Automotive Cyber Security

Size: px
Start display at page:

Download "Automotive Cyber Security"

Transcription

1 Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18 January

2 Smart Cars 2

3 Driverless Car by Google Velodyne 64-beam laser. San Francisco s Lombard Street 3 3

4 The GM OnStar System: The First Smart Telematics Solution in the World Enterprise Telematics Platform Cellular Channel Backend Cellular Communication 4

5 Key Challenge in the Automotive Sector Copyright 2013 Tata Consultancy Services Limited 5

6 GOAL KEY QUESTIONS CATEGORIES Categories of Automotive Cyber Security Automotive Cybersecurity: Our View Cybersecurity is Critical to Connected Customer Value In-Vehicular Security V2X Security Security of Services Design Build Use How to co-design software and hardware for cybersecurity? How to offer a trusted platform? How to ensure interoperability? How to conform to standards in cybersecurity? How to build connected products that are secure? How to ensure that latest design changes are integrated in production? How to ensure secure usage of connected architecture? How to handle vulnerabilities before, during & after threats? How to allow customers configure features at low risks? Manage Trade-offs for Robust Auto Security Securing content, Authenticating Sender and Receiver of Messages, And Protecting Privacy and Data Across Stakeholders 6

7 Attack & Defense Scenario Framework for Threat Modeling Attack & Defence Database uses a list of attacks by vulnerable subsystems ensuring that response mechanisms are effective in cost and speed at all levels POTENTIAL VULNERABLE SUBSYSTEMS ATTACK CATEGORIES : EXAMPLES Infotainment Web Applications are Provided In the Vehicle Broken Authentication & Session Management Insecure Direct Object References Sensitive Data Exposure Security Misconfiguration Missing Function Level Access Control Cross-site Request Forgery Unvalidated redirects and forwards 7

8 What makes Security Critical? Increasing Electronics, Control & Software (ECS) Increasing & Complex Features Infotainment & Entertainment Wireless Links (Bluetooth, WiFi, Cellular, Radio, etc) Drive towards Autonomous Vehicles CISCO world in the Vehicle CAN, Flexray bus ECUs Compute Platform/Gateway Firewalls, 8

9 Example: V2X Communications X: Vehicle or Infrastructure Copyright 2013 Tata Consultancy Services Limited 9

10 V2X Communications Avoiding lane change collision Collision mitigation Avoiding rear-end collision Vehicle brakes hard Avoiding intersection collision V2V: Vehicle to Vehicle V2I: Vehicle to Infrastructure V2P: Vehicle to Pedestrian Traffic signal 10

11 Security Threats in V2V & V2I Figure Source : 11

12 Communication for Active safety Design Drivers & Security Attributes for V2X Safety Applications V2V or V2I scenarios Balancing customer safety and connectivity in a transient multi-modal communication environment is a major challenge Design Drivers for PKI Resource Constrained Platform Limited computation, storage, memory System-wide scalability Many-to-many localized interactions Communication transmission Intermittent connections with lossy or unreliable transmission Interoperability Extensible security framework Message Integrity & Entity Authentication Transmitter is genuine, not tampered in transit Non-repudiation Receiver can prove that it s the sender who transmitted the message Privacy Anonymity, Un-linkability Correctness Detecting compromised units Security Attributes for V2X Robust V2X interfaces developed with rapid validation is an innovation opportunity 12

13 Concluding Remarks Cyber Security offers rich challenges for both Industry & Academia An excellent example is Autonomous Cars Automotive Cyber Security is an extremely challenging area There are a plethora of technical and business challenges in the space The area is attracting huge interest within OEMs, Tier 1 and Tier 2 organizations 13

14 Thank You Copyright 2013 Tata Consultancy Services Limited 14

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No

More information

Agenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2

Agenda. About TRL. What is the issue? Security Analysis. Consequences of a Cyber attack. Concluding remarks. Page 2 Security Insert the Vulnerabilities title of your of the presentation Connected here Car Presented Presented by by Peter Name Vermaat Here Principal Job Title ITS - Date Consultant 24/06/2015 Agenda 1

