Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
|
|
- Constance Weaver
- 5 years ago
- Views:
Transcription
1 Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute
2
3 Cars are becoming complex (and CAV is only part of it) 1965: No computers No software 2018: Up to ~200 computers Consider TPMS are 4 computers and wireless >100 million lines of code Connected to internet
4 CAV Overview Cooperative system where vehicles communicate: With each other (V2V) With infrastructure (V2I) With pedestrians, bicycles, etc (V2X) Improves: Safety, Mobility, Environmental Impact Example Applications: Emergency Electronic Brake Lights (V2V) Overheight Vehicle Detection and Warning (V2I) Same can be said for C-V2X
5 CV Environment (Attack Surfaces) For CAV to be successful it must be integrated into the transportation infrastructure
6 AV Environment (Attack Surfaces) Sensor suite might include Radar Camera imagery Lidar Ultrasonics GPS Electronics also include Electronically controlled actuators Infotainment systems Software Over the Air (SOTA) Updates
7 Security is a Balance How much do you want to pay for security? Usually not a lot until you are compromised Like all technology solutions, a balance has to be reached based on funding, accessibility and reality Every organization has to decide the level of acceptable risk
8 Four Major Aspects of Cybersecurity How can someone gain unauthorized access? What could they do if they gained access? How can we detect unauthorized access? What can be done in response to an attack?
9 How Do Cyber Attacks Occur: Physical Inspection With physical access to ECU, hacker looks for attack surfaces Recovery of system secrets Cryptographic Keys Passwords Intercept communications Network and IP Traffic Internal Signals Modify and inject traffic Serial Cellular CAN
10 Vulnerability / Penetration Surfaces Types Cellular CB Radio WiFi Bluetooth GPS Approaches Denial of service Device spoofing Traffic injection Software Over the Air updates
11 Malware Effects Controller Area Network (CAN) Bus CAN bus replaced point to point wiring, all interconnected Messages are broadcast Messages are easily cracked ECU broadcast any message engine electronics, transmission electronics, chassis electronics, active safety, driver assistance, passenger comfort, entertainment systems, electronic integrated cockpit systems, lambda control, onboard diagnostics, cooling system control, ignition system control, turbo charger control, lubrication system control, fuel injection rate control, throttle control, transmission electronics, chassis electronics, anti-lock braking system, traction control system, electronic brake distribution, electronic stability program, passive safety, air bags, hill descent control, emergency brake assist system, driver assistance, lane assist system, speed assist system, blind spot detection, park assist system, adaptive cruise control system, pre-collision assist, passenger comfort, automatic climate control, electronic seat adjustment with memory, automatic wipers, automatic headlamps - adjusts beam automatically, automatic cooling - temperature adjustment, infotainment systems, navigation system, vehicle audio, information access, tire pressure monitoring system (Wikipedia)
12 Possible Penetration Effects ECU control via CAN bus messages Auto start/stop Brakes Lane assist / collision avoidance Cruise control Steering Impact of these attacks: Erodes public trust Raises awareness improves security practices Financial cost (recalls, lawsuits, etc)
13 CAV Environment Potential Attacks Injecting bad data that is then communicated over trusted comms Using comms or physical means to hack vehicle and control it or obtain trusted security credentials Flood DSRC safety & control channels Spoofing, jamming, or subtle skew of GPS signal Use roadway infrastructure to infiltrate TMC network Simulate vehicles that will trigger safety apps. Tough to detect if sensors are occluded Hack RSE and alter SPAT/MAP messages Broadcast incorrect messages to/from Vulnerable Road Users
14 Detection What makes detection hard Open nature of CAN bus Processing costs money People want to work on their cars (custom ROMs) How do you detect attacks CAN traffic profiling It takes processing power Checksums on file systems
15 Defense / Response Vehicle manufacturers are taking steps to secure their vehicles Progress is being made to harden SOTA updates mechanisms e.g. DHS Uptane Traffic management infrastructure networks are being hardened, e.g. NCHRP Project
16 How to Prevent Attacks: White Hat Hacking (Penetration Testing) Discover & patch vulnerabilities before production Methodical approach ensures that most frequent and most damaging attacks are mitigated Helps create and maintain a secure system at an acceptable level of risk
17 Summary Key takeaways: CAVs are already here and the number of CAVs will increase in years to come DSRC will add another attack surface for vehicles and infrastructure Almost everything is hackable or trackable DSRC standards are designed to make it much more difficult to hack or track than other communication mechanisms in the CV environment What can we do to prepare for DSRC deployment? Extend security and data privacy systems, practices and policies to handle CAV data and infrastructure Small pilot deployments to analyze security and privacy impacts this can inform a larger deployment in the future
