Automotive Security: Challenges and Solutions
|
|
- Eustace Carson
- 6 years ago
- Views:
Transcription
1 Automotive Security: Challenges and Solutions 8 th Vector Congress 30 th November 2016 V
2 Agenda Introduction Services Embedded Security Mechanisms Tools Summary 2
3 Introduction Vehicle is becoming a Part of the Internet of Things OEM Suppliers ITS Operator OBD DSRC 4G LTE Public Clouds Service Provider 3
4 Introduction Threats and Challenges OEM Suppliers ITS Operator Challenges Increasing attack surface Need to protect features and business models OBD DSRC Legacy technologies not designed with security in mind Meaningful transfer of IT security technologies required 4G LTE Limited ressources for security mechanisms / performance constraints Lack of automotive specific standards / guidance Effects on many process areas Public Clouds Service Provider 4
5 Introduction Building Blocks of a Security Solution Services Embedded Software Tools 5
6 Services Security does not Start or End with Cryptography Asset Definition Threat and Risk Assessment Security Validation Derivation of Security Goals Penetration Testing Fuzz Testing Security Architecture Design & Analysis Functional Security Testing Security Concept Design & Analysis Secure Implementation of Nominal Function and Security Mechanisms Incident Management & Response 6
7 Services Typical Customer Needs Asset Definition Threat and Risk Assessment Derivation of Security Goals Security Architecture Design & Analysis Security Concept Design & Analysis Functional Security Testing Security Validation Penetration Testing Fuzz Testing Security Studies > Examining customer defined security concepts > Proof of concept implementation of security mechanisms > Performance analysis Vehicle Security Architecture Implementation > Development of vehicle security architectures for series > Implementation based on established standards and customer specific extensions > Integration support Secure Implementation of Nominal Function and Security Mechanisms Incident Management & Response 7
8 Embedded Security Mechanisms Building Blocks of a Security Solution Services Embedded Software Tools 8
9 Embedded Security Mechanisms Layered Security Concept (Logical View) Associated Security Concepts Secure External Communication Secure communication to services outside the vehicle, e.g. via TLS Secure Gateways Firewalls / access control Key infrastructure / vehicle PKI Synchronized secure time Intrusion detection mechanisms Secure In-Vehicle Communication Secure Platform Authenticity of messages Integrity and freshness of messages Confidentiality of messages Key storage Crypto library HW trust anchor (e.g. SHE, HSM, TPM,..) Secure boot and secure update 9
10 Embedded Security Mechanisms MICROSAR 4.3 Security Modules and available Extensions FVM OS SYS DIAG MEM CSM CRYIF CRYDRV(SW) AMD MCAL CRYDRV (HW) Application RTE COM IO SECOC CAN LIN FR ETH V2G 1 TLS 1 XML Sec 1 AVB 1 EXT LIBS Crypto Service Manager (CSM) Complex Driver Secure onboard Communication (SecOC) Crypto Interface (CRYIF) Crypto Driver HW (CRYDRV(HW)) Crypto Driver SW (CRYDRV(SW)) Freshness Value Manager (FVM) Transport Layer Security (TLS) XML Security (XML Sec) Microcontroller Hardware Trust Anchor (HTA ) 1 Extensions for AUTOSAR Vector Standard Software 10
11 Embedded Security Mechanisms Cryptographic Functions with and without HW-Support Crypto Service Manager CSM > SWC use CSM through RTE > BSW/CDD use CSM by inclusion FVM > Asynchronous Application operation possible > Callback indicates application RTE SWC/Application FBL Application OS SYS DIAG Crypto MEM Interface COM CRYIF IO LIBS > Provides SECOC standard FWM 1 interfaces IDSM 1 for specific CAL CSM SYS CSM (CPL) HIS Security Module cryptographic functions CRYIF CAN LIN FR ETH V2G 1 Complex Runtime Protection Driver CRYIF CRYDRV(SW) CANFW 1 TLS ETHFW 1 1 TLS XML Sec 1 Update Authorization Crypto Driver CRYDRV CANIDS1 ETHIDS 1 XML Sec > AMD Implementation of cryptographic functions CRYDRV COM SCANTSYN 1 Secure Update Manager SETHTSYN > CRYDRV (SW): Usage of SW-libraries 1 AVB 1 (SW-LIB) > CRYDRV (HW): Usage of resources and MCAL CRYDRV (HW) CDD MCAL capabilities of HW-Trust Anchors (SHE, HSM, EXT TPM, ) CRYDRV (HW) Microcontroller Sec. Bootmanager HTA (HSM) RTE Microcontroller Hardware Trust Anchor (HTA ) 1 Extensions for AUTOSAR Vector Standard Software 11