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

Future Implications for the Vehicle When Considering the Internet of Things (IoT)

Future Implications for the Vehicle When Considering the Internet of Things (IoT) Future Implications for the Vehicle When Considering the Internet of Things (IoT) FTF-AUT-F0082 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Agenda Overview of Existing Automotive

More information

Emerging Trends in Vehicular Communications

Emerging Trends in Vehicular Communications Emerging Trends in Vehicular Communications Rajeev Shorey (Ph.D) Fellow Indian National Academy of Engineering Senior Member IEEE President, NIIT University, India www.niituniversity.in (Formerly GM Research

More information

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018 Securely Connecting People, Applications, and Devices Ted Shorter Chief Technology Officer CSS Ted.Shorter@css-security.com

More information

Examining future priorities for cyber security management

Examining future priorities for cyber security management Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with

More information

DEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy.

DEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy. DEx Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy Lars Moberger Research Institutes of Sweden BUILT ENVIRONMENT ENERGY AND CIRCULAR ECONOMY

More information

WeVe: When Smart Wearables Meet Intelligent Vehicles

WeVe: When Smart Wearables Meet Intelligent Vehicles WeVe: When Smart Wearables Meet Intelligent Vehicles Jiajia Liu School of Cyber Engineering, Xidian University, Xi an, China Smart wearables and intelligent vehicles constitute indispensable parts of Internet

More information

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT

More information

Authentication with Privacy for Connected Cars - A research perspective -

Authentication with Privacy for Connected Cars - A research perspective - Authentication with Privacy for Connected Cars - A research perspective - Mark Manulis Surrey Centre for Cyber Security, Deputy-Director Department of Computer Science University of Surrey sccs.surrey.ac.uk

More information

Automotive Anomaly Monitors and Threat Analysis in the Cloud

Automotive Anomaly Monitors and Threat Analysis in the Cloud Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications

More information

To realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan

To realize Connected Vehicle Society. Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan To realize Connected Vehicle Society Yosuke NISHIMURO Ministry of Internal Affairs and Communications (MIC), Japan Services provided by Connected Vehicle 1 Vehicle 5G V2X Connected Vehicle Big Data AI

More information

Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is

Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is Press release High-performance IT security solutions protect V2X communication against cyberattacks ESCRYPT GmbH Am Hain 5, 44789 Bochum, Germany Phone: +49 234 43870-200 Press and Public Relations: Martin

More information

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security In less than a year, 100s of millions connected cars Aftermarket connectivity most prevalent

More information

13W-AutoSPIN Automotive Cybersecurity

13W-AutoSPIN Automotive Cybersecurity 13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview

More information

Electrification of Mobility

Electrification of Mobility Electrification of Mobility Moderator: Andreas Schafer, Cambridge University and Stanford University Panelists: Mary Nickerson, Toyota Ed Kjaer, Southern California Edition Flavio Bonomi, Cisco Systems

More information

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How

More information

Security for V2X Communications

Security for V2X Communications Security for V2X Communications ITS Canada Annual General Meeting May 1-4, 2016 Brian Romansky VP Strategic Technology Your Connected Car Your Connected Car Security Security Partner Partner TrustPoint

More information

Copyright 2017 Ford Motor Company, All Rights Reserved

Copyright 2017 Ford Motor Company, All Rights Reserved - Research Analyst Digitization - IT Research and Innovation - PhD Candidate University of Michigan Dearborn - Machine Learning in Automotive Security - Vice Chair - IEEE SEM 01 02 03 04 05 Intro Ford

More information

Cooperative Vehicles Opportunity and Challenges

Cooperative Vehicles Opportunity and Challenges Cooperative Vehicles Opportunity and Challenges State Smart Transportation Initiative Toyota Motor Engineering & Manufacturing North America (TEMA) Toyota Technical Center (TTC) Hideki Hada 4/24/2012 Presentation