18 Questions?
19 Robert Heller, Ph.D. Program Director R&D Intelligent Systems Division
Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division
Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How
More informationDedicated Short Range Communication: What, Why and How?
Dedicated Short Range Communication: What, Why and How? Imran Hayee EE Department, University of Minnesota Duluth Connected Vehicles Research Lab (http://www.d.umn.edu/ee/cvrl/index.html) Outline Background
More informationConnected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use
Connected Car Dr. Sania Irwin Head of Systems & Applications May 27, 2015 1 Nokia Solutions and Networks 2014 For internal use Agenda Introduction Industry Landscape Industry Architecture & Implications
More informationAutomotive Cyber Security
Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18
More informationHardening Attack Vectors to cars by Fuzzing
Hardening Attack Vectors to cars by Fuzzing AESIN 2015 Ashley Benn, Regional Sales manager 29 th October, 2015 2015 Synopsys, Inc. 1 Today, there are more than 100m lines of code in cars 2015 Synopsys,
More informationGNU Radio Software Defined DSRC Radio
Institute for Critical Technology and Applied Science GNU Radio Software Defined DSRC Radio Joseph M. Ernst, PhD Research Assistant Professor (540) 231-2254, jmernst@vt.edu hume@vt.edu www.hume.vt.edu
More informationUptane: Securely Updating Automobiles. Sam Weber NYU 14 June 2017
Uptane: Securely Updating Automobiles Sam Weber NYU samweber@nyu.edu 14 June 2017 Credits Funded by DHS S&T CSD Work done by New York University University of Michigan Transportation Research Institute
More informationFuture Implications for the Vehicle When Considering the Internet of Things (IoT)
Future Implications for the Vehicle When Considering the Internet of Things (IoT) FTF-AUT-F0082 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Agenda Overview of Existing Automotive
More informationTo realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan
To realize Connected Vehicle Society Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan Services provided by Connected Vehicle 1 Vehicle 5G V2X Connected Vehicle Big Data AI
More informationCooperative Vehicles Opportunity and Challenges
Cooperative Vehicles Opportunity and Challenges State Smart Transportation Initiative Toyota Motor Engineering & Manufacturing North America (TEMA) Toyota Technical Center (TTC) Hideki Hada 4/24/2012 Presentation
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationExamining future priorities for cyber security management
Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with
More informationAutomotive Anomaly Monitors and Threat Analysis in the Cloud
Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications
More informationIntroduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur
Introduction to Internet of Things Prof. Sudip Misra Department of Computer Science & Engineering Indian Institute of Technology, Kharagpur Lecture 50 Connected Vehicles II So, now we are going to continue
More informationARM processors driving automotive innovation
ARM processors driving automotive innovation Chris Turner Director of advanced technology marketing, CPU group ARM tech forums, Seoul and Taipei June/July 2016 The ultimate intelligent connected device
More information13W-AutoSPIN Automotive Cybersecurity
13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview
More informationAgenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2
Security Insert the Vulnerabilities title of your of the presentation Connected here Car Presented Presented by by Peter Name Vermaat Here Principal Job Title ITS - Date Consultant 24/06/2015 Agenda 1
More informationSecuring the future of mobility
Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need
More informationContext-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions
Context-Aware Vehicular Cyber-Physical Systems with Cloud Support: Architecture, Challenges, and Solutions Siran Pavankumar(149344152) siranpavankumar@gmail.com Computer Science Department Seoul National
More informationCAV: Industry Perspectives and Impacts. Martha Morecock Eddy
CAV: Industry Perspectives and Impacts Martha Morecock Eddy Connected/Automated Vehicles Communications Data Prerequisites CAV for biggest benefits Image Source: Ford Connected Vehicles Communications
