Market Trends and Challenges in Vehicle Security
|
|
- Merry Stevens
- 5 years ago
- Views:
Transcription
1 Market Trends and Challenges in Vehicle Security FTF-AUT-F0080 Richard Soja Automotive MCU Systems Engineer A P R TM External Use
2 Microcontrollers and Digital Networking Processors A Global Leader Five Core Product Groups Automotive MCU >50 Year Legacy >5,500 Engineers >6,000 Patent Families > 24 Security Certifications Microcontrollers Digital Networking Analog & Sensors RF External Use 1
3 The Connected Vehicle Infotainment + Communication + Security Consumer electronics trends are dictating features in the car Always connected, applications driven, advanced graphics Infotainment systems becoming battleground for Auto differentiation As more connected systems get introduced into the vehicle, the need for security is critical Increasing external communication features (Bluetooth, TPMS, Ethernet, Wi-Fi, etc). Future interface for vehicle-to-vehicle and vehicle-to-infrastructure. External Use 2
4 Automotive Security Attack Surface Immobilizer Diagnostics Powertrain/Body/ Chassis ECU Gateway Modem External Sensors Dash Board/ DIS Base Station/ Infrastructure/ Other cars TPMS External Use 3
5 A Proven History in Driving Automotive Security 32-bit Qorivva MCUs built on Power Architecture technology 32-bit i.mx Mid 1990s Censorship Infrastructure Early 2000s Enhanced Censorship Infrastructure Mid 2000s High Assurance Boot Late 2000s Crypto Security Engine 2010s + Hardware Security Module External Use 4
6 Security Standards External Use 5
7 Freescale Participation in Standards/Consortium HIS SHE specification SHE module (CSE) implementation in 2011 EVITA Specification 3 levels of definition: Light, Medium and Full HSM module (Evita medium) implementation in 2012 Preserve Project duration V2X Security Subsystem Based on EVITA Full External Use 6
8 Cryptographic Strengths of different Algorithms NIST recommendations, 2012 The Date is the time frame during which the algorithms could be expected to provide adequate security The Strength is a measure of the difficulty of discovering the key External Use 7
9 Cryptographic Strengths of current Freescale Products NIST recommendations, 2012 The Date is a projection of the time frames during which the algorithms could be expected to provide adequate security The security Strength is a measure of the difficulty of discovering the key The Hash types are the minimum required to provide the desired security strength Devices Date Strength Symmetric Algorithms Hash Signature Hash HMAC,KDF, RNG Qorriva (AES-128 only) > AES-128 SHA-256 SHA-1 i.mx6 (no SHA-512) >>> AES-256 SHA-512 SHA-256 SHA-1 is not recommended for signatures in new systems External Use 8
10 Freescale Security Architectures External Use 9
11 Freescale Security Architecture Multi-layered approach strengthens overall vehicle security Protects against HW and SW theft, tuning, parts cloning, mileage manipulation and personal data theft Encryption Authentication Firewall Audit Trail Communications Applications HSM/CSE/Trust Zone Tamper detection module Flash External Use 10
12 Freescale Hardware-Enabled Security Options CSE HSM TDM HAB Cryptographic Security Engine Hardware Security Module Tamper Detection Module High Assurance Boot MPC564xB/C MPC5777C Turn-key solution SHE Compliant AES-128 Secure Key Storage MPC5746M MPC5777M User programmable Secure debug Supports CSE functional requirements Secure sensor interface Voltage, temperature and clock monitoring MPC5777M/C Records all attempts to modify flash memory Detects unauthorized reprogramming of application code Protects manufacturers investment i.mx Processors Supports ARM TrustZone Physical tamper detection AES-128, AES- 256, 3DES, ARC4 SHA-1, SHA- 256, MD-5 External Use 11
13 Security Level TM Security for the Development Lifecycle Increased security level required at each stage of the development lifecycle non-reversible, non-revocable Ensures application can be safely developed, debugged and validated without compromising security in the production vehicle Protects customer software IP in field returns In Field Field Return Vehicle Production Application Development Out of Fab Development Lifecycle Over Time External Use 12
