda About EB Automotive Autonomous Driving Requirements for a future car infrastructure Concepts for fail-operational

More information

Automotive Security An Overview of Standardization in AUTOSAR

Automotive Security An Overview of Standardization in AUTOSAR Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver

More information

Verification and Validation of High-Integrity Systems

Verification and Validation of High-Integrity Systems Verification and Validation of High-Integrity Systems Chethan CU, MathWorks Vaishnavi HR, MathWorks 2015 The MathWorks, Inc. 1 Growing Complexity of Embedded Systems Emergency Braking Body Control Module

More information

Car2Car Forum Operational Security

Car2Car Forum Operational Security Car2Car Forum 2012 14.11.2012 Operational Security Stefan Goetz, Continental Hervé Seudié, Bosch Working Group Security Task Force: In-vehicle Security and Trust Assurance Level 15/11/2012 C2C-CC Security

More information

Cyber security of automated vehicles

Cyber security of automated vehicles Cyber security of automated vehicles B. Steurich Infineon Technologies Conference Sep. 2017, Berlin Building blocks of automated driving: Cooperation of multiple system and disciplines Data Processing

More information