More informationDevelopment of Intrusion Detection System for vehicle CAN bus cyber security
Development of Intrusion Detection System for vehicle CAN bus cyber security Anastasia Cornelio, Elisa Bragaglia, Cosimo Senni, Walter Nesci Technology Innovation - SSEC 14 Workshop Automotive SPIN Italia
More informationVehicle Trust Management for Connected Vehicles
Vehicle Trust Management for Connected Vehicles FINAL RESEARCH REPORT Insup Lee (PI), Nicola Bezzo, Jian Chang Contract No. DTRT12GUTG11 DISCLAIMER The contents of this report reflect the views of the
More informationA. SERVEL. EuCNC Special Sessions 5G connected car 01/07/2015
A. SERVEL EuCNC 2015 - Special Sessions 5G connected car 01/07/2015 Connected cars, a reality since 12 years for our customers! 2003 A Pioneer for emergency 1.6 million of equipped vehicles 2006 One of
More informationThe Fully Networked Car. Trends in Car Communication. Geneva March 2, 2005
The Fully Networked Car Trends in Car Communication Geneva March 2, 2005 Is The Connected Car Really A Major Business Opportunity? 2 Are We Flushing Money Away Having No Convincing Customer Benefits? 3
More informationSecuring the Connected Car. Eystein Stenberg CTO Mender.io
Securing the Connected Car Eystein Stenberg CTO Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled Software defined
More informationAutorama, Connecting Your Car to
Autorama, Connecting Your Car to the Internet of Tomorrow Nicholas Sargologos, Senior Marketing Manager, Digital Networking Freescale Semiconductor Overview Automotive OEMs need a secure, managed process
More informationRoger C. Lanctot Director, Automotive Connected Mobility
Roger C. Lanctot Director, Automotive Connected Mobility Roger Lanctot has 25+ years of experience as a journalist, analyst and consultant advising electronics companies, car companies, wireless carriers,
More informationSecurity Analysis of modern Automobile
Security Analysis of modern Automobile Dixit Verma Department of Electrical & Computer Engineering Missouri University of Science and Technology dv6cb@mst.edu 20 Apr 2017 Outline Introduction Attack Surfaces
More informationAccelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation
Accelerating solutions for highway safety, renewal, reliability, and capacity Regional Operations Forums Connected Vehicles and the Future of Transportation ti Session Overview What are connected and automated
More informationConnect Vehicles: A Security Throwback
Connect Vehicles: A Security Throwback Chris Valasek (@nudehaberdasher) Director of Vehicle Security Research Introduction Hello Chris Valasek Director of Vehicle Security Research IPS Dev -> Windows RE
More informationVehicle To Android Communication Mode
Technical Disclosure Commons Defensive Publications Series May 12, 2017 Vehicle To Android Communication Mode Tanmay Wadhwa Neil Dhillon Follow this and additional works at: http://www.tdcommons.org/dpubs_series
More informationSecure Product Design Lifecycle for Connected Vehicles
Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards
More informationPreventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security
Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security In less than a year, 100s of millions connected cars Aftermarket connectivity most prevalent
More informationVirginia Connected Corridor
Virginia Connected Corridor NATMEC 2016 Mike Mollenhauer Director, Center for Technology Implementation Virginia Tech Transportation Institute 5/4/2016 Virginia Connected Corridor In 2014, VDOT and VTTI
More informationVehicle Safety Communications Project Final Overview
CAMP IVI Light Vehicle Enabling Research Program Vehicle Safety Communications Project Final Overview Vehicle Safety Communications (VSC) Project 2.5 year program started in May 2002 VSC Consortium Members:
More informationGreen Lights Forever: Analyzing the Security of Traffic Infrastructure
Green Lights Forever: Analyzing the Security of Traffic Infrastructure RAJSHAKHAR PAUL Outline Introduction Anatomy of a Traffic Infrastructure Case Study Threat Model Types of Attack Recommendation Broader
More informationAutomotive Gateway: A Key Component to Securing the Connected Car