12 Embedded Security Mechanisms Future Security Modules (not defined by AUTOSAR) KeyM 1 OS SYS DIAG MEM POLM 1 SLOG 1 KSM 1 AMD MCAL Application RTE COM IO FWM 1 IDSM 1 CAN LIN FR ETH V2G 1 CANFW 1 ETHFW 1 CANIDS 1 ETHIDS 1 AVB 1 EXT Key Manager (KeyM) Key Store Manager (KSM) Security Audit Log (SLOG) Policy Manager (POLM) LIBS Firewall Manager (FWM) > CAN Firewall (CANFW) Complex Driver > Ethernet Firewall (ETHFW) Intrusion Detection System Manager (IDSM) > CAN Intrusion Detection System (CANIDS) > Ethernet Intrusion Detection System (ETHIDS) Microcontroller Hardware Trust Anchor (HTA ) 1 Extensions for AUTOSAR 12 Future Security Modules
13 Embedded Security Mechanisms MICROSAR Firewall Generic Firewall Manager (FWM): Manages state of individual bus firewalls (e.g. ETHFW). Manage security policy securely stored in HTA (SHE, HSM, ). SWC/Application Role management of security policy (e.g. factory, customer). RTE Distribution of security policy to individual bus firewalls. Update of security policy via DCM. Ethernet Firewall (ETHFW): Stateful packet filtering firewall (inspect IP/TCP/UDP packets). Own TCP/IP stack for extracting packet header information, no code shared with module TCP/IP. SYS COMM DIAG DCM SLOG COM FWM CAN COM PDUR ETH SOAD Applied security policy requested from FWM on startup of ECU. CANFW TCPIP ETHFW Local storage of security policy for fast access (read-only). Logging of non-policy-conform packets in tamper proof SLOG CANIF ETHIF MCAL CRYDRV (HW) CAN Firewall (CANFW): Filtering out CAN frames whose arrival not predicted by DBC. HTA Microcontroller Logging of e.g. CAN frame periodicity deviations in tamper proof SLOG. 13
14 Embedded Security Mechanisms Building Blocks of a Security Solution Services Embedded Software Tools 14
15 Tools Challenges for Testing Increasing integration of security mechanisms in current and new architectures New challenges for automotive testing Testing of security Testing despite security Tool solutions are currently in piloting phase 15
16 Tools Testing of Security Device under Test Monitoring Data Fuzzed Messages CANoe Test framework.net Signal database [.dbc] COMdbLib IronPython Bus System boofuzz config [Python] boofuzz Core [Python] Signal database [.dbc] Automotive Security Testing > Functional testing > Test of security related functions for correct behavior > Vulnerability scanning > Test for known security vulnerabilities > Fuzz testing > Try to find new vulnerabilities of an implementation by sending malformed input to target system > Good benefit-to-cost ratio. > Penetration testing > Highly individual & creative testing of the whole system (SW+HW) performed by a smart human tester > Based on many years of hacking experience 16
17 Tools Testing despite Security Crypto Material Security Sources Default Car2X OEM Backend Adapter Testing of nominal functions regardless of security mechanisms > Confidentiality > But I need to be able to read any message for debugging purposes > Authenticity/ Freshness Security Manager > But I need the system to accept data from my log file in order to replicate the problem! Vector Tools CANoe vflash Interface Bus System Device under Test Complexity drivers > Different types of cryptographic keys > Security protocols > Different security architectures > Different processes / backends 17
18 Summary Key Points Security is required to enable new features and protect business models The number of security mechanisms in current and future vehicle architecture grows Security has to be considered throughout development & testing, production and after sales Standard SW components are a foundation but customer specific extensions are needed Tools can simplify testing of security and testing despite security Services Embedded Software Tools 18
19 For more information about Vector and our products please visit Author: Dr. Eduard Metzker Vector Informatik GmbH Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector. V
What s New in AUTOSAR?