More information

Turbocharging Connectivity Beyond Cellular

Turbocharging Connectivity Beyond Cellular Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) Turbocharging Connectivity Beyond Cellular Scott Beutler, Head of Interior Division

More information

Uptane: Securely Updating Automobiles. Sam Weber NYU 14 June 2017

Uptane: Securely Updating Automobiles. Sam Weber NYU 14 June 2017 Uptane: Securely Updating Automobiles Sam Weber NYU samweber@nyu.edu 14 June 2017 Credits Funded by DHS S&T CSD Work done by New York University University of Michigan Transportation Research Institute

More information

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,

More information

Secure Product Design Lifecycle for Connected Vehicles

Secure Product Design Lifecycle for Connected Vehicles Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards

More information

Next Generation Infotainment Systems

Next Generation Infotainment Systems Next Generation Infotainment Systems John Absmeier Director, Silicon Valley Innovation Center Digital gadgets more important for car buyers January 11, 2013 Smartphones in the Driver s Seat Never before

More information

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation Accelerating solutions for highway safety, renewal, reliability, and capacity Regional Operations Forums Connected Vehicles and the Future of Transportation ti Session Overview What are connected and automated

More information

Controlling traffic In a Connected world

Controlling traffic In a Connected world Controlling traffic In a Connected world Stefan Myhrberg Transport engagements Ericsson Ericsson Internal 2013-10-14 Page 1 Impact on society Communication Is a basic Human need Smartphone 4G Mobile video

More information

SGS CYBER SECURITY GROWTH OPPORTUNITIES

SGS CYBER SECURITY GROWTH OPPORTUNITIES SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER

More information

Automotive Gateway: A Key Component to Securing the Connected Car

Automotive Gateway: A Key Component to Securing the Connected Car Automotive : A Key Component to Securing the Connected Car Introduction Building vehicles with gateways electronic devices that enable secure and reliable communications among a vehicle s electronic systems

More information

SECURITY OF VEHICLE TELEMATICS SYSTEMS. Daniel Xiapu Luo Department of Computing The Hong Kong Polytechnic University

SECURITY OF VEHICLE TELEMATICS SYSTEMS. Daniel Xiapu Luo Department of Computing The Hong Kong Polytechnic University SECURITY OF VEHICLE TELEMATICS SYSTEMS Daniel Xiapu Luo Department of Computing The Hong Kong Polytechnic University 1 2 3 TELEMATICS 4 TELEMATICS 5 OBD-II On-Board Diagnostic Perform emissions related

More information

Securing the Autonomous Automobile

Securing the Autonomous Automobile Securing the Autonomous Automobile Sridhar Iyengar Vice President, Intel Labs Intel Corporation CROSSING Conference May 15-17 2017 Legal Notices and disclaimers This presentation contains the general insights

More information

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Paul Wooderson Vehicle cybersecurity concerns Privacy vehicle as a data hub Theft physical cybersecurity Safety - impacts of

More information

Security enhancing CAN transceivers. Bernd Elend Principal Engineer March 8 th, 2017

Security enhancing CAN transceivers. Bernd Elend Principal Engineer March 8 th, 2017 Bernd Elend Principal Engineer March 8 th, 2017 Introduction: SECURITY REQUIRES A LAYERED APPROACH NXP s 4 + 1 Layer approach for vehicle cyber security: Multiple security techniques, at different levels

More information

All rights reserved. ITS at ETSI. Presented by Luis Jorge Romero on behalf of ETSI TC ITS

All rights reserved.  ITS at ETSI. Presented by Luis Jorge Romero on behalf of ETSI TC ITS http://eustandards.in/ ITS at ETSI Presented by Luis Jorge Romero on behalf of ETSI TC ITS 2 All rights reserved ITS: a definition ITS means applying Information and Communications Technologies (ICT) to