14 Security Lifecycle State - Example of Impact on MCU Resources Lifecycle Customer Out of fab Customer Apps Development OEM Vehicle production production In field In field Failure Field analysis Return delivery (Pre-Delivery) delivery (Customer delivery) (OEM production) (Failure analysis) Device test & Flash interface test Closed Open Closed Closed Closed Open interface BAF block Not Programmed and set as OTP Programmed and set as OTP Programmed and set as OTP Programmed and set as OTP Programmed and set as OTP UTest Block OTP Programmed protected during test OTP protected OTP protected OTP protected OTP protected UTest Flash Blocks Access OTP Erase/Program/Read protected OTP Based protected on PASS LOCK bits Based OTP protected on Censorship, Based OTP protected on Censorship, Based OTP protected on Censorship, PASS LOCK bits PASS LOCK bits PASS LOCK bits Passwords to unlock Accessible Not Programmed / Accessible Programmed / /Readable SSCM access Access only SSCM access Access only SSCM access Access only the Flash protections Programmed Programmed and the debug port PASS LOCK register update Main Cores core Debug debug Interface interface n/a Can be updated independently from the password Open Can Without be updated password Upon password matching Upon password matching Upon password independently from the matching password Open Based on Censorship, Based on on Censorship, Based on Censorship, PASS LOCK bits PASS LOCK bits PASS LOCK bits Boot From internal Flash if a valid header is found, otherwise from Serial Boot From internal Flash if a valid header is found, otherwise from Serial Boot From internal Flash if a valid header is found, otherwise from Serial Boot From internal Flash From internal Flash Actually 2 states. Only UTest Block is changed in Out of Fab states External Use 13
15 Sync CAAM Master Key SNVS Physical Tamper Detection Security Violations i.mx6x 14 SNVS CAAM SJC WDOG System Security Monitor Security State 47 bit counter OCOTP OTP Master Key HP Master Key Control 32 bit GP Register 48 bit Monotonic Counter 47 bit counter Zeroizable Master Key Security Violation kHz LP Monotonic Counter Rollover Protection Mechanism Tamper Detectors Power Supply Glitch Detectors External Tamper Inputs External Use 14
16 MPC5777M - The Flagship Automotive MCU Device External Use 15
17 MPC5777M High Performance Automotive MCU External Use 16
18 Security Application Examples External Use 17
19 Chain of Trust (Secure Boot) Example Security code provides root of trust Root of trust may progressively authenticate the application code and enable execution to reduce startup time Hardware acceleration may allow faster, one step authentication Real time authentication may provide added security Run as background task Security Code Check Sys Boot ROM Check App Boot Check App Step 1 Enable Enable Application Code Reset Sys Boot ROM App Boot Enable Check App Step 2 App Step 1 External Use 18
20 Sensor Authentication Example Trusted application sends random code to sensor (the challenge) Random number used to prevent replay attacks Sensor generates hash for code using its key, and returns result (the response) Key may be secret (symmetric) or public (asymmetric) Trusted application uses its key to authenticate the sensor result 1. Application sends challenge KeyA RNG Trusted Application Code Serial Interface Secure Sensor KeyB 3. Application authenticates response 2. Sensor sends response External Use 19
21 Trust Architecture The Problem, part I Potentially many independent software providers Potentially many different sensitive resources Code Segments Tier 1 code OEM code MCAL OS AutoSAR Other 3 rd parties Security Code Access Regions FlexCAN SRAM0 Secure SRAM SRAM2 Secure Flash GTM etpu AES-128 Engine External Use 20
22 Trust Architecture The Problem, part II Without a trust architecture, all code can access all memory regions This might not be a good thing Code Segments Tier 1 code OEM code MCAL OS AutoSAR Other 3 rd parties Security Code Access Regions FlexCAN SRAM0 Secure SRAM SRAM2 Secure Flash GTM etpu AES-128 Engine External Use 21
23 Trust Architecture - Enablers A Hardware Firewall Authenticated method of installing object code Hardware Map between Code and Access Regions Code Segments Firewall Access Regions Authenticated software installation Tier 1 code OEM code MCAL OS AutoSAR Other 3 rd parties Security Code FlexCAN SRAM0 Secure SRAM SRAM2 Secure Flash GTM etpu AES-128 Engine External Use 22
