OTA and Remote Diagnostics
|
|
- Charleen Norris
- 6 years ago
- Views:
Transcription
1 OTA and Remote Diagnostics Vector ongress 26, Stuttgart, V
2 onnectivity offers greater Benefit to the automotive industry At a glance onnectivity offers greater benefit to the Automotive Industry: Software update Remote diagnostics Data collection There is a need for prompt delivery of OTA We have identified the most important success factors: Security Reliability Reuse A successful implementation requires significant know how in automotive and IT 2/8
3 onnectivity offers greater benefit to the Automotive Industry Software update adds value and is a way to keep connectivity secure lassic AUTOSAR and others: Reprogramming monolithic blocks with UDS protocol. Adaptive AUTOSAR and POSIX-like operating systems: Install and update software packages onsider dependencies between programs and shared libraries. Updating connectivity and OTA: Maintain the communication and security relevant parts of the vehicle There is a risk for brain dead vehicles (no communication) lassic Adaptive 3/8
4 onnectivity offers greater benefit to the Automotive Industry Remote diagnostics adds disruptive elements to well-known applications ompile and send regular vehicle health-reports Summarize present and stored failures, gas consumption, mileage, oil-level, Useful information for the driver Useful information for the OEM: Get deep insight into fleet health status Get remote roadside assistance from central vehicle support centers Allows remote diagnostics when malfunction indicator illuminates: ontinue drive or keep waiting for the towing service? Some EE issues can even be solved immediately. Make inspection and repair in car workshop more predictable and comfortable Actions, effort, time of visit can be planned beforehand based on vehicle health-report and an enhanced remote diagnostics when required Spare parts will be ordered early and are already available when car comes in 4/8
5 onnectivity offers greater benefit to the Automotive Industry Data ollection provides new insights into vehicles in the field Setup a campaign to analyze a certain phenomenon Select vehicles Define measurement configuration and trigger condition Transfer configuration from backend into vehicles of selected fleet Perform measurement, pre-evaluate and collect data Transfer data to the backend Perform data analytics Refine configuration if needed lose campaign Internet Backend 5/8
6 There is a Need for prompt Delivery of OTA There is a need for prompt delivery of OTA The starting signal has been given First applications are already available. Some customers do expect such functions. Menschen vektor durch Kjpargeter Freepik.com entwickelt 6/8
7 We have identified the most important success Factors We have identified the most important success factors Security Establish a secure channel that guarantees privacy and authentication. Reliability Make OTA functions robust and efficient. Reuse Take advantage of well-proven industry standards. Integrate into existing processes. Benefits Provide convenient functionality with additional value for the car owner 7/8
8 We have identified the most important success factors Security - A threat analysis on the OTA process PDX Backend Internet onnectivity Diag gateway Assets Flash data along the communication path: > Over-the-air communication between backend and vehicle. > Storage devices. > In-vehicle communication. Body hassis Gateway Security keys of the devices. Threats: > ompromising keys. > Data access or manipulation. > Man-in-the-middle. > Denial of services. Impacts: > Financial loss. > Manufacturer reputation. > System malfunction. > Safety functions. Flash Bootloader ADAS Infotainment 8/8
9 We have identified the most important success factors Security - A threat analysis on the OTA process PDX Backend Internet onnectivity Diag gateway Assets Flash data along the communication path: > Over-the-air communication Protect between the backend data on and storage vehicle. devices from > Storage devices. reading and writing by malicious attacker. > In-vehicle communication. Body hassis Gateway Security keys of the devices. Threats: > ompromising keys. > Data access or manipulation. > Man-in-the-middle. > Denial of services. Impacts: > Financial loss. > Manufacturer reputation. > System malfunction. > Safety functions. Flash Bootloader ADAS Infotainment 9/8