More information

Securing V2X communications with Infineon HSM

Securing V2X communications with Infineon HSM Infineon Security Partner Network Securing V2X communications with Infineon HSM Savari and Infineon The Sign of Trust for V2X Products SLI 97 www.infineon.com/ispn Use case Application context and security

More information

ARM processors driving automotive innovation

ARM processors driving automotive innovation ARM processors driving automotive innovation Chris Turner Director of advanced technology marketing, CPU group ARM tech forums, Seoul and Taipei June/July 2016 The ultimate intelligent connected device

More information

Vehicle To Android Communication Mode

Vehicle To Android Communication Mode Technical Disclosure Commons Defensive Publications Series May 12, 2017 Vehicle To Android Communication Mode Tanmay Wadhwa Neil Dhillon Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego

Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Steve Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage (UCSD) Karl Koscher,

More information

Innovation policy for Industry 4.0

Innovation policy for Industry 4.0 Innovation policy for Industry 4.0 Remarks from Giorgio Mosca Chair of Cybersecurity Steering Committee Confindustria Digitale Director Strategy & Technologies - Security & IS Division, Leonardo Agenda

More information

Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection

Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection Intelligent Transportation Systems (ITS) for Critical Infrastructure Protection Presented at the Transportation Research Board January 2002 Annual Meeting Washington DC, USA HAMED BENOUAR Executive Director

More information

National Institute of Standards and Technology

National Institute of Standards and Technology National Institute of Standards and Technology April 2017 1 ITL Mission ITL promotes U.S. innovation and industrial competitiveness by advancing measurement science, standards, and related technology through

More information

Development of Intrusion Detection System for vehicle CAN bus cyber security

Development of Intrusion Detection System for vehicle CAN bus cyber security Development of Intrusion Detection System for vehicle CAN bus cyber security Anastasia Cornelio, Elisa Bragaglia, Cosimo Senni, Walter Nesci Technology Innovation - SSEC 14 Workshop Automotive SPIN Italia

More information

AUTOMOTIVE FOUNDATIONAL SOFTWARE SOLUTIONS FOR THE MODERN VEHICLE

AUTOMOTIVE FOUNDATIONAL SOFTWARE SOLUTIONS FOR THE MODERN VEHICLE www.qnx.com AUTOMOTIVE FOUNDATIONAL SOFTWARE SOLUTIONS FOR THE MODERN VEHICLE OVERVIEW Dear colleagues in the automotive industry, We are in the midst of a pivotal moment in the evolution of the car. Connected

More information

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017 Automotive Security: Challenges, Standards and Solutions Alexander Much 12 October 2017 Driver s fears are being fueled by recent news Connected Cars, new opportunities for hackers Autonomous Driving Concepts

More information

Roger C. Lanctot Director, Automotive Connected Mobility

Roger C. Lanctot Director, Automotive Connected Mobility Roger C. Lanctot Director, Automotive Connected Mobility Roger Lanctot has 25+ years of experience as a journalist, analyst and consultant advising electronics companies, car companies, wireless carriers,

More information

Trusted Platform Modules Automotive applications and differentiation from HSM

Trusted Platform Modules Automotive applications and differentiation from HSM Trusted Platform Modules Automotive applications and differentiation from HSM Cyber Security Symposium 2017, Stuttgart Martin Brunner, Infineon Technologies Axiom: Whatever is connected can (and will)

More information

Heavy Vehicle Cybersecurity Update. National Motor Freight Traffic Association, Inc.