24 Trust Architecture - Features Provides program isolation Provides peripheral modules isolation Allows security code to have exclusive access to secured resources Also supports non-core masters (e.g. DMA, Ethernet, FlexRay) Code Segments Firewall Access Regions Authenticated software installation Tier 1 code OEM code MCAL OS AutoSAR Other 3 rd parties Security Code FlexCAN SRAM0 Secure SRAM SRAM2 Secure Flash GTM etpu AES-128 Engine External Use 23
25 Security Enhancements External Use 24
26 Security Enhancements Attacks on vehicle systems will becoming more pervasive as the vehicle becomes more connected to the Intelligent Transportation System of the future More advanced crypto algorithms must be implemented, such as SHA-512, ECC256/384 to protect OEM and customer assets Enhanced security measures must be enabled to counter side channel attacks such as SPA and DPA Of course the cost of an attack must be weighed against the cost of prevention External Use 25
27 A Proven Leader in Automotive Security Growth will come from new applications Advanced Driver Assistance Systems Hybrid/Electric Vehicles Connectivity and Entertainment Affordable solutions for emerging markets We will continue to deliver Advanced robust process technologies Consistent optimized architectures that are safe and secure Software, tools and reference designs Zero defect quality Market Expertise and Consistency External Use 26
28 For Further Information Freescale link SME Contact information Richard Soja, System Engineer Additional Information &task=view&id=31&itemid= External Use 27
29 External Use 28
30 Freescale Semiconductor, Inc. External Use
Build a Driver Information System with IoT Technology
Build a Driver Information System with IoT Technology FTF-AUT-F0482 Jack Xu BD marketing, Asia Pacific MAY.2014 TM External Use Agenda Connected Car and Automotive IoT Infotainment Trend Car Network Trend
More informationTrusted Platform Modules Automotive applications and differentiation from HSM
Trusted Platform Modules Automotive applications and differentiation from HSM Cyber Security Symposium 2017, Stuttgart Martin Brunner, Infineon Technologies Axiom: Whatever is connected can (and will)
More informationMPC5748G Gateway, HSM and Secure OTA Update
MPC5748G Gateway, HSM and Secure OTA Update FTF-AUT-F0347 Alasdair Robertson Auto MCU Applications EKB APR.2014 TM External Use Agenda MPC5748G Device Overview Automotive Security Overview Why do we need
More informationSicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017
Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen Axel Freiwald 1/2017 All OEMs Will Implement Software OTA As Soon As Possible IHS Study Motivation: Save on recalls caused by software bugs Evolution
More informationConnecting Securely to the Cloud
Connecting Securely to the Cloud Security Primer Presented by Enrico Gregoratto Andrew Marsh Agenda 2 Presentation Speaker Trusting The Connection Transport Layer Security Connecting to the Cloud Enrico
More informationEmerging Financial Payment Applications Powered by Freescale Security Solutions
Emerging Financial Payment Applications Powered by Freescale Security Solutions FTF-CON-F0484 Starle Li Marketing Manager, AP M A Y. 2 0 1 4 TM External Use Agenda Explosive Growth of China POS Industry
More informationIntroducing Hardware Security Modules to Embedded Systems
Introducing Hardware Security Modules to Embedded Systems for Electric Vehicles charging according to ISO/IEC 15118 V1.0 2017-03-17 Agenda Hardware Trust Anchors - General Introduction Hardware Trust Anchors
More informationCyber security of automated vehicles
Cyber security of automated vehicles B. Steurich Infineon Technologies Conference Sep. 2017, Berlin Building blocks of automated driving: Cooperation of multiple system and disciplines Data Processing
More informationSecuring IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region
Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and
More informationProvisioning secure Identity for Microcontroller based IoT Devices
Provisioning secure Identity for Microcontroller based IoT Devices Mark Schaeffer, Sr. Product Marketing Manager, Security Solutions Synergy IoT Platform Business Division, Renesas Electronics, Inc. May
More informationSecure Ethernet Communication for Autonomous Driving. Jared Combs June 2016
Secure Ethernet Communication for Autonomous Driving Jared Combs June 2016 Agenda Motivation for Security The Multi-Level Security Architecture Proposal Level 1: Restrict access to the network Level 2:
More informationCyber security mechanisms for connected vehicles
Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX
More informationHigh-Performance, Highly Secure Networking for Industrial and IoT Applications
High-Performance, Highly Secure Networking for Industrial and IoT Applications Table of Contents 2 Introduction 2 Communication Accelerators 3 Enterprise Network Lineage Features 5 Example applications
More informationAtmel Trusted Platform Module June, 2014
Atmel Trusted Platform Module June, 2014 1 2014 Atmel Corporation What is a TPM? The TPM is a hardware-based secret key generation and storage device providing a secure vault for any embedded system Four
More informationSecure automotive on-board networks
Secure automotive on-board networks Basis for secure vehicle-to-x communication Dr.-Ing. Olaf Henniger Fraunhofer SIT / Darmstadt 2 December 2010 Presentation overview EVITA project overview Security challenges
More informationTRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS
TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS MATTHEW SHORT SR PRODUCT LINE MANAGER DIGITAL NETWORKING MATTHEW.SHORT@NXP.COM A NEW POSITION OF STRENGTH #1 Communications Processors #1 RF Power Transistors
More informationFuture Implications for the Vehicle When Considering the Internet of Things (IoT)
Future Implications for the Vehicle When Considering the Internet of Things (IoT) FTF-AUT-F0082 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Agenda Overview of Existing Automotive
More informationCountermeasures against Cyber-attacks
Countermeasures against Cyber-attacks Case of the Automotive Industry Agenda Automotive Basics ECU, domains, CAN Automotive Security Motivation, trends Hardware and Software Security EVITA, SHE, HSM Secure
More informationAutomotive Security An Overview of Standardization in AUTOSAR
Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg Hackers take over steering from smart car driver
More informationCSPN Security Target. HP Sure Start HW Root of Trust NPCE586HA0. December 2016 Reference: HPSSHW v1.3 Version : 1.3
CSPN Security Target HP Sure Start HW Root of Trust NPCE586HA0 December 2016 Reference: HPSSHW v1.3 Version : 1.3 1 Table of contents 1 Introduction... 4 1.1 Document Context... 4 1.2 Product identification...
More informationTweeting? Please use hashtag #FTF2011. Freescale on Facebook Tag yourself in photos and upload your own!
23 June 2011 Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, C-Ware, t he Energy Efficient Solutions logo, mobilegt, PowerQUICC, QorIQ, StarCore and Symphony are trademarks
More informationSECURITY CRYPTOGRAPHY Cryptography Overview Brochure. Cryptography Overview
SECURITY CRYPTOGRAPHY Cryptography Overview Brochure Cryptography Overview DPA-resistant and Standard Cryptographic Hardware Cores DPA (Differential Power Analysis) Resistant Hardware Cores prevent against
More informationFlash Bootloader. Product Information
Product Information Table of Contents 1 Flash Memory Programming... 3 2 Flash Bootloader - ECU programming via CAN, LIN, FlexRay, MOST and Ethernet... 3 2.1 Overview of Advantages... 3 2.2 Application
More informationKSAR Support. for. ST s SPC5 32-bit Automotive MCUs
KSAR Support for ST s SPC5 32-bit Automotive MCUs AUTOSAR Practice Facts and Numbers Our Offerings Our Credentials Our Investments Products AUTOSAR R4.0.3/R4.2.1 ICC3 compliant Basic Software Stack AUTOSAR
More informationTitan silicon root of trust for Google Cloud
Scott Johnson Dominic Rizzo Secure Enclaves Workshop 8/29/2018 Titan silicon root of trust for Google Cloud 1 Cloud Perspective: We need a silicon root of trust Software infrastructure Datacenter equipment
More informationJürgen Frank. Automotive Sr. Systems Engineer. September 2013
Jürgen Frank Automotive Sr. Systems Engineer September 2013 Introduction Security, why? Use-case overview Attack examples In a nutshell: Security Algorithms Automotive Standards Freescale Qorivva Security
More informationScott Johnson Dominic Rizzo Parthasarathy Ranganathan Jon McCune Richard Ho. Titan: enabling a transparent silicon root of trust for Cloud
Scott Johnson Dominic Rizzo Parthasarathy Ranganathan Jon McCune Richard Ho Titan: enabling a transparent silicon root of trust for Cloud 1 Talk outline 01 02 03 04 05 Motivation and problem statement
More informationSecurity in Automotive Applications
Security in Automotive Applications Fabrice Poulard, Technical Marketing Automotive Business Group Class ID: BC05I Renesas Electronics America Inc. Fabrice Poulard Manager, Automotive Business Group Renesas
More informationBlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE. Cryptographic Appliances with Integrated Level 3+ Hardware Security Module
BlackVault Hardware Security Platform SECURE TRUSTED INTUITIVE Cryptographic Appliances with Integrated Level 3+ Hardware Security Module The BlackVault hardware security platform keeps cryptographic material
More informationScalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018
Scalable and Flexible Software Platforms for High-Performance ECUs Christoph Dietachmayr Sr. Engineering Manager, November 8, Agenda A New E/E Architectures and High-Performance ECUs B Non-Functional Aspects:
More informationSW-Update. Thomas Fleischmann June 5 th 2015
Thomas Fleischmann June 5 th 2015 2 3 Agenda The big picture SW-Update today Diagnostics vs SW-Update Our solution for SW-Update The real challenges beyond getting a file into the car Elektrobit (EB),
More informationAutomotive Security: Challenges and Solutions
Automotive Security: Challenges and Solutions 8 th Vector Congress 30 th November 2016 V2.01.00 2016-11-22 Agenda Introduction Services Embedded Security Mechanisms Tools Summary 2 Introduction Vehicle
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Eric Wang Sr. Technical Marketing Manager Tech Symposia China 2015 November 2015 Agenda Introduction Security Foundations on ARM Cortex -M Security Foundations
More informationSTMicroelectronics Automotive MCU Technical Day 意法半导体汽车微控制器技术日 2017 年 ST 汽车 MCU 技术日 2017 年 6 月 6 日, 上海 2017 年 6 月 8 日, 深圳 2017 年 6 月 13 日, 北京
STMicroelectronics Automotive MCU Technical Day 意法半导体汽车微控制器技术日 2017 年 ST 汽车 MCU 技术日 2017 年 6 月 6 日, 上海 2017 年 6 月 8 日, 深圳 2017 年 6 月 13 日, 北京 KSAR Support for ST s SPC5 32-bit Automotive MCUs AUTOSAR NOS
More informationSecuring the future of mobility
Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need
More informationBeyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop
Beyond TrustZone Security Enclaves Reed Hinkel Senior Manager Embedded Security Market Develop Part2 Security Enclaves Tech Seminars 2017 Agenda New security technology for IoT Security Enclaves CryptoIsland
More informationFTF-CON-F0403. An Introduction to Heterogeneous Multiprocessing (ARM Cortex -A + Cortex- M) on Next-Generation i.mx Applications Processors
An Introduction to Heterogeneous Multiprocessing (ARM Cortex -A + Cortex- M) on Next-Generation i.mx Applications Processors FTF-CON-F0403 Glen Wienecke i.mx Systems Architect A P R. 2 0 1 4 TM External
More informationSecuring IoT devices with Hardware Secure Element. Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager
Securing IoT devices with Hardware Secure Element Fabrice Gendreau EMEA Secure MCUs Marketing & Application Manager 2 A global semiconductor leader 2016 revenues of $6.97B Listed: NYSE, Euronext Paris
More informationSecurity of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices
Security of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices Dr. Johann Heyszl, Head of Hardware Security Department Fraunhofer-Institute for Applied and Integrated Security
More informationDelivering High-mix, High-volume Secure Manufacturing in the Distribution Channel
Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel Steve Pancoast Vice President, Engineering Secure Thingz Inc Rajeev Gulati Vice President and CTO Data IO Corporation 1
More informationVirtual Hardware ECU How to Significantly Increase Your Testing Throughput!
Virtual Hardware ECU How to Significantly Increase Your Testing Throughput! Elektrobit Tech Day Jason Niatas Synopsys Inc. July 27, 2017 2017 Synopsys, Inc. 1 Agenda Automotive electronic evolution and
More information$263 WHITE PAPER. Flexible Key Provisioning with SRAM PUF. Securing Billions of IoT Devices Requires a New Key Provisioning Method that Scales
WHITE PAPER Flexible Key Provisioning with SRAM PUF SRAM PUF Benefits Uses standard SRAM Device-unique keys No secrets reside on the chip No key material programmed Flexible and scalable Certifications:
More informationFIPS Non-Proprietary Security Policy. Level 1 Validation Version 1.2
Oracle Solaris Kernel Cryptographic Framework with SPARC T4 and T5 Software Version: 1.0 and 1.1; Hardware Version: SPARC T4 (527-1437-01) and T5 (7043165) FIPS 140-2 Non-Proprietary Security Policy Level
More informationCypress PSoC 6 Microcontrollers
Cypress PSoC 6 Microcontrollers Purpose-Built for the Internet of Things WWW.CYPRESS.COM/PSOC6 Unmatched Solutions for the Internet of Things EMBEDDED IN TOMORROW The IoT is exploding, with more than 30