10 We have identified the most important success factors Security - A threat analysis on the OTA process PDX Backend Internet onnectivity Diag gateway Assets Flash data along the communication Separating path: the connectivity module in the > Over-the-air communication architecture between backend provides and vehicle. less attack surface. > Storage devices. Even if hacked, there is no direct access to > In-vehicle communication. vehicle buses. Body hassis Gateway Security keys of the devices. Threats: > ompromising keys. > Data access or manipulation. > Man-in-the-middle. > Denial of services. Impacts: > Financial loss. > Manufacturer reputation. > System malfunction. > Safety functions. Flash Bootloader ADAS Infotainment /8
11 We have identified the most important success factors Security - A threat analysis on the OTA process PDX Backend Internet onnectivity Diag gateway Assets Flash data along the communication Over-the-air path: communication uses PKI and > Over-the-air communication certificate between backend handling. vehicle. > Storage devices. The connectivity device handles and stores > In-vehicle communication. the key material. Body hassis Gateway Security keys of the devices. Threats: > ompromising keys. > Data access or manipulation. > Man-in-the-middle. > Denial of services. Impacts: > Financial loss. > Manufacturer reputation. > System malfunction. > Safety functions. Flash Bootloader ADAS Infotainment /8
12 We have identified the most important success factors Security - A threat analysis on the OTA process PDX Backend Internet onnectivity Diag gateway Assets Flash data along the communication path: End-to-end protection with digital signatures. > Over-the-air communication between backend and vehicle. > Storage devices. Additionally, data can be encrypted and decrypted inside the bootloader. > In-vehicle communication. Body hassis Gateway Security keys of the devices. Threats: > ompromising keys. > Data access or manipulation. > Man-in-the-middle. > Denial of services. Impacts: > Financial loss. > Manufacturer reputation. > System malfunction. > Safety functions. Flash Bootloader ADAS Infotainment 2/8
13 We have identified the most important success factors Reliability - Software update with redundant data storage Keep current and new version in the EU: onnectivity EU Software download is performed into the secondary memory section. Application V. Application V2. In case of a failure, all EUs will keep on executing the current version. Data V2. Diag gateway Ready for execution UDS- Flash Bootloader Programming Keep current and new version at central location: onnectivity EU In case of a failure, the update can be rolled back. Data V. Diag gateway Application V2. Programming Data V2. UDS- Flash Bootloader 3/8
14 We have identified the most important success factors Reuse: Take advantage of existing protocols - what do we need? There are many existing protocols. The best choice depends on the use case: Synchronous or asynchronous, client/server or peer-to-peer, streaming or event triggered. Which one is the best for given use-cases in the automotive industry? Data collection Software Update Remote Diagnostics App A App B App DoIP SOME/IP OMA-DM SOAP HTTP(S) MQTT BEEP SMTP (S)FTP UDS OBD UDP TP/TLS SOAP {REST} 4/8
15 We have identified the most important success factors Reuse: Onboard - Offboard Responsibilities Abstraction Layer Backend proprietary Tester Application MVI-Server JOBs ODX*/ PDX* 2 Where to cut between vehicle and backend on communication or on a more abstract level? Keep and manage data containers required for interpretation in the backend or the car? Or break down containers? Vehicle D-PDU-API 3 Autosar * Typically proprietary binary runtime format on the abstraction layer of the standard. 5/8
16 A successful implementation requires significant know how in automotive and IT A successful implementation requires significant know how in automotive and IT A sustainable solution integrates in-vehicle and backend/server software seamlessly. 6/8
17 onnectivity offers greater Benefit to the automotive industry Summary onnectivity offers greater benefit to the Automotive Industry: Software update Remote diagnostics Data collection There is a need for prompt delivery of OTA We have identified the most important success factors: Security Reliability Reuse A successful implementation requires significant know how in automotive and IT Vector is familiar with Automotive and IT. 7/8