Heavy Vehicle Cybersecurity Update. National Motor Freight Traffic Association, Inc. Heavy Vehicle Cybersecurity Update National Motor Freight Traffic Association, Inc. National Motor Freight Traffic Association, Inc. (NMFTA) Industry non-profit representing more than 600 companies operating

More information

Cyber security of automated vehicles

Cyber security of automated vehicles Cyber security of automated vehicles B. Steurich Infineon Technologies Conference Sep. 2017, Berlin Building blocks of automated driving: Cooperation of multiple system and disciplines Data Processing

More information

GNU Radio Software Defined DSRC Radio

GNU Radio Software Defined DSRC Radio Institute for Critical Technology and Applied Science GNU Radio Software Defined DSRC Radio Joseph M. Ernst, PhD Research Assistant Professor (540) 231-2254, jmernst@vt.edu hume@vt.edu www.hume.vt.edu

More information

Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University

Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University Vehicle Connectivity in Intelligent Transport Systems: Today and Future Prof. Dr. Ece Güran Schmidt - Middle East Technical University OUTLINE Intelligent Transportation Systems (ITS) Vehicle connectivity

More information

5G promotes the intelligence connected vehicles. Dr. Menghua Tao Senior Solution Manager China Unicom

5G promotes the intelligence connected vehicles. Dr. Menghua Tao Senior Solution Manager China Unicom 5G promotes the intelligence connected vehicles Dr. Menghua Tao Senior Solution Manager China Unicom ICT enabled automated driving One of the important features of a smart car is automated driving. As

More information

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017 Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen Axel Freiwald 1/2017 All OEMs Will Implement Software OTA As Soon As Possible IHS Study Motivation: Save on recalls caused by software bugs Evolution

More information

Offense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent

Offense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent Offense & Defense in IoT World Samuel Lv Keen Security Lab, Tencent Keen Security Lab of Tencent Wide coverage of software and hardware security research Mainstream PC & Mobile Operating Systems Mainstream

More information

Trust & Privacy: Information Security and Identity Management for Autonomous Vehicles. March 31, failure analysis & prevention

Trust & Privacy: Information Security and Identity Management for Autonomous Vehicles. March 31, failure analysis & prevention failure analysis & prevention Trust & Privacy: Information Security and Identity Management for Autonomous Vehicles March 31, 2016 A leading engineering & scientific consulting firm dedicated to helping

More information

Applying Lessons Learned to V2X Communications for China

Applying Lessons Learned to V2X Communications for China Jim Misener Director, Technical Standards Qualcomm Technologies, Inc. Applying Lessons Learned to V2X Communications for China 2013-2014 Qualcomm Technologies, Inc. and/or its affiliated companies. All

More information

A Perspective on V2X in the United States

A Perspective on V2X in the United States A Perspective on V2X in the United States John B. Kenney, Ph.D Director and Principal Researcher Toyota InfoTechnology Center, USA jkenney@us.toyota-itc.com November 14, 2017 SIP-adus Workshop on Connected

More information

Introduction to VANET

Introduction to VANET VANET Introduction to VANET -Vehicles connected to each others through an ad hoc formation form a wireless network called Vehicular Ad Hoc Network. -Vehicular ad hoc networks (VANETs) are a subgroup of

More information

TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS

TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS MATTHEW SHORT SR PRODUCT LINE MANAGER DIGITAL NETWORKING MATTHEW.SHORT@NXP.COM A NEW POSITION OF STRENGTH #1 Communications Processors #1 RF Power Transistors

More information

WardsAuto Interiors Conference Creating the Ultimate User Experience

WardsAuto Interiors Conference Creating the Ultimate User Experience Bitte decken Sie die schraffierte Fläche mit einem Bild ab. Please cover the shaded area with a picture. (24,4 x 11,0 cm) WardsAuto Interiors Conference Creating the Ultimate User Experience Scott Beutler,

More information

Integrated C4isr and Cyber Solutions

Integrated C4isr and Cyber Solutions Integrated C4isr and Cyber Solutions When Performance Matters L3 Communication Systems-East provides solutions in the C4ISR and cyber markets that support mission-critical operations worldwide. With a

More information

Dedicated Short Range Communication: What, Why and How?