What s New in AUTOSAR? By Stephen Waldron Local Prodct Line Manager Vector UK Conference, Wednesday 27 th September 2017 V1.6.1 2017-08-22 Agenda What s New in AUTOSAR? AUTOSAR 4.3 Software Architectre
More informationAdaptive AUTOSAR Extending the Scope of AUTOSAR-based Embedded Software
Adaptive AUTOSAR Extending the Scope of AUTOSAR-based Embedded Software Vector Congress 2017, September 6 th 7 th, Shanghai China V0.1 2017-08-04 Introduction Use Cases for Adaptive AUTOSAR Infotainment
More informationAdaptive AUTOSAR Extending the Scope of AUTOSAR-based Embedded Software
Adaptive AUTOSAR Extending the Scope of AUTOSAR-based Embedded Software Vector GB Ltd Annual Conference 2017, September 27 th 28 th V0.1 2017-09-26 Introduction Use Cases for Adaptive AUTOSAR Infotainment
More informationIntroducing Hardware Security Modules to Embedded Systems
Introducing Hardware Security Modules to Embedded Systems for Electric Vehicles charging according to ISO/IEC 15118 V1.0 2017-03-17 Agenda Hardware Trust Anchors - General Introduction Hardware Trust Anchors
More informationCyber security mechanisms for connected vehicles
Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX
More informationHow Security Mechanisms Can Protect Cars Against Hackers. Christoph Dietachmayr, CIS Solution Manager EB USA Techday, Dec.
How Security Mechanisms Can Protect Cars Against Hackers Christoph Dietachmayr, CIS Solution Manager EB USA Techday, Dec. 3 rd 2015 Driver s Fears Are Being Fueled by Recent News ConnectedCars, new opportunies
More informationA Safe Basis. Safety Functions Status and Challenge V
A Safe Basis Safety Functions Status and Challenge V1.00.00 2016-09-06 Agenda 1. Introduction 2. MICROSAR Safe 3. Status and Outlook 4. Challenges 2 Introduction Evolution of Safety Concepts Partitioning
More informationEfficient testing of ECUs despite Security
Vector Cyber Security Symposium 2017 V0.1 2017-09-26 Security is a must have Security makes testing harder Security is a must have Todays features in vehicles require security Test Tools must support security
More informationAutomotive Cybersecurity: A steep learning curve
Automotive Cybersecurity: A steep learning curve Vector Congress 2018 V1.0 2018-11-07 Motivation Attack Surface and Attack History Automotive megatrends Attacks with safety-critical effects Connectivity
More informationSoftware Architecture for Secure ECUs. Rudolf Grave EB TechDay-June 2015
Software Architecture for Secure ECUs Rudolf Grave EB TechDay-June 2015 Agenda No safety without security and vice versa Established Safety Concepts Safety Analysis Methods for Security Analysis Secure
More informationAutomotive Security An Overview of Standardization in AUTOSAR
Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver
More informationAdaptive AUTOSAR: Infrastructure Software for Advanced Driver Assistance. Chris Thibeault June 7, 2016
Adaptive : Infrastructure Software for Advanced Driver Assistance Chris Thibeault June 7, 2016 Agenda for Adaptive Platform Introduction Goals for the presentation What is the Adaptive Platform? Why do
More informationOFF-ROAD VEHICLE DIAGNOSTICS WITH AUTOSAR. Jigar Patel Namdeo Dhawle July 18, 2018
OFF-ROAD VEHICLE DIAGNOSTICS WITH AUTOSAR Jigar Patel Namdeo Dhawle July 18, 2018 AGENDA Motivation of UDS diagnostics in Agriculture and Construction Vehicles UDS vs J1939 Challenges and Proposed solutions
More information10 th AUTOSAR Open Conference