18 For more information about Vector and our products please visit Author: Volker Ebner, Armin Happel, hristoph Rätz Vector Germany 26. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V
Securing the future of mobility
Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need
More informationPREEvision Technical Article
PREEvision Technical Article AUTOSAR-Conformant Vehicle Diagnostics over : Developing Diagnostic Communications for E/E Systems The electronically controlled systems of modern vehicles are networked with
More informationSW-Update. Thomas Fleischmann June 5 th 2015
Thomas Fleischmann June 5 th 2015 2 3 Agenda The big picture SW-Update today Diagnostics vs SW-Update Our solution for SW-Update The real challenges beyond getting a file into the car Elektrobit (EB),
More informationDiagnostic Use Cases V
Diagnostic Use Cases V1.01 2017-06-29 Agenda 1. Diagnostic Use Cases 3 2. Testing 6 3. Reprogramming 15 4. ECU Configuration 19 5. Vehicle Function Data 23 2 Diagnostic Use Cases Overview ECU Configuration
More informationDiagnostics is evolving
Diagnostics is evolving Vector India Conference, 208-07-8 V.0 208-07-3 Agenda AUTOSAR Development Remote Diagnostics and OTA Secrity 2 AUTOSAR Development DEXT Diagnostic Extract Template (=DEXT) Part
More information10 th AUTOSAR Open Conference
10 th AUTOSAR Open Conference Dr. Moritz Neukirchner Elektrobit Automotive GmbH Building Performance ECUs with Adaptive AUTOSAR AUTOSAR Nov-2017 Major market trends and their impact Trends Impact on E/E
More informationThe Adaptive Platform for Future Use Cases
The Adaptive Platform for Future Use Cases Vector Congress 2016 - Stuttgart, 2016-11-30 V0.1 2016-09-21 Agenda Introduction Adaptive AUTOSAR Architecture Use Cases and Requirements Adaptive AUTOSAR at
More informationFlash Bootloader. Product Information
Product Information Table of Contents 1 Flash Memory Programming... 3 2 Flash Bootloader - ECU programming via CAN, LIN, FlexRay, MOST and Ethernet... 3 2.1 Overview of Advantages... 3 2.2 Application
More informationStandardized Tool Components for NRMM-Diagnostics
Standardized Tool Components for NRMM-Diagnostics Peter Subke (Softing Automotive Electronics) In the past, passenger car manufacturers have learned the lesson that competition on the level of bits and
More informationAdaptive AUTOSAR. Ready for Next Generation ECUs V
Adaptive AUTOSAR Ready for Next Generation ECUs V0.4 2017-10-18 Introduction Being Prepared for the Next-Generation of ECUs Additional, high performance ECUs hosting applications for upcoming use cases
More informationDiagnostic Trends 2017 An Overview
Diagnostic Trends 2017 An Overview Vector India Conference, 2017-07-18+19 V1.0 2017-07-14 Agenda 1. DoIP 2. Remote Diagnostics 3. Cyber Security 4. Summary 2/29 DoIP Why DoIP? Why another diagnostic network?
More informationSicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017
Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen Axel Freiwald 1/2017 All OEMs Will Implement Software OTA As Soon As Possible IHS Study Motivation: Save on recalls caused by software bugs Evolution
More informationTechPaper. Over-the-air updates what advantages does the AUTOSAR Adaptive Platform offer?
TechPaper Over-the-air updates what advantages does the AUTOSAR Adaptive Platform offer? In vehicle development, using software to realize new functions is clearly in vogue. Vehicles that are already on
More information10 th AUTOSAR Open Conference
10 th AUTOSAR Open Conference Dr. Günther Heling Vector Informatik AUTOSAR Adaptive Platform Now it s Time to get on Board AUTOSAR Nov-2017 Introduction At the first glance Adaptive and Classic don t have
More informationAutomotive Anomaly Monitors and Threat Analysis in the Cloud
Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications
More informationCyber security mechanisms for connected vehicles
Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX
More informationAUTOSAR proofs to be THE automotive software platform for intelligent mobility
AUTOSAR proofs to be THE automotive software platform for intelligent mobility Dr.-Ing. Thomas Scharnhorst AUTOSAR Spokesperson Simon Fürst, BMW AG Stefan Rathgeber, Continental Corporation Lorenz Slansky,
More informationvflash Vector Webinar V