Automotive : A Key Component to Securing the Connected Car Introduction Building vehicles with gateways electronic devices that enable secure and reliable communications among a vehicle s electronic systems
More informationSIP Automated driving systems
European Conference on connected and automated driving SIP Automated driving systems ー Mobility bringing everyone a smile ー April 04.2017 Program Director SEIGO KUZUMAKI 2 Intensive R&D program promote
More informationSecurity for V2X Communications
Security for V2X Communications ITS Canada Annual General Meeting May 1-4, 2016 Brian Romansky VP Strategic Technology Your Connected Car Your Connected Car Security Security Partner Partner TrustPoint
More informationNext Generation Infotainment Systems
Next Generation Infotainment Systems John Absmeier Director, Silicon Valley Innovation Center Digital gadgets more important for car buyers January 11, 2013 Smartphones in the Driver s Seat Never before
More informationWardsAuto Interiors Conference Creating the Ultimate User Experience
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) WardsAuto Interiors Conference Creating the Ultimate User Experience Scott Beutler,
More informationSecuring the Connected Car. Eystein Stenberg Product Manager Mender.io
Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled
More informationEmergency Response: How dedicated short range communication will help in the future. Matthew Henchey and Tejswaroop Geetla, University at Buffalo
Emergency Response: How dedicated short range communication will help in the future. 1.0 Introduction Matthew Henchey and Tejswaroop Geetla, University at Buffalo Dedicated short range communication (DSRC)
More informationMATLAB Expo 2014 Verkehrszeichenerkennung in Fahrerassistenzsystemen Continental
Senses for Safety. Driver assistance systems help save lives. MATLAB Expo 2014 Verkehrszeichenerkennung in Fahrerassistenzsystemen MATLAB @ Continental http://www.continental-automotive.com/ Chassis &
More informationService Technical Resources MUT-III. (Multi-Use Tester-III*) Quick Reference Guide
Service Technical Resources MUT-III (Multi-Use Tester-III*) Quick Reference Guide *Cart not included May, 2003 INTENDED USAGE OF MUT-III MUT-II role after MUT-III Launch MUT-III is an essential special
More informationNCHRP Project Impacts of Connected Vehicles and Automated Vehicles on State and Local Transportation Agencies
NCHRP Project 20-102 Impacts of Connected Vehicles and Automated Vehicles on State and Local Transportation Agencies Announcement of New Tasks, August 2016 The National Cooperative Highway Research Program
More informationTurbocharging Connectivity Beyond Cellular
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Turbocharging Connectivity Beyond Cellular Scott Beutler, Head of Interior Division
More informationConnected Vehicle Safety Pilot Overview and Infrastructure Readiness
Connected Vehicle Safety Pilot Overview and Infrastructure Readiness Scott Shogan, PE, PTOE Infrastructure Team Lead Engineer March 28, 2013 Agenda Safety Pilot Program overview V2V and V2I communications
More informationVehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University
Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University OUTLINE Intelligent Transportation Systems (ITS) Vehicle connectivity
More informationApplying Lessons Learned to V2X Communications for China
Jim Misener Director, Technical Standards Qualcomm Technologies, Inc. Applying Lessons Learned to V2X Communications for China 2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All
More informationIndustry 4.0 & Transport for Digital Infrastructure
Industry 4.0 for Digital Infrastructure u Vehicle to Anything Connectivity (V2X) ICT changes Transport Automotive World IT World V2I IVN-Sensor X-by-Wire, MOST, CDMA, DSRC, WLAN,.. RSU Distance Sens. Multi
More informationThe Future of Mobility
The Future of Mobility Christoph Wagner The best way to predict the future is to design it. Buckminster Fuller The Future of Mobility Automated Connected Electrified Secured smooth traffic Early warning
More informationWhat kind of terminal do vehicles need? China Unicom Research Institute Dr. Menghua TAO July, 2015
What kind of terminal do vehicles need? China Unicom Research Institute Dr. Menghua TAO 28-29 July, 2015 Terminal & applications / services What kind of terminal do vehicles need? What is vehicle terminal?