Dedicated Short Range Communication: What, Why and How? Dedicated Short Range Communication: What, Why and How? Imran Hayee EE Department, University of Minnesota Duluth Connected Vehicles Research Lab (http://www.d.umn.edu/ee/cvrl/index.html) Outline Background

More information

Using and Customizing Microsoft Threat Modeling Tool 2016

Using and Customizing Microsoft Threat Modeling Tool 2016 Using and Customizing Microsoft Threat Modeling Tool 2016 Boston Code Camp 27 March 25, 2017 Robert Hurlbut RobertHurlbut.com @RobertHurlbut Boston Code Camp 27 - Thanks to our Sponsors! Platinum Gold

More information

Smart Connected Vehicles: Driving to the Bottom Line!

Smart Connected Vehicles: Driving to the Bottom Line! Smart Connected Vehicles: Driving to the Bottom Line! Andreas Mai, Director Smart Connected Vehicles June 23, 2015 The Panelists Frank Weith Chuck Link Andreas Mai General Manager Connected Services Chief

More information

Extreme automation of today s technological marvel - connected cars

Extreme automation of today s technological marvel - connected cars VIEW POINT Extreme automation of today s technological marvel - connected cars - Sandhya Jeevan Rao Senior Project Manager Abstract Going by Gartner s findings which suggests that 25 billion connected

More information

Security in sensors, an important requirement for embedded systems

Security in sensors, an important requirement for embedded systems Security in sensors, an important requirement for embedded systems Georg Sigl Institute for Security in Information Technology Technical University Munich sigl@tum.de Fraunhofer AISEC Institute for Applied

More information

A. SERVEL. EuCNC Special Sessions 5G connected car 01/07/2015

A. SERVEL. EuCNC Special Sessions 5G connected car 01/07/2015 A. SERVEL EuCNC 2015 - Special Sessions 5G connected car 01/07/2015 Connected cars, a reality since 12 years for our customers! 2003 A Pioneer for emergency 1.6 million of equipped vehicles 2006 One of

More information

Security Challenges with ITS : A law enforcement view

Security Challenges with ITS : A law enforcement view Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr

More information

VEHICLE FORENSICS. Infotainment & Telematics Systems. Berla Corporation Copyright 2015 by Berla. All Rights Reserved.

VEHICLE FORENSICS. Infotainment & Telematics Systems. Berla Corporation Copyright 2015 by Berla. All Rights Reserved. VEHICLE FORENSICS Infotainment & Telematics Systems Berla Corporation 2015 WELCOME Company Overview Infotainment & Telematics Systems Overview of Potentially Acquirable Data ive Software/Hardware ABOUT

More information

Industry 4.0 & Transport for Digital Infrastructure

Industry 4.0 & Transport for Digital Infrastructure Industry 4.0 for Digital Infrastructure u Vehicle to Anything Connectivity (V2X) ICT changes Transport Automotive World IT World V2I IVN-Sensor X-by-Wire, MOST, CDMA, DSRC, WLAN,.. RSU Distance Sens. Multi

More information

M2MD Communications Gateway: fast, secure, efficient

M2MD Communications Gateway: fast, secure, efficient Solution Brief M2MD Communications Gateway: fast, secure, efficient G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity.

More information

Security and Privacy in Car2Car Adhoc Networks

Security and Privacy in Car2Car Adhoc Networks Security and Privacy in Car2Car Adhoc Networks Antonio Kung Trialog www.trialog.com 15/06/2016 1 Introduction French SME Involved since 2002 in security and privacy for connected vehicles 15/06/2016 2

More information

SIP Automated Driving System SEIGO KUZUMAKI Program Director. Nov

SIP Automated Driving System SEIGO KUZUMAKI Program Director. Nov SIP Automated Driving System SEIGO KUZUMAKI Program Director Nov.14.2017 Welcome back to SIP-adus WS! `Is it not delightful to have friends coming from distant quarters? (The Analects of Confucius) Intensive