vflash Vector Webinar 2018-10-10 V2.0 2018-07-09 Introduction into vflash vflash Template Concept vflash Project Handling Enhanced Security with Gateway Authentication Custom Actions Tool Editions Extended
More informationEfficient testing of ECUs despite Security
Vector Cyber Security Symposium 2017 V0.1 2017-09-26 Security is a must have Security makes testing harder Security is a must have Todays features in vehicles require security Test Tools must support security
More informationAutomotive Security: Challenges and Solutions
Automotive Security: Challenges and Solutions 8 th Vector Congress 30 th November 2016 V2.01.00 2016-11-22 Agenda Introduction Services Embedded Security Mechanisms Tools Summary 2 Introduction Vehicle
More informationSIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC
W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,
More informationIndigo. Vector Diagnostic Tester V / 6
Indigo Vector Diagnostic Tester 1 / 6 V1.3 2018-09-13 Agenda 1. Indigo in General 2. Diagnostic Use Cases 3. Automation of Diagnostic Sequences 4. Remote Diagnostics 5. Summary 2 Indigo in General Executive
More informationAdaptive AUTOSAR Extending the Scope of AUTOSAR-based Embedded Software
Adaptive AUTOSAR Extending the Scope of AUTOSAR-based Embedded Software Vector Congress 2017, September 6 th 7 th, Shanghai China V0.1 2017-08-04 Introduction Use Cases for Adaptive AUTOSAR Infotainment
More informationA NEW CONCEPT IN OTA UPDATING FOR AUTOMOTIVE
WHITE PAPER A NEW CONCEPT IN OTA UPDATING FOR AUTOMOTIVE Zohar Fox, CEO OTA Updates are not a new concept. They first became a widespread technology for remote updates with the introduction of 3G networks
More informationAutomotive Gateway: A Key Component to Securing the Connected Car
Automotive : A Key Component to Securing the Connected Car Introduction Building vehicles with gateways electronic devices that enable secure and reliable communications among a vehicle s electronic systems
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationSecure Ethernet Communication for Autonomous Driving. Jared Combs June 2016
Secure Ethernet Communication for Autonomous Driving Jared Combs June 2016 Agenda Motivation for Security The Multi-Level Security Architecture Proposal Level 1: Restrict access to the network Level 2:
More informationAdaptive AUTOSAR Extending the Scope of AUTOSAR-based Embedded Software
Adaptive AUTOSAR Extending the Scope of AUTOSAR-based Embedded Software Vector GB Ltd Annual Conference 2017, September 27 th 28 th V0.1 2017-09-26 Introduction Use Cases for Adaptive AUTOSAR Infotainment
More informationOFF-ROAD VEHICLE DIAGNOSTICS WITH AUTOSAR. Jigar Patel Namdeo Dhawle July 18, 2018
OFF-ROAD VEHICLE DIAGNOSTICS WITH AUTOSAR Jigar Patel Namdeo Dhawle July 18, 2018 AGENDA Motivation of UDS diagnostics in Agriculture and Construction Vehicles UDS vs J1939 Challenges and Proposed solutions
More informationThe CANoe.Ethernet Solution
Use in Praxis V1.0 2016-11-23 Agenda 1. Ethernet the Newcomer in Automotive 2. Why an Automotive Ethernet Option for CANoe? 3. Brief Look to CANoe 4. First Hand Usecase from Field 2/20 Network Topology
More informationCAN FD - Flexible Tools for Flexible Data Rates
CAN FD - Flexible Tools for Flexible Data Rates Peter Decker Vector Informatik GmbH V 0.01 2012-06-20 Simulation & Test Environment for Automotive Networks Database Test Spec. ECU Simulation & Test Tool
More informationIdeation for Telematics, Highly Automated Driving Armin Rupalla
Ideation for Telematics, Highly Automated Driving Armin Rupalla 1 ADAS development and function certification Cost reduction by interoperability and compatibility 5 million maneuvers and 150 million miles
More informationVector Logger Cloud. VECTOR GB Ltd Conference, 28th Sept, 2017 V
Vector Logger Clod VECTOR GB Ltd Conference, 28th Sept, 2017 V1.0 2017-09-27 Agenda Challenges Vector Logger Clod Secrity Aspects Data Acqisition Policy Conclsion 2 Vector Logger Clod Challenges Growing
More informationRealizing Automated Driving Systems using Ethernet TSN and Adaptive AUTOSAR
Realizing Automated Driving Systems using Ethernet TSN and Adaptive AUTOSAR Prathap Venugopal, November 1-2, 2017 San Jose, CA, USA Agenda n Automated driving communication needs n Ethernet TSN standard
More informationM2MD Communications Gateway: fast, secure, efficient
Solution Brief M2MD Communications Gateway: fast, secure, efficient G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity.