10 th AUTOSAR Open Conference Dr. Günther Heling Vector Informatik AUTOSAR Adaptive Platform Now it s Time to get on Board AUTOSAR Nov-2017 Introduction At the first glance Adaptive and Classic don t have
More informationAUTOSAR Software Design with PREEvision
AUTOSAR Software Design with PREEvision Webinar 2013-06-05 Slide: 1 AUTOSAR Software Design with PREEvision Agenda Overview AUTOSAR Software and System Design Integrated AUTOSAR Software Design Vector
More informationTrusted Platform Modules Automotive applications and differentiation from HSM
Trusted Platform Modules Automotive applications and differentiation from HSM Cyber Security Symposium 2017, Stuttgart Martin Brunner, Infineon Technologies Axiom: Whatever is connected can (and will)
More informationECU development with AUTOSAR An introduction for AUTOSAR beginners
ECU development with AUTOSAR An introduction for AUTOSAR beginners AUTOSAR Webinar 2013-03-12 V0.01 2012-09-27 Agenda > General Information Why AUTOSAR Introduction to AUTOSAR Vector AUTOSAR Solution OEM
More informationSTMicroelectronics Automotive MCU Technical Day 意法半导体汽车微控制器技术日 2017 年 ST 汽车 MCU 技术日 2017 年 6 月 6 日, 上海 2017 年 6 月 8 日, 深圳 2017 年 6 月 13 日, 北京
STMicroelectronics Automotive MCU Technical Day 意法半导体汽车微控制器技术日 2017 年 ST 汽车 MCU 技术日 2017 年 6 月 6 日, 上海 2017 年 6 月 8 日, 深圳 2017 年 6 月 13 日, 北京 KSAR Support for ST s SPC5 32-bit Automotive MCUs AUTOSAR NOS
More informationKSAR Support. for. ST s SPC5 32-bit Automotive MCUs
KSAR Support for ST s SPC5 32-bit Automotive MCUs AUTOSAR Practice Facts and Numbers Our Offerings Our Credentials Our Investments Products AUTOSAR R4.0.3/R4.2.1 ICC3 compliant Basic Software Stack AUTOSAR
More informationAUTOSAR Overview and Classic Platform
AUTOSAR Overview and Classic Platform Igor Neiva Camargo AUTOSAR Project Leader Team Oct. 30 th 2015 8 th AOC, Tokyo Overview AUTOSAR Overview and Classic Platform The AUTOSAR Development Community - The
More informationSecure Ethernet Communication for Autonomous Driving. Jared Combs June 2016
Secure Ethernet Communication for Autonomous Driving Jared Combs June 2016 Agenda Motivation for Security The Multi-Level Security Architecture Proposal Level 1: Restrict access to the network Level 2:
More informationAdaptive AUTOSAR. Ready for Next Generation ECUs V
Adaptive AUTOSAR Ready for Next Generation ECUs V0.4 2017-10-18 Introduction Being Prepared for the Next-Generation of ECUs Additional, high performance ECUs hosting applications for upcoming use cases
More information10 th AUTOSAR Open Conference
10 th AUTOSAR Open Conference Dr. Moritz Neukirchner Elektrobit Automotive GmbH Building Performance ECUs with Adaptive AUTOSAR AUTOSAR Nov-2017 Major market trends and their impact Trends Impact on E/E
More informationAgenda. > AUTOSAR Overview. AUTOSAR Solution. AUTOSAR on the way
AUTOSAR Overview Agenda > AUTOSAR Overview AUTOSAR Solution AUTOSAR on the way Slide: 2 Overview and Objectives AUTOSAR Partnership Slide: 3 Development of Functionality Electronic fuel injection Cruise
More informationWebinar LIN Embedded Software
Webinar LIN Embedded Software Setting up the Vector embedded software for LIN ECUs V1.0.00 2014-09-19 Agenda > Vector embedded LIN Products MICROSAR LIN CANbedded LIN CANbedded LIN Integration API Event
More informationWelcome to the Webinar Embedded Software for J1939
Welcome to the Webinar Embedded Software for J1939 On November 11 at 9 AM (CET) 2014. Vector Informatik GmbH. All rights reserved. Any distribution or copying is subject to prior written approval by Vector.