More informationOffense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent
Offense & Defense in IoT World Samuel Lv Keen Security Lab, Tencent Keen Security Lab of Tencent Wide coverage of software and hardware security research Mainstream PC & Mobile Operating Systems Mainstream
More informationOvervoltage protection with PROTEK TVS diodes in automotive electronics
Ian Doyle Protek / Zoltán Kiss Endrich Bauelemente Vertriebs GmbH Overvoltage protection with PROTEK TVS diodes in automotive electronics A utomotive electronics is maybe the area of the automotive industry,
More information5G promotes the intelligence connected vehicles. Dr. Menghua Tao Senior Solution Manager China Unicom
5G promotes the intelligence connected vehicles Dr. Menghua Tao Senior Solution Manager China Unicom ICT enabled automated driving One of the important features of a smart car is automated driving. As
More informationAttack Resilient State Estimation for Vehicular Systems
December 15 th 2013. T-SET Final Report Attack Resilient State Estimation for Vehicular Systems Nicola Bezzo (nicbezzo@seas.upenn.edu) Prof. Insup Lee (lee@cis.upenn.edu) PRECISE Center University of Pennsylvania
More informationCountermeasures against Cyber-attacks
Countermeasures against Cyber-attacks Case of the Automotive Industry Agenda Automotive Basics ECU, domains, CAN Automotive Security Motivation, trends Hardware and Software Security EVITA, SHE, HSM Secure
More informationConnected Cars as the next great consumer electronics device
Connected Cars as the next great consumer electronics device Sanjay Khatri Head of Platform Product Marketing Cisco Jasper 1992 2016 Cisco Systems, Inc. All rights reserved. Connected Cars: The next great
More informationWireless LAN Security (RM12/2002)
Information Technology in Education Project Reference Materials Wireless LAN Security (RM12/2002) Infrastructure Division Education Department The Government of HKSAR www.ited.ed.gov.hk December 2002 For
More informationAdvanced IP solutions enabling the autonomous driving revolution
Advanced IP solutions enabling the autonomous driving revolution Chris Turner Director, Emerging Technology & Strategy, Embedded & Automotive Arm Shanghai, Beijing, Shenzhen Arm Tech Symposia 2017 Agenda
More informationSecure Ethernet Communication for Autonomous Driving. Jared Combs June 2016
Secure Ethernet Communication for Autonomous Driving Jared Combs June 2016 Agenda Motivation for Security The Multi-Level Security Architecture Proposal Level 1: Restrict access to the network Level 2:
More informationDesign Considerations And The Impact of CMOS Image Sensors On The Car
Design Considerations And The Impact of CMOS Image Sensors On The Car Intuitive Automotive Image Sensors To Promote Safer And Smarter Driving Micron Technology, Inc., has just introduced a new image sensor
More informationAutomobile Design and Implementation of CAN bus Protocol- A Review S. N. Chikhale Abstract- Controller area network (CAN) most researched
Automobile Design and Implementation of CAN bus Protocol- A Review S. N. Chikhale Abstract- Controller area network (CAN) most researched communication protocol used for automotive industries. Now we are
More informationHandling Top Security Threats for Connected Embedded Devices. OpenIoT Summit, San Diego, 2016
Handling Top Security Threats for Connected Embedded Devices OpenIoT Summit, San Diego, 2016 Jeep Cherokee hacked in July 2015 Presented at Black Hat USA 2015 Charlie Miller Chris Valasek Remote exploit
More informationPENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017
PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT
More informationTRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS
TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS MATTHEW SHORT SR PRODUCT LINE MANAGER DIGITAL NETWORKING MATTHEW.SHORT@NXP.COM A NEW POSITION OF STRENGTH #1 Communications Processors #1 RF Power Transistors
More informationCONNECTED VEHICLE COMMUNICATIONS IN A RURAL SETTING