More informationHigh-Speed Reprogramming and Calibration with CAN FD: A Case Study
High-Speed Reprogramming and Calibration with CAN FD: A Case Study Armin Happel, Erik Sparrer, Oliver Kitt, Oliver Garnatz, Peter Decker Reprogramming of ECUs as well as their in-vehicle calibration are
More informationSecuring the Connected Car. Eystein Stenberg CTO Mender.io
Securing the Connected Car Eystein Stenberg CTO Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled Software defined
More informationSecuring the Connected Car. Eystein Stenberg Product Manager Mender.io
Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled
More information10 th AUTOSAR Open Conference
10 th AUTOSAR Open Conference Nadym Salem, Jan Hegewald Carmeq GmbH Dealing with the Challenges for Future Software Systems in the Automotive Industry with the AUTOSAR Standards AUTOSAR Nov-2017 Dealing
More informationCountermeasures against Cyber-attacks
Countermeasures against Cyber-attacks Case of the Automotive Industry Agenda Automotive Basics ECU, domains, CAN Automotive Security Motivation, trends Hardware and Software Security EVITA, SHE, HSM Secure
More informationThe case for a Vehicle Gateway.
The case for a Vehicle Gateway. Equipment and Tool Institute ETI-ToolTech_2015_Gateway.pptx 1 Vehicle Data Access Last year we proposed a Vehicle Station Gateway and its associated Unified Gateway Protocol
More informationBuilding Digital Key Solution for Automotive
Building Digital Key Solution for Automotive Content Overview Use Cases Unlocking Use Cases Key Provisioning Use Cases Key Sharing Use Cases Key Properties High Level Architecture and Related Standards
More informationOpen Source in Automotive Infotainment
Open Source in Automotive Infotainment Taeyong Kim (ty.kim@windriver.com) Services & Solutions Wind River Systems 2015 Wind River. All Rights Reserved. Why using Open Source in IoT? Internet of Things
More informationAutomotive Security An Overview of Standardization in AUTOSAR
Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver
More informationPENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017
PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT
More informationHow Security Mechanisms Can Protect Cars Against Hackers. Christoph Dietachmayr, CIS Solution Manager EB USA Techday, Dec.
How Security Mechanisms Can Protect Cars Against Hackers Christoph Dietachmayr, CIS Solution Manager EB USA Techday, Dec. 3 rd 2015 Driver s Fears Are Being Fueled by Recent News ConnectedCars, new opportunies
More informationNovember 16, TTTech Computertechnik AG / TTTech Auto AG Copyright TTTech Auto AG. All rights reserved
Future Mobility Approaches and Required Developments for On-board Networks and ADAS Computers Andreas ECKEL, Teamlead Grants Jan RADKE, Cooperation Manager TTTech Computertechnik AG / TTTech Auto AG November
More informationIntroducing Hardware Security Modules to Embedded Systems
Introducing Hardware Security Modules to Embedded Systems for Electric Vehicles charging according to ISO/IEC 15118 V1.0 2017-03-17 Agenda Hardware Trust Anchors - General Introduction Hardware Trust Anchors
More informationConnected Car Solutions Based on IoT
FEATURED ARTICLES Autonomous Driving Technology for Connected Cars Connected Car Solutions Based on IoT With the aim of achieving a prosperous society in which people and vehicles exist in harmony, the
More informationConnected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is
Press release High-performance IT security solutions protect V2X communication against cyberattacks ESCRYPT GmbH Am Hain 5, 44789 Bochum, Germany Phone: +49 234 43870-200 Press and Public Relations: Martin
More informationODX-LINK V1.5 ODX-FLASH V1.5 User s Guide
ODX-LINK V1.5 ODX-FLASH V1.5 User s Guide Copyright The data in this document may not be altered or amended without special notification from ETAS GmbH. ETAS GmbH undertakes no further obligation in relation
More informationCANoe.J1939. Product Information
Product Information Table of Contents 1 Introduction... 3 1.1 Application Areas... 3 1.2 Features and Advantages... 3 1.3 Further Information... 3 2 Functions... 4 3 Hardware Interfaces... 4 4 Transport
More informationDesigning a software framework for automated driving. Dr.-Ing. Sebastian Ohl, 2017 October 12 th