More informationvflash Vector Webinar V
vflash Vector Webinar 2018-10-10 V2.0 2018-07-09 Introduction into vflash vflash Template Concept vflash Project Handling Enhanced Security with Gateway Authentication Custom Actions Tool Editions Extended
More informationSicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017
Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen Axel Freiwald 1/2017 All OEMs Will Implement Software OTA As Soon As Possible IHS Study Motivation: Save on recalls caused by software bugs Evolution
More informationAUTOSAR Method. Webinar
AUTOSAR Method Webinar 2013-04-17 V2.1 2013-04-16 Agenda >Introduction AUTOSAR Method Exchange Formats Workflows OEM-TIER1 Workflows TIER1 Webinar Series Slide: 2 Introduction Current Workflow (non-autosar)
More informationEmbedded Software for J1939
Embedded Software for J1939 Webinar on July 1 at 2 PM (CET) V0.02 2015-07-01 Agenda J1939 Basics CANbedded J1939 MICROSAR J1939 MICROSAR J1939 with ISOBUS extensions Feature Matrix History & Roadmap 2
More informationFunctional Safety and Cyber-Security Experiences and Trends
Functional Safety and Cyber-Security Experiences and Trends Dr. Christof Ebert, Vector Consulting Services V1.0 2017-12-11 Welcome Vector Consulting Services Experts for product development, product strategy
More informationSW-Update. Thomas Fleischmann June 5 th 2015
Thomas Fleischmann June 5 th 2015 2 3 Agenda The big picture SW-Update today Diagnostics vs SW-Update Our solution for SW-Update The real challenges beyond getting a file into the car Elektrobit (EB),
More informationScalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018
Scalable and Flexible Software Platforms for High-Performance ECUs Christoph Dietachmayr Sr. Engineering Manager, November 8, Agenda A New E/E Architectures and High-Performance ECUs B Non-Functional Aspects:
More informationSecure Product Design Lifecycle for Connected Vehicles
Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards
More informationMarket Trends and Challenges in Vehicle Security
Market Trends and Challenges in Vehicle Security FTF-AUT-F0080 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Microcontrollers and Digital Networking Processors A Global Leader
More informationThe Adaptive Platform for Future Use Cases
The Adaptive Platform for Future Use Cases Vector Congress 2016 - Stuttgart, 2016-11-30 V0.1 2016-09-21 Agenda Introduction Adaptive AUTOSAR Architecture Use Cases and Requirements Adaptive AUTOSAR at
More informationFending Off Cyber Attacks Hardening ECUs by Fuzz Testing
Fending Off Cyber Attacks Hardening ECUs by Fuzz Testing In designing vehicle communication networks, security test procedures play an important role in the development process. Fuzz testing, which originated
More informationPENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017
PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationAutomotive Anomaly Monitors and Threat Analysis in the Cloud
Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications
More informationDiagnostic Trends 2017 An Overview
Diagnostic Trends 2017 An Overview Vector India Conference, 2017-07-18+19 V1.0 2017-07-14 Agenda 1. DoIP 2. Remote Diagnostics 3. Cyber Security 4. Summary 2/29 DoIP Why DoIP? Why another diagnostic network?
More informationVirtualization of Heterogeneous Electronic Control Units Testing and Validating Car2X Communication
Testing and Validating Car2X Communication 1 Public ETAS-PGA 2017-07-06 ETAS GmbH 2017. All rights reserved, also regarding any disposal, exploitation, reproduction, editing, Testing and Validating Car2X
More informationOTA and Remote Diagnostics
OTA and Remote Diagnostics Vector ongress 26, Stuttgart, 26--29 V. 26--29 onnectivity offers greater Benefit to the automotive industry At a glance onnectivity offers greater benefit to the Automotive
More informationMICROSAR. Product Information
Product Information Table of Contents 1 MICROSAR - The Vector Solution for AUTOSAR ECU Software... 3 2 MICROSAR.OS The Real-Time Operating System for the AUTOSAR Standard... 8 3 MICROSAR.COM AUTOSAR Basic
More informationFlash Bootloader. Product Information
Product Information Table of Contents 1 Flash Memory Programming... 3 2 Flash Bootloader - ECU programming via CAN, LIN, FlexRay, MOST and Ethernet... 3 2.1 Overview of Advantages... 3 2.2 Application
More informationCyber security of automated vehicles
Cyber security of automated vehicles B. Steurich Infineon Technologies Conference Sep. 2017, Berlin Building blocks of automated driving: Cooperation of multiple system and disciplines Data Processing
More informationPREEvision Technical Article
PREEvision Technical Article AUTOSAR-Conformant Vehicle Diagnostics over : Developing Diagnostic Communications for E/E Systems The electronically controlled systems of modern vehicles are networked with
More informationArchitecture concepts in Body Control Modules
Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Course 7 www.continental-corporation.com Interior Body and Security Table Of Contents
More informationInteraction between AUTOSAR and non-autosar Systems on top of a Hypervisor
Interaction between AUTOSAR and non-autosar Systems on top of a Pierre-Antoine Bernard Ι 7th AUTOSAR Open Conference Ι Detroit, October 23rd 2014 Introduction Pierre-Antoine Bernard Senior Software Engineer
More informationCurrent status and Future of AUTOSAR. Markus Bechter 7 th AUTOSAR Open Conference Oct. 22 nd -23 rd 2014, Detroit