More informationFundamentals of HW-based Security
Fundamentals of HW-based Security Udi Maor CryptoCell-7xx Product Manager Systems and SW Group ARM Tech Forum 2016 - Korea Jun. 28, 2016 What is system security design? Every system design will require
More informationSecurity and Performance Benefits of Virtualization
Security and Performance Benefits of Virtualization Felix Baum mentor.com/embedded Android is a trademark of Google Inc. Use of this trademark is subject to Google Permissions. Linux is the registered
More informationAMD Security and Server innovation
presented by AMD Security and Server innovation UEFI PlugFest March 18-22, 2013 Roger Lai AMD TATS BIOS Development Group Updated 2011-06-01 UEFI Spring PlugFest March 2013 www.uefi.org 1 Agenda Exciting
More informationFreescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, C-Ware, the Energy Efficient Solutions logo, mobilegt, PowerQUICC,
March 2013 Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, C-Ware, the Energy Efficient Solutions logo, mobilegt, PowerQUICC, QorIQ, StarCore and Symphony are trademarks of
More informationWindows IoT Security. Jackie Chang Sr. Program Manager
Windows IoT Security Jackie Chang Sr. Program Manager Rest Physical access to a device will not give access to data Data & Control Execution Data owner has full control over data processing Motion Transport
More informationNew STM32WB Series MCU with Built-in BLE 5 and IEEE
New STM32WB Series MCU with Built-in BLE 5 and IEEE 802.15.4 Make the Choice of STM32WB Series The 7 keys points to make the difference 2 Open 2.4 GHz radio Multi-protocol Dual-core / Full control Ultra-low-power
More informationHow to protect Automotive systems with ARM Security Architecture
How to protect Automotive systems with ARM Security Architecture Thanks to this app You can manoeuvre The new Forpel Using your smartphone! Too bad it s Not my car Successful products will be attacked
More informationTrustzone Security IP for IoT
Trustzone Security IP for IoT Udi Maor CryptoCell-7xx product manager Systems & Software Group ARM Tech Forum Singapore July 12 th 2017 Why is getting security right for IoT so important? When our everyday
More informationCreate, Embed, Empower. Crevavi Technologies Company profile
Create, Embed, Empower Crevavi Technologies Company profile Copyright Crevavi 2018 About Crevavi Technologies Estd in 2011. Based in India. Offices in Bangalore and Mysore Branches in US, Germany and Australia
More informationTPM v.s. Embedded Board. James Y
TPM v.s. Embedded Board James Y What Is A Trusted Platform Module? (TPM 1.2) TPM 1.2 on the Enano-8523 that: How Safe is your INFORMATION? Protects secrets from attackers Performs cryptographic functions
More informationARM processors driving automotive innovation
ARM processors driving automotive innovation Chris Turner Director of advanced technology marketing, CPU group ARM tech forums, Seoul and Taipei June/July 2016 The ultimate intelligent connected device
More informationDesignWare IP for IoT SoC Designs
DesignWare IP for IoT SoC Designs The Internet of Things (IoT) is connecting billions of intelligent things at our fingertips. The ability to sense countless amounts of information that communicates to
More informationAXIAD IDS CLOUD SOLUTION. Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure
AXIAD IDS CLOUD SOLUTION Trusted User PKI, Trusted User Flexible Authentication & Trusted Infrastructure Logical Access Use Cases ONE BADGE FOR CONVERGED PHYSICAL AND IT ACCESS Corporate ID badge for physical
More informationThe Future of Security is in Open Silicon Linux Security Summit 2018
The Future of Security is in Open Silicon Linux Security Summit 2018 Joel Wittenauer - Embedded Software Architect Rambus Cryptography Research August 28, 2018 Agenda About Rambus Cryptography Research
More informationAutomotive Gateway: A Key Component to Securing the Connected Car
Automotive : A Key Component to Securing the Connected Car Introduction Building vehicles with gateways electronic devices that enable secure and reliable communications among a vehicle s electronic systems
More informationSeagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy
Seagate Secure TCG Enterprise SSC Pulsar.2 Self-Encrypting Drive FIPS 140 Module Security Policy Security Level 2 Rev. 0.9 November 12, 2012 Seagate Technology, LLC Page 1 Table of Contents 1 Introduction...