Designing a software framework for automated driving Dr.-Ing. Sebastian Ohl, 2017 October 12 th Challenges Functional software architecture with open interfaces and a set of well-defined software components
More informationDevelopment of Intrusion Detection System for vehicle CAN bus cyber security
Development of Intrusion Detection System for vehicle CAN bus cyber security Anastasia Cornelio, Elisa Bragaglia, Cosimo Senni, Walter Nesci Technology Innovation - SSEC 14 Workshop Automotive SPIN Italia
More informationCAN FD with Dynamic Multi-PDU-to-Frame Mapping
CAN FD with Dynamic Multi-PDU-to-Frame Mapping Flexible Network Architectures V0.1 2015-09-25 E/E Trends and Challenges Why is Dynamic Multi-PDU-to-Frame Mapping required? The Trend: Demand for communication
More informationAWS Connected Vehicle Cloud
AWS Connected Vehicle Cloud AWS Implementation Guide Sean Senior Chris Rec Hitendra Nishar Tom Horton November 2017 Copyright (c) 2017 by Amazon.com, Inc. or its affiliates. The AWS Connected Vehicle Cloud
More informationFending Off Cyber Attacks Hardening ECUs by Fuzz Testing
Fending Off Cyber Attacks Hardening ECUs by Fuzz Testing In designing vehicle communication networks, security test procedures play an important role in the development process. Fuzz testing, which originated
More informationtime now it has also been used productively in a multi-oem, requires precise knowledge of the protocol, the layout, the
ODX in Practice Experiences, challenges and potential The diagnostic exchange format ODX has been implemented successfully in a number of pilot projects. For the first time now it has also been used productively
More informationAutomotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017
Automotive Security: Challenges, Standards and Solutions Alexander Much 12 October 2017 Driver s fears are being fueled by recent news Connected Cars, new opportunities for hackers Autonomous Driving Concepts
More informationAutonomous Driving From Fail-Safe to Fail-Operational Systems
Autonomous Driving From Fail-Safe to Fail-Operational Systems Rudolf Grave December 3, 2015 Agenda About EB Automotive Autonomous Driving Requirements for a future car infrastructure Concepts for fail-operational
More informationTrusted Platform Modules Automotive applications and differentiation from HSM
Trusted Platform Modules Automotive applications and differentiation from HSM Cyber Security Symposium 2017, Stuttgart Martin Brunner, Infineon Technologies Axiom: Whatever is connected can (and will)
More informationM2MD Communications Gateway: fast, secure and efficient
Solution Brief M2MD Communications Gateway: fast, secure and efficient Key Benefits G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular
More informationCANoe.Ethernet. Product Information
Product Information Table of Contents 1 Introduction... 3 1.1 Overview of Advantages... 3 1.2 Application Areas... 4 1.3 Further Information... 4 2 Functions... 4 3 Hardware... 5 4 Trainings... 5 5 Note...
More information13W-AutoSPIN Automotive Cybersecurity
13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview
More informationTrusted Platform for Mobile Devices: Challenges and Solutions
Trusted Platform for Mobile Devices: Challenges and Solutions Lily Chen Motorola Inc. May 13, 2005 Outline Introduction Challenges for a trusted platform Current solutions Standard activities Summary New
More information10 th AUTOSAR Open Conference
10 th AUTOSAR Open Conference Rinat Asmus AUTOSAR Project Leader BMW AUTOSAR Adaptive Platform AUTOSAR Nov-2017 New Challenges One Standard. Do AUTOSAR Core partners commit to standard use? Is the implementation
More informationCurrent status and Future of AUTOSAR. Markus Bechter 7 th AUTOSAR Open Conference Oct. 22 nd -23 rd 2014, Detroit
Current status and Future of AUTOSAR Markus Bechter 7 th AUTOSAR Open Conference Oct. 22 nd -23 rd 2014, Detroit Overview Achievements AUTOSAR Products Future of AUTOSAR 3 Achievements new concepts in
More informationSecure Product Design Lifecycle for Connected Vehicles
Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards
More informationASAM MCD-3 D. Application Programming Interface for MVCI Diagnostic Server. Base Standard. Part 1 of 4. Version 3.0.