More information

Automotive Security Standardization activities and attacking trend

Automotive Security Standardization activities and attacking trend Automotive Standardization activities and attacking trend Ingo Dassow, Deloitte November 2017 Automotive Risk Overview Trends and risks for connected vehicles 2 Value and Components of a Car Autonomous

More information

Securing the future of mobility

Securing the future of mobility Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need

More information

CompTIA Security+ Study Guide (SY0-501)

CompTIA Security+ Study Guide (SY0-501) CompTIA Security+ Study Guide (SY0-501) Syllabus Session 1 At the end of this session, students will understand what risk is and the basics of what it means to have security in an organization. This includes

More information

Internet of Things: Driving the Transformation

Internet of Things: Driving the Transformation Internet of Things: Driving the Transformation Annabel Nickles, PhD, MBA Director, Emerging Platform Solutions Integrated Computing Research Intel Labs 1 What Are People Saying about IOT? Vol. 12345 Nr.001

More information

Security Analysis of modern Automobile

Security Analysis of modern Automobile Security Analysis of modern Automobile Dixit Verma Department of Electrical & Computer Engineering Missouri University of Science and Technology dv6cb@mst.edu 20 Apr 2017 Outline Introduction Attack Surfaces

More information

ETSI ITS Security Assessment

ETSI ITS Security Assessment ETSI ITS Security Assessment Alexandru C. Serban 1,2 Erik Poll 1 Joost Visser 2 1 Digital Security - Radboud University, Nijmegen 2 Research Team - Software Improvement Group, Amsterdam Contents Outline

More information

Build a Driver Information System with IoT Technology

Build a Driver Information System with IoT Technology Build a Driver Information System with IoT Technology FTF-AUT-F0482 Jack Xu BD marketing, Asia Pacific MAY.2014 TM External Use Agenda Connected Car and Automotive IoT Infotainment Trend Car Network Trend

More information

Cyber security mechanisms for connected vehicles

Cyber security mechanisms for connected vehicles Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX

More information

Connect Vehicles: A Security Throwback

Connect Vehicles: A Security Throwback Connect Vehicles: A Security Throwback Chris Valasek (@nudehaberdasher) Director of Vehicle Security Research Introduction Hello Chris Valasek Director of Vehicle Security Research IPS Dev -> Windows RE

More information

ITU activities on secure vehicle software updates

ITU activities on secure vehicle software updates Submitted by the expert form ITU Document No. ITS/AD-08-08 (8 th ITS/AD, 9 March 2016, agenda item 4) ITU activities on secure vehicle software updates 8 th meeting of IWG ITS/AD 9 March 2016 T.Russell

More information

4G and 5G Cellular Technologies Enable Intelligent Transportation Use Cases

4G and 5G Cellular Technologies Enable Intelligent Transportation Use Cases 4G and 5G Cellular Technologies Enable Intelligent Transportation Use Cases Martti Mustajärvi martti.mustajarvi@nokia.com Nokia Innovation Steering Principal Technologist 1 Nokia 2016 1 Our mission is

More information

IRF and UNECE ITS Event

IRF and UNECE ITS Event IRF and UNECE ITS Event Intelligent Transport Systems standardization in ITU Geneva, 4 December 2018 Chaesub LEE Director, ITU Telecommunication Standardization Bureau : international organization with

More information

Automotive Security through New Communication Lockdown Utilizing Programmable Logic Solutions

Automotive Security through New Communication Lockdown Utilizing Programmable Logic Solutions Automotive Security through New Communication Lockdown Utilizing Programmable Logic Solutions Authors: Dan Isaacs Director Automotive Business Unit Xilinx dani@xilinx.com Jillian Goldberg VP Marketing