Current status and Future of AUTOSAR Markus Bechter 7 th AUTOSAR Open Conference Oct. 22 nd -23 rd 2014, Detroit Overview Achievements AUTOSAR Products Future of AUTOSAR 3 Achievements new concepts in
More informationIS CAR HACKING OVER? AUTOSAR SECURE ONBOARD COMMUNICATION
SESSION ID: SBX3-W1 IS CAR HACKING OVER? AUTOSAR SECURE ONBOARD COMMUNICATION Jeffrey Quesnelle Director of Software Development Intrepid Control Systems @IntrepidControl Introduction Spent 15 years working
More informationFunctional Safety and Cyber Security Experiences and Trends
Functional Safety and Cyber Security Experiences and Trends Vector China Congress, Shanghai, 7. Sep. 2017 Dr. Christof Ebert, Vector Consulting Services V1.0 2017-09-07 Welcome Vector Consulting Services
More informationISO meets AUTOSAR - First Lessons Learned Dr. Günther Heling
ISO 26262 meets AUTOSAR - First Lessons Learned Dr. Günther Heling Agenda 1. ISO 26262 and AUTOSAR Two Basic Contradictions Top-Down vs. Reuse Concentration vs. Distribution 2. Approach Mixed ASIL System
More informationThe CANoe.Ethernet Solution
Use in Praxis V1.0 2016-11-23 Agenda 1. Ethernet the Newcomer in Automotive 2. Why an Automotive Ethernet Option for CANoe? 3. Brief Look to CANoe 4. First Hand Usecase from Field 2/20 Network Topology
More information10 th AUTOSAR Open Conference
10 th AUTOSAR Open Conference Rinat Asmus AUTOSAR Project Leader BMW AUTOSAR Adaptive Platform AUTOSAR Nov-2017 New Challenges One Standard. Do AUTOSAR Core partners commit to standard use? Is the implementation
More informationDiagnostic Use Cases V
Diagnostic Use Cases V1.01 2017-06-29 Agenda 1. Diagnostic Use Cases 3 2. Testing 6 3. Reprogramming 15 4. ECU Configuration 19 5. Vehicle Function Data 23 2 Diagnostic Use Cases Overview ECU Configuration
More informationModel Based Development and Code Generation for Automotive Embedded Systems. April 26, 2017 Dr. Gergely Pintér, Dr. Máté Kovács thyssenkrupp Steering
Model Based Development and Code Generation for Automotive Embedded Systems April 26, 2017 Dr. Gergely Pintér, Dr. Máté Kovács Agenda Model Based Development and Code Generation for Automotive Embedded
More informationSTMicroelectronics Automotive MCU Technical Day
STMicroelectronics Automotive MCU Technical Day 意法半导体汽车微控制器技术日 ETAS Embedded SW and Embedded Security Solutions 2017 年 ST 汽车 MCU 技术日 2017 年 6 月 6 日, 上海 2017 年 6 月 8 日, 深圳 2017 年 6 月 13 日, 北京 Embedded SW
More informationRTA-BSW v2.1.1 User Guide
RTA-BSW v2.1.1 User Guide Copyright The data in this document may not be altered or amended without special notification from ETAS GmbH. ETAS GmbH undertakes no further obligation in relation to this document.
More informationSecurity+ SY0-501 Study Guide Table of Contents
Security+ SY0-501 Study Guide Table of Contents Course Introduction Table of Contents About This Course About CompTIA Certifications Module 1 / Threats, Attacks, and Vulnerabilities Module 1 / Unit 1 Indicators
More informationSecuring the future of mobility
Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need
More informationAUTOSAR design flow. Yoon-Jin Kim Application Engineer. July mentor.com/automotive
AUTOSAR design flow Yoon-Jin Kim Application Engineer July 2016 mentor.com/automotive Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered
More informationWindows IoT Security. Jackie Chang Sr. Program Manager
Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport
More informationNew Approaches to Connected Device Security
New Approaches to Connected Device Security Erik Jacobson Architecture Marketing Director Arm Arm Techcon 2017 - If you connect it to the Internet, someone will try to hack it. - If what you put on the
More information10 th AUTOSAR Open Conference
10 th AUTOSAR Open Conference Pierre-Antoine Bernard OpenSynergy GmbH Cornel Izbasa OpenSynergy GmbH Virtualization Solutions for the AUTOSAR Classic and Adaptive Platforms AUTOSAR Nov-2017 OpenSynergy
More informationSoftware Architecture. Definition of Software Architecture. The importance of software architecture. Contents of a good architectural model
Software Architecture Definition of Software Architecture Software architecture is process of designing g the global organization of a software system, including: Dividing software into subsystems. Deciding
More informationCompTIA Security+ Study Guide (SY0-501)
CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes
More informationTRESCCA Trustworthy Embedded Systems for Secure Cloud Computing
TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing IoT Week 2014, 2014 06 17 Ignacio García Wellness Telecom Outline Welcome Motivation Objectives TRESCCA client platform SW framework for
More informationCAN FD - Flexible Tools for Flexible Data Rates
CAN FD - Flexible Tools for Flexible Data Rates Peter Decker Vector Informatik GmbH V 0.01 2012-06-20 Simulation & Test Environment for Automotive Networks Database Test Spec. ECU Simulation & Test Tool
More informationEB TechPaper. Combining the strengths of Elektrobit's SecOC with Argus IDPS. elektrobit.com
EB TechPaper Combining the strengths of Elektrobit's SecOC with Argus IDPS elektrobit.com After conducting several discussions in AUTOSAR and with customers regarding aspects of the Secure Onboard Communication
More informationCyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies
Cyber Security and Vehicle Diagnostics Mark Zachos DG Technologies SAE INTERNATIONAL SAE J3061 Cybersecurity Guidebook for Cyber-Physical Automotive Systems Published January 2016; drive to a risk-based,
More informationTechPaper. Over-the-air updates what advantages does the AUTOSAR Adaptive Platform offer?