ASAM MCD-3 D Application Programming Interface for MVCI Diagnostic Server Part 1 of 4 Version 3.0.0 Date: 2011-10-31 Base Standard by ASAM e.v., 2011 Disclaimer This document is the copyrighted property
More informationInternet of things (IoT)
Internet of things (IoT) Duration 3 days Courseware Reference Material Learning Internet of Things Definition for Internet of Things Competing definitions Direct consequences Introduction to IoT Projects
More information10 th AUTOSAR Open Conference
10 th AUTOSAR Open Conference Ravi Akella, Software Researcher Akihito Iwai, Director Silicon Valley Innovation Center DENSO International America, Inc. Integrating an actor based connected car platform
More informationBuilding firmware update: The devil is in the details
Building firmware update: The devil is in the details Atsushi Haruta, IoT Services Group, Arm Arm Tech Symposia Japan 2017 Arm Mbed: Secure device management Application Cloud Mbed Cloud Secure, scalable,
More informationConnected vehicle cloud
Connected vehicle cloud Commercial presentation 2018.05.17 Ericsson Connected Vehicle Cloud Commercial Presentation 2018-05-17 Page 1 The evolution of the automotive industry 2017 2020 2025 2030 A vehicle
More informationThe Bosch IoT Remote Manager
The Bosch IoT Remote Manager Device Management and Monitoring for IoT Version 7.0 Copyright Notice Bosch Software Innovations GmbH, 2018. All rights reserved, also regarding any disposal, exploitation,
More informationITEC 350: Introduction To Computer Networking Midterm Exam #2 Key. Fall 2008
ITEC 350: Introduction To Computer Networking Midterm Exam #2 Key Closed book and closed notes. Fall 2008 No electronic devices allowed, e.g., calculator, laptop, PDA. Show your work. No work, no credit.
More informationSECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA
SECURITY STORY WE NEVER SEE, TOUCH NOR HOLD YOUR DATA CTO Office www.digi.me another Engineering Briefing digi.me keeping your data secure at all times ALL YOUR DATA IN ONE PLACE TO SHARE WITH PEOPLE WHO
More informationDriven by SOLUTIONS. The new generation of vehicle diagnostic solutions. ESI[tronic], KTS and DCU from Bosch
Driven by SOLUTIONS The new generation of vehicle diagnostic solutions ESI[tronic], KTS and DCU from Bosch Everything for your control unit diagnosis The new generation of diagnostic testers from Bosch,
More informationMarket Trends and Challenges in Vehicle Security
Market Trends and Challenges in Vehicle Security FTF-AUT-F0080 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Microcontrollers and Digital Networking Processors A Global Leader
More informationSTW s Connectivity Solution for Mobile Equipment: The Vehicle Data System (VDS) and VDS-Remote (VDS-R) 31 July 2009, STW, Norcross, Bob Geiger
STW s Connectivity Solution for Mobile Equipment: The Vehicle Data System (VDS) and VDS-Remote (VDS-R) The Evolving World of Off-Highway Data and Connectivity Data mining is becoming more critical each
More informationExtreme automation of today s technological marvel - connected cars
VIEW POINT Extreme automation of today s technological marvel - connected cars - Sandhya Jeevan Rao Senior Project Manager Abstract Going by Gartner s findings which suggests that 25 billion connected
More informationPreventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI
Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI Bob Gruszczynski VWoA OBD Communication Expert Current Cybersecurity Status Challenges
More informationCyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies
Cyber Security and Vehicle Diagnostics Mark Zachos DG Technologies SAE INTERNATIONAL SAE J3061 Cybersecurity Guidebook for Cyber-Physical Automotive Systems Published January 2016; drive to a risk-based,
More informationContext-aware Automotive Intrusion Detection
Context-aware Automotive Intrusion Detection Armin Wasicek 1 Mert D.Pesé 2, André Weimerskirch 2, Yelizaveta Burakova 2, Karan Singh 2 1 Technical University Vienna, Austria 2 University of Michigan ESCAR
More informationUsing a Certified Hypervisor to Secure V2X communication
SYSGO AG PUBLIC 1 Using a Certified Hypervisor to Secure V2X communication Author(s): Date: Version Chris Berg 08/05/2017 v1.1 SYSGO AG PUBLIC 2 Protecting Assets People started protecting their assets
More informationThe Information Age has brought enormous