www.inl.gov CONNECTED VEHICLE COMMUNICATIONS IN A RURAL SETTING Ira Pray, Fleet Manager Idaho National Laboratory NRITS October 2016 Chattanooga, TN Topics Background Project Needs and Objectives Dedicated
More informationWeVe: When Smart Wearables Meet Intelligent Vehicles
WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet
More informationDevelopment Progress and OEM Perspective of C-V2X in China
Development Progress and OEM Perspective of C-V2X in China Dr. Xiang Dang (ABM) Deputy General Manager Research& Advanced Technology Department SAIC MOTOR 1 C-V2X Development Progress in China 2 OEM s
More informationSecurity Concerns in Automotive Systems. James Martin
Security Concerns in Automotive Systems James Martin Main Questions 1. What sort of security vulnerabilities do modern cars face today? 2. To what extent are external attacks possible and practical? Background
More informationARC-IT v8 Workshop ARC-IT TOOL SET
ARC-IT v8 Workshop ARC-IT TOOL SET ARC-IT Tool Suite Two free downloadable software tools available to apply ARC-IT to regions and projects Regional Architecture Development for Intelligent Transportation
More informationAuthentication with Privacy for Connected Cars - A research perspective -
Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk
More informationIntelligent Transportation Systems (ITS) for Critical Infrastructure Protection
Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection Presented at the Transportation Research Board January 2002 Annual Meeting Washington DC, USA HAMED BENOUAR Executive Director
More informationINSTRUMENT CLUSTER 2.0
INSTRUMENT CLUSTER 2.0 Summary THE CONTEXT Electronic Content Timeline The Challenge MAGNETI MARELLI TARGET Digital Cluster Advantages The Requirements THE SOLUTION Project Definition System PROJECT DEVELOPEMENT
More informationBuild a Driver Information System with IoT Technology
Build a Driver Information System with IoT Technology FTF-AUT-F0482 Jack Xu BD marketing, Asia Pacific MAY.2014 TM External Use Agenda Connected Car and Automotive IoT Infotainment Trend Car Network Trend
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More informationCyber security of automated vehicles
Cyber security of automated vehicles B. Steurich Infineon Technologies Conference Sep. 2017, Berlin Building blocks of automated driving: Cooperation of multiple system and disciplines Data Processing
More informationExposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control
Exposing Congestion Attack on Emerging Connected Vehicle based Traffic Signal Control Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X. Liu University of Michigan Background: Connected
More informationFunctional Safety Architectural Challenges for Autonomous Drive
Functional Safety Architectural Challenges for Autonomous Drive Ritesh Tyagi: August 2018 Topics Market Forces Functional Safety Overview Deeper Look Fail-Safe vs Fail-Operational Architectural Considerations
More informationWireless Attacks and Countermeasures
Wireless Attacks and Countermeasures Wireless Network Technology Wireless network refers to any type of computer network which is wireless, and is commonly associated with a network whose interconnections
More informationProtection Against DDOS Using Secure Code Propagation In The VANETs
Protection Against DDOS Using Secure Code Propagation In The VANETs Mandeep Kaur, Manish Mahajan Mandeepcheema6@gmail.com,cgccoe.hodcse@gmail.com ABSTRACT--VANETs are the vehicular networks used to connect
More informationElectrification of Mobility
Electrification of Mobility Moderator: Andreas Schafer, Cambridge University and Stanford University Panelists: Mary Nickerson, Toyota Ed Kjaer, Southern California Edition Flavio Bonomi, Cisco Systems
More informationSecurity Challenges with ITS : A law enforcement view
Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr
More informationGoals and prospects of embedded electronic automotive systems