TechPaper Over-the-air updates what advantages does the AUTOSAR Adaptive Platform offer? In vehicle development, using software to realize new functions is clearly in vogue. Vehicles that are already on
More informationUNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)
UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) Koji NAKAO, NICT, Japan (Expert of UNECE WP29/TFCS) General Flow of works in WP29/TFCS and OTA Data protection
More informationEthernet Design Challenges The requirements and use of Ethernet with AUTOSAR
Ethernet Design Challenges The requirements and use of Ethernet with AUTOSAR Anders Kallerdahl Product Manager AUTOSAR tools mentor.com/automotive Android is a trademark of Google Inc. Use of this trademark
More informationSoftware integration challenge multi-core experience from real world projects
Software integration challenge multi-core experience from real world projects Rudolf Grave 17.06.2015 Agenda About EB Automotive Motivation Constraints for mapping functions to cores AUTOSAR & MultiCore
More informationOverview of Security Support in Vector Tools
Overview of Secrity Spport in Vector Tools Secrity Manager V0.2 2017-09-22 Agenda Motivation Challenges Secrity Manager Otlook 2 Motivation Secrity protects Featres and Bsiness Models Secrity Goals: Integrity
More informationImplementation of Automotive Unified Diagnostic Services Based on AUTOSAR. Yue-yin XIE, Chao ZHOU and Feng LUO
2017 2nd International Conference on Information Technology and Management Engineering (ITME 2017) ISBN: 978-1-60595-415-8 Implementation of Automotive Unified Diagnostic Services Based on AUTOSAR Yue-yin
More informationMIGRATING TO CAN FD. Tony Adamson. Marketing Director CAN / LIN / FlexRay
MIGRATING TO CAN FD Tony Adamson Marketing Director CAN / LIN / FlexRay Agenda WHO ARE WE CAR NETWORKS UNDER TRANSFORMATION SPEED SRITY OUR MISSION AND STRATEGY 2 2 FEBRUARY 16, 2016 VECTOR CAN FD SYMPOSIUM
More informationDiagnostics is evolving
Diagnostics is evolving Vector India Conference, 208-07-8 V.0 208-07-3 Agenda AUTOSAR Development Remote Diagnostics and OTA Secrity 2 AUTOSAR Development DEXT Diagnostic Extract Template (=DEXT) Part
More informationتاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم
بنام خدا تاثیرفناوری اطالعات برسازمان ومدیریت جلسه هشتم و نهم امنیت بخشی به سیستمهای فناوری اطالعات Securing Information Systems 1 Learning Objectives Describe the business value of security and control.