Cyber threat to ships real but manageable KAI hansen, akilur rahman If hackers can cause laptop problems and access online bank accounts or credit card information, imagine the havoc they can wreak on
More information.NET Secure Coding for Client-Server Applications 4-Day hands on Course. Course Syllabus
.NET Secure Coding for Client-Server Applications 4-Day hands on Course Course Syllabus Course description.net Secure Coding for Client-Server Applications 4-Day hands on Course Secure programming is the
More informationExamining future priorities for cyber security management
Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with
More informationFirmware Updates for Internet of Things Devices
Firmware Updates for Internet of Things Devices Brendan Moran, Milosch Meriac, Hannes Tschofenig Drafts: draft-moran-suit-architecture draft-moran-suit-manifest 1 WHY DO WE CARE? 2 IoT needs a firmware
More informationSafety and Security for Automotive using Microkernel Technology
Informationstag "Das Automobil als IT-Sicherheitsfall" Berlin, 11.05.2012 Safety and Security for Automotive using Microkernel Technology Dr.-Ing. Matthias Gerlach OpenSynergy TwoBirds withonestone Safety
More informationScalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018
Scalable and Flexible Software Platforms for High-Performance ECUs Christoph Dietachmayr Sr. Engineering Manager, November 8, Agenda A New E/E Architectures and High-Performance ECUs B Non-Functional Aspects:
More informationSoftware Architecture. Definition of Software Architecture. The importance of software architecture. Contents of a good architectural model
Software Architecture Definition of Software Architecture Software architecture is process of designing g the global organization of a software system, including: Dividing software into subsystems. Deciding
More informationLinux and AUTOSAR Vector Informatik Congress, Stuttgart,
Linux and AUTOSAR Vector Informatik Congress, Stuttgart, 12.2010 Brief Introduction to OpenSynergy OpenSynergy is a software company bringing innovative technologies into embedded automotive applications.
More informationArchitecture concepts in Body Control Modules
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Course 7 www.continental-corporation.com Interior Body and Security Table Of Contents
More informationAgenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2
Security Insert the Vulnerabilities title of your of the presentation Connected here Car Presented Presented by by Peter Name Vermaat Here Principal Job Title ITS - Date Consultant 24/06/2015 Agenda 1
More informationCANalyzer.J1939. Product Information
Product Information Table of Contents 1 Introduction... 3 1.1 Application Areas... 3 1.2 Features and Advantages... 3 1.3 Further Information... 3 2 Functions... 4 3 Hardware Interfaces... 4 4 Transport
More informationDriven by SOLUTIONS. Professional vehicle diagnostic solutions for every workshop. ESI[tronic] 2.0 Online - KTS - DCU
Driven by SOLUTIONS Professional vehicle diagnostic solutions for every workshop ESI[tronic] 2.0 Online - KTS - DCU Developed by experts for experts The right solution for every workshop Diagnostics are
More informationInternet of secure things: issues and perspectives. Pasquale Pace Dimes - UNICAL
Internet of secure things: issues and perspectives Pasquale Pace Dimes - UNICAL ppace@dimes.unical.it Table of Contents: Inter-IoT European Project» http://www.inter-iot-project.eu/ IoT Security IoT Authentication
More informationUsing the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway
Using the Cisco ACE Application Control Engine Application Switches with the Cisco ACE XML Gateway Applying Application Delivery Technology to Web Services Overview The Cisco ACE XML Gateway is the newest
More informationEB TechPaper. Combining the strengths of Elektrobit's SecOC with Argus IDPS. elektrobit.com
EB TechPaper Combining the strengths of Elektrobit's SecOC with Argus IDPS elektrobit.com After conducting several discussions in AUTOSAR and with customers regarding aspects of the Secure Onboard Communication
More informationArccore AB 2017, all rights reserved. Accelerating innovation
2017-03-02 Arccore AB 2017, all rights reserved Accelerating innovation ARCCORE in brief Independent vendor of automotive-sw with focus on AUTOSAR Integration, adaptation and service Incorporated 2009
More information