More informationMAC57D5xx Start-Up Sequence
Freescale Semiconductor Document Number: AN5285 Application Note Rev. 0, 05/2016 MAC57D5xx Start-Up Sequence by: Manuel Rodriguez 1 Introduction The MAC57D5xx family is the next generation platform of
More informationFreescale i.mx6 Architecture
Freescale i.mx6 Architecture Course Description Freescale i.mx6 architecture is a 3 days Freescale official course. The course goes into great depth and provides all necessary know-how to develop software
More informationTrusted Computing Group
Trusted Computing Group Backgrounder May 2003 Copyright 2003 Trusted Computing Group (www.trustedcomputinggroup.org.) All Rights Reserved Trusted Computing Group Enabling the Industry to Make Computing
More informationKey Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering. Key Threats Internet was just growing Mail was on the verge
Key Threats Internet was just growing Mail was on the verge Key Threats Melissa (1999), Love Letter (2000) Mainly leveraging social engineering Key Threats Code Red and Nimda (2001), Blaster (2003), Slammer
More information10 th AUTOSAR Open Conference
10 th AUTOSAR Open Conference Dr. Moritz Neukirchner Elektrobit Automotive GmbH Building Performance ECUs with Adaptive AUTOSAR AUTOSAR Nov-2017 Major market trends and their impact Trends Impact on E/E
More informationi.mx アプリケーション プロセッサ ARM Processor for Automotive Sadeque Hanif Marketing, Microcontrollers External Use
i.mx アプリケーション プロセッサ ARM Processor for Automotive Sadeque Hanif Marketing, Microcontrollers TM External Use Automotive Internet of Things CLOUD Audio Amplifier i.mx, Vybrid Connecting Your Car to Your World
More informationSoftware Architecture for Secure ECUs. Rudolf Grave EB TechDay-June 2015
Software Architecture for Secure ECUs Rudolf Grave EB TechDay-June 2015 Agenda No safety without security and vice versa Established Safety Concepts Safety Analysis Methods for Security Analysis Secure
More informationNew Embedded NVM architectures
New Embedded NVM architectures for Secure & Low Power Microcontrollers Jean DEVIN, Bruno LECONTE Microcontrollers, Memories & Smartcard Group STMicroelectronics 11 th LETI Annual review, June 24th, 2009
More informationAutomotive Anomaly Monitors and Threat Analysis in the Cloud
Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications
More informationHow Security Mechanisms Can Protect Cars Against Hackers. Christoph Dietachmayr, CIS Solution Manager EB USA Techday, Dec.
How Security Mechanisms Can Protect Cars Against Hackers Christoph Dietachmayr, CIS Solution Manager EB USA Techday, Dec. 3 rd 2015 Driver s Fears Are Being Fueled by Recent News ConnectedCars, new opportunies
More informationFreescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, C-Ware, t he Energy Efficient Solutions logo, mobilegt, PowerQUICC,
Freescale, the Freescale logo, AltiVec, C-5, CodeTEST, CodeWarrior, ColdFire, C-Ware, t he Energy Efficient Solutions logo, mobilegt, PowerQUICC, QorIQ, StarCore and Symphony are trademarks of Freescale
More informationGrowth outside Cell Phone Applications
ARM Introduction Growth outside Cell Phone Applications ~1B units shipped into non-mobile applications Embedded segment now accounts for 13% of ARM shipments Automotive, microcontroller and smartcards
More informationImplementing a Secure Boot with Microsemi IGLOO2 FPGA
Implementing a Secure Boot with Microsemi IGLOO2 FPGA June 2013 Abstract Microsemi IGLOO 2 devices have a wide range of differentiated security features that can implement secure boot capability on an
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 11 Basic Cryptography Objectives Define cryptography Describe hashing List the basic symmetric cryptographic algorithms 2 Objectives
More informationMicrocontroller Solutions
17 June 2008 Microcontroller Solutions Paul Grimme Senior Vice President and General Manager Financial Overview Freescale 2007 Revenue: $5.7 Billion 2007 Market Share Rankings RF, Analog, and Sensor $1,048
More informationSafeNet HSM solutions for secure virtual amd physical environments. Marko Bobinac SafeNet PreSales Engineer
SafeNet HSM solutions for secure virtual amd physical environments Marko Bobinac SafeNet PreSales Engineer Root of trust for your physical and virtual environment 2 But HW doesn t work in a Virtual World?
More informationInterconnected, reliable and future-proof. Telematics units by Liebherr
Interconnected, reliable and future-proof Telematics units by Liebherr Future-proof interconnection Reliable, secure and powerful: Telematics units by Liebherr interconnect mobile machines and enable their
More informationDesigning Security & Trust into Connected Devices
Designing Security & Trust into Connected Devices Rob Coombs Security Marketing Director TechCon 11/10/15 Agenda Introduction Security Foundations on Cortex-M Security Foundations on Cortex-A Use cases
More informationAzure Sphere Transformation. Patrick Ward, Principal Solutions Specialist
Azure Sphere Transformation Patrick Ward, Principal Solutions Specialist IoT @_pdubya pward@microsoft.com Microcontrollers (MCUs) LOW-COST, SINGLE CHIP COMPUTERS TMS1100: 300 KHz core, 2KB ROM, 64B RAM,
More informationThe Next Steps in the Evolution of Embedded Processors
The Next Steps in the Evolution of Embedded Processors Terry Kim Staff FAE, ARM Korea ARM Tech Forum Singapore July 12 th 2017 Cortex-M Processors Serving Connected Applications Energy grid Automotive
More informationThe modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.
Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased
More informationMicrocontrollers. Claude Dardanne Executive Vice President, General Manager, Microcontrollers, Memory & Secure MCU Group.
Microcontrollers Claude Dardanne Executive Vice President, General Manager, Microcontrollers, Memory & Secure MCU Group Francois Guibert Executive Vice President, President, Greater China and South Asia
More informationDell SonicWALL. NSA 220, NSA 220W and NSA 240. FIPS Non-Proprietary Security Policy
Dell SonicWALL NSA 220, NSA 220W and NSA 240 FIPS 140-2 Non-Proprietary Security Policy Level 2 Version 3.1 April 28, 2014 1 Copyright Notice Copyright 2014 Dell SonicWALL May be reproduced only in its
More informationResilient IoT Security: The end of flat security models
Resilient IoT Security: The end of flat security models Xiao Sun Senior Application Engineer ARM Tech Symposia China 2015 November 2015 Evolution from M2M to IoT M2M Silos of Things Standards Security
More informationSecurity in NVMe Enterprise SSDs
Security in NVMe Enterprise SSDs Radjendirane Codandaramane, Sr. Manager, Applications, Microsemi August 2017 1 Agenda SSD Lifecycle Security threats in SSD Security measures for SSD August 2017 2 SSD
More informationOFF-ROAD VEHICLE DIAGNOSTICS WITH AUTOSAR. Jigar Patel Namdeo Dhawle July 18, 2018
OFF-ROAD VEHICLE DIAGNOSTICS WITH AUTOSAR Jigar Patel Namdeo Dhawle July 18, 2018 AGENDA Motivation of UDS diagnostics in Agriculture and Construction Vehicles UDS vs J1939 Challenges and Proposed solutions
More informationSSD AES ENCRYPTION. Application Note. Document #AN0009 Viking SSD AES Encryption Rev. B. Purpose of this Document
SSD AES ENCRYPTION Application Note Document #AN0009 Rev. B Purpose of this Document This application note was prepared to help OEM system designers evaluate the performance of Viking solid state drive
More informationM2351 Security Architecture. TrustZone Technology for Armv8-M Architecture
Architecture TrustZone Technology for Armv8-M Architecture Outline NuMicro Architecture TrustZone for Armv8-M Processor Core, Interrupt Handling, Memory Partitioning, State Transitions. TrustZone Implementation
More informationIDCore. Flexible, Trusted Open Platform. financial services & retail. Government. telecommunications. transport. Alexandra Miller
IDCore Flexible, Trusted Open Platform financial services & retail enterprise > SOLUTION Government telecommunications transport Trusted Open Platform Java Card Alexandra Miller >network identity >smart
More information盤技術Approaches for Secure and Efficient In-Vehicle Key Management*
Modern vehicle systems have transitioned from being 盤技術Approaches for Secure and Efficient In-Vehicle Key Management* Takeshi SUGASHIMA Dennis Kengo OKA Camille VUILLAUME DENSO TECHNICAL REVIEW Vol.21
More informationDataTraveler 5000 (DT5000) and DataTraveler 6000 (DT6000) Ultimate Security in a USB Flash Drive. Submitted by SPYRUS, Inc.
Submitted by SPYRUS, Inc. Contents DT5000 and DT6000 Technology Overview...2 Why DT5000 and DT6000 Encryption Is Different...3 Why DT5000 and DT6000 Encryption Is Different - Summary...4 XTS-AES Sector-Based
More informationThe Future of Smart Cards: Bigger, Faster and More Secure
The Future of Smart Cards: Bigger, Faster and More Secure Joerg Borchert, Vice President, Secure Mobile Solutions July 16, 2003 Page 1 N e v e r s t o p t h i n k i n g. Infineon Technologies: Overview
More informationSmart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017
Smart Antennas and : Enabling Secure Convergence July 5, 2017 About OpenSynergy OpenSynergy