More informationAUTOSAR System and Software Design with PREEvision
PREEvision 9.0 RELEASED V0.0 2018-10-15 Agenda CAN FD Commnication Design 2 OVERVIEW 3 Overview AUTOSAR in PREEvision Software Architectre Commnication Network Topology 4 Overview 5 Overview Mlti ser spport
More informationHacker Academy Ltd COURSES CATALOGUE. Hacker Academy Ltd. LONDON UK
Hacker Academy Ltd COURSES CATALOGUE Hacker Academy Ltd. LONDON UK TABLE OF CONTENTS Basic Level Courses... 3 1. Information Security Awareness for End Users... 3 2. Information Security Awareness for
More informationCSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT
CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT The Market and the Trend Cyber security market (2020): USD 170.21 billion, CAGR ~10% Storage market (2020): USD 18.28 billion, CAGR 22% Tons of data to
More informationTechday Mobile Electronics Open, connected, scalable With BODAS into the digital future
Techday 2017 Mobile Electronics Open, connected, scalable Martin Sykora DC-MH/SPL Technical Sales Manager Mobile Electronics 24.-25. October 2017 1 The Internet of Things 3 examples of how we are getting
More informationSecure automotive on-board networks
Secure automotive on-board networks Basis for secure vehicle-to-x communication Dr.-Ing. Olaf Henniger Fraunhofer SIT / Darmstadt 2 December 2010 Presentation overview EVITA project overview Security challenges
More informationAUTOSAR I ntegration for the MOST Network
MOST Forum, 21st of April 2015 1 Public ETAS/ESC 2015-04-21 ETAS GmbH 2015. All rights reserved, also regarding any disposal, exploitation, reproduction, Overview Concept study ordered by MOST Cooperation
More informationAutomotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017
Automotive Security: Challenges, Standards and Solutions Alexander Much 12 October 2017 Driver s fears are being fueled by recent news Connected Cars, new opportunities for hackers Autonomous Driving Concepts
More informationIndigo. Vector Diagnostic Tester V / 6
Indigo Vector Diagnostic Tester 1 / 6 V1.3 2018-09-13 Agenda 1. Indigo in General 2. Diagnostic Use Cases 3. Automation of Diagnostic Sequences 4. Remote Diagnostics 5. Summary 2 Indigo in General Executive
More information13W-AutoSPIN Automotive Cybersecurity
13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview
More informationIC32E - Pre-Instructional Survey
Name: Date: 1. What is the primary function of a firewall? a. Block all internet traffic b. Detect network intrusions c. Filter network traffic d. Authenticate users 2. A system that monitors traffic into
More informationAUTOSAR proofs to be THE automotive software platform for intelligent mobility
AUTOSAR proofs to be THE automotive software platform for intelligent mobility Dr.-Ing. Thomas Scharnhorst AUTOSAR Spokesperson Simon Fürst, BMW AG Stefan Rathgeber, Continental Corporation Lorenz Slansky,
More informationSecurity analysis and assessment of threats in European signalling systems?
Security analysis and assessment of threats in European signalling systems? New Challenges in Railway Operations Dr. Thomas Störtkuhl, Dr. Kai Wollenweber TÜV SÜD Rail Copenhagen, 20 November 2014 Slide
More informationCYBERSECURITY AND SERVICE STATIONS
CYBERSECURITY AND SERVICE STATIONS Hocine AMEUR and Simon Elrharbi hocine.ameur@coessi.fr simon.elrharbi@coessi.fr 1 AGENDA 1. WHO WE ARE 2. IoT and Security 3. Connected service stations security 4. How
More informationSecurity of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices
Security of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices Dr. Johann Heyszl, Head of Hardware Security Department Fraunhofer-Institute for Applied and Integrated Security
More informationArccore AB 2017, all rights reserved. Accelerating innovation
2017-03-02 Arccore AB 2017, all rights reserved Accelerating innovation ARCCORE in brief Independent vendor of automotive-sw with focus on AUTOSAR Integration, adaptation and service Incorporated 2009
More informationHandling Challenges of Multi-Core Technology in Automotive Software Engineering
Model Based Development Tools for Embedded Multi-Core Systems Handling Challenges of Multi-Core Technology in Automotive Software Engineering VECTOR INDIA CONFERENCE 2017 Timing-Architects Embedded Systems
More informationSmart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability
Smart Grid Embedded Cyber Security: Ensuring Security While Promoting Interoperability Communications and Embedded Systems Department Southwest Research Institute Gary Ragsdale, Ph.D., P.E. August 24 25,
More informationAUTOSAR Diagnostic Extract
AUTOSAR Diagnostic Extract The Standard in Practice V1.0 2017-09-26 Agenda Diagnostic Processes in Place AUTOSAR DEXT Introdction Designed for ECU development Enhancement of E/E Workflow Conclsion 2 Diagnostic
More information#RSAC #RSAC Thing Thing Thing Thing Thing Thing Edge Edge Gateway Gateway Cut costs Create value Find information in data then act Maintain Things Enrol Authorized Users & Things Authentication
More informationSecuring IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region
Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and
More information