Goals and prospects of embedded electronic automotive systems Joseph Beretta Division of Research and Automotive Innovation Manager Automotive Science & Advance Research Electromechanically, Electrochemistry,
More informationVerification and Validation of High-Integrity Systems
Verification and Validation of High-Integrity Systems Chethan CU, MathWorks Vaishnavi HR, MathWorks 2015 The MathWorks, Inc. 1 Growing Complexity of Embedded Systems Emergency Braking Body Control Module
More informationConvergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations
Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations Agenda Nexus of Safety and Cybersecurity Separation and Connectivity Trends in Aerospace Cybersecurity Isn t Security
More informationto Address Cyber Physical Systems Security (CPSSEC)
Combating Threats: S&T is Building a Resilient Cyber Ecosystem to Address Cyber Physical Systems Security (CPSSEC) Follow us at dhsscitech CPS Security is Critical Smart cars, grids, medical devices, manufacturing,
More informationFederal Mobility: A Year in Review
Federal Mobility: A Year in Review Link: https://www.dhs.gov/csd-mobile Link: https://www.dhs.gov/publication/csd-mobile-device-security-study Vincent Sritapan Cyber Security Division Science and Technology
More information2014 Civic Sedan LX and HF
T E C H N O L O G Y R E F E R E N C E G U I D E o w n e r s. h o n d a. c o m 2014 Honda Civic Sedan LX and HF 3 1 T R 3 A 2 0 Technology Reference Guide 00X31- TR3- A200 2013 American Honda Motor Co.,
More information10 FOCUS AREAS FOR BREACH PREVENTION
10 FOCUS AREAS FOR BREACH PREVENTION Keith Turpin Chief Information Security Officer Universal Weather and Aviation Why It Matters Loss of Personally Identifiable Information (PII) Loss of Intellectual
More informationInternet of Things Toolkit for Small and Medium Businesses
Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors
More informationSerial EEPROM for Automotive New Advanced series
Serial EEPROM for Automotive New Advanced series More parameters, quicker, safer http://www.st.com/automotiveeeprom Good reasons to use EEPROM in cars 2 Applications in cars become Smarter, Customized
More informationV2X: Beyond the Horizon. IBTTA AET Meeting July 18, 2017
V2X: Beyond the Horizon IBTTA AET Meeting July 18, 2017 Battle over V2X Technology: DSRC vs 5G 18 July 2017 www.kapsch.net 2 Dedicated Short Range Communication (DSRC) Bi-directional wireless communications
More informationAn Experimental Analysis of the SAE J1939 Standard
Truck Hacking: An Experimental Analysis of the SAE J1939 Standard 10th USENIX Workshop On Offensive Technologies (WOOT 16) Liza Burakova, Bill Hass, Leif Millar & Andre Weimerskirch Are trucks more secure
More informationMultimedia Convergence & ACCI Sector Overview
Multimedia Convergence & ACCI Sector Overview Philippe Lambinet General Manager, Home Entertainment & Displays Group ACCI Focus Applications Automotive Computer & Communication Infrastructure Home Entertainment
More information2014 Accord Coupe LX-S
T E C H N O L O G Y R E F E R E N C E G U I D E o w n e r s. h o n d a. c o m 2014 Honda Accord Coupe LX-S 31T3LA10 Technology Reference Guide 00X31- T3L- A100 2013 American Honda Motor Co., Inc. All Rights
More informationRF and Antenna Consideration
RF and Antenna Consideration for Connected Cars in 5G ecosystem Seungpyo Hong Network R&D Center, SK Telecom 28 June 2016 Contents Introduction Vehicle Communication Services and use cases Roadmap 5G technology
More informationScience & Technology Directorate: R&D Overview
Science & Technology Directorate: R&D Overview August 6 th, 2012 UNCLASSIFIED//FOUO DHS S&T Mission Strengthen America s security and resiliency by providing knowledge products and innovative technology
More informationConquering Complexity: Addressing Security Challenges of the Connected Vehicle
Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018 Securely Connecting People, Applications, and Devices Ted Shorter Chief Technology Officer CSS Ted.Shorter@css-security.com
More information