More information

Computer Science 461 Final Exam May 22, :30-3:30pm

Computer Science 461 Final Exam May 22, :30-3:30pm NAME: Login name: Computer Science 461 Final Exam May 22, 2012 1:30-3:30pm This test has seven (7) questions, each worth ten points. Put your name on every page, and write out and sign the Honor Code pledge

More information

V2X: Beyond the Horizon. IBTTA AET Meeting July 18, 2017

V2X: Beyond the Horizon. IBTTA AET Meeting July 18, 2017 V2X: Beyond the Horizon IBTTA AET Meeting July 18, 2017 Battle over V2X Technology: DSRC vs 5G 18 July 2017 www.kapsch.net 2 Dedicated Short Range Communication (DSRC) Bi-directional wireless communications

More information

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled

More information

Connected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use

Connected Car. Dr. Sania Irwin. Head of Systems & Applications May 27, Nokia Solutions and Networks 2014 For internal use Connected Car Dr. Sania Irwin Head of Systems & Applications May 27, 2015 1 Nokia Solutions and Networks 2014 For internal use Agenda Introduction Industry Landscape Industry Architecture & Implications

More information

CyberFence Protection for DNP3

CyberFence Protection for DNP3 CyberFence Protection for DNP3 August 2015 Ultra Electronics, 3eTI 2015 DNP3 Issues and Vulnerabilities DNP3 is one of the most widely used communications protocols within the utility space for the purpose

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

The NIST Cybersecurity Framework

The NIST Cybersecurity Framework The NIST Cybersecurity Framework U.S. German Standards Panel 2018 April 10, 2018 Adam.Sedgewick@nist.gov National Institute of Standards and Technology About NIST Agency of U.S. Department of Commerce

More information

to Address Cyber Physical Systems Security (CPSSEC)

to Address Cyber Physical Systems Security (CPSSEC) Combating Threats: S&T is Building a Resilient Cyber Ecosystem to Address Cyber Physical Systems Security (CPSSEC) Follow us at dhsscitech CPS Security is Critical Smart cars, grids, medical devices, manufacturing,

More information

Voertuigconstructeurs en data economie

Voertuigconstructeurs en data economie Voertuigconstructeurs en data economie STUDIEDAG VERKEERSVEILIGHEID VLAAMS HUIS VOOR DE VERKEERSVEILIGHEID DEPT MOW VLAAMS PARLEMENT, BRUSSEL 11 DECEMBER 2017 Saturday, 30 December 2017 AGENDA 1. Context

More information

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use

EPRI Research Overview IT/Security Focus. Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use EPRI Research Overview IT/Security Focus November 29, 2012 Mark McGranaghan VP, Power Delivery and Utilization Power Delivery & Energy Utilization Sector From Generator Bus Bar to End Use Transmission

More information

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016 Secure Ethernet Communication for Autonomous Driving Jared Combs June 2016 Agenda Motivation for Security The Multi-Level Security Architecture Proposal Level 1: Restrict access to the network Level 2:

More information

Risk-based design for automotive networks. Eric Evenchik, Linklayer labs & Motivum.io Stefano Zanero, Politecnico di Milano & Motivum.

Risk-based design for automotive networks. Eric Evenchik, Linklayer labs & Motivum.io Stefano Zanero, Politecnico di Milano & Motivum. Risk-based design for automotive networks Eric Evenchik, Linklayer labs & Motivum.io Stefano Zanero, Politecnico di Milano & Motivum.io Who are we Eric Evenchick Stefano Zanero Linklayer Labs (Toronto,

More information

Network, Policy & Privacy Considerations for Connected Autonomous Vehicle Initiatives

Network, Policy & Privacy Considerations for Connected Autonomous Vehicle Initiatives Network, Policy & Privacy Considerations for Connected Autonomous Vehicle Initiatives Wednesday, April 25, 2018 11:30 am - 12:00 pm (EDT) Presented by Lindsay Miller & Matthew Diaz Ice Miller LLP 250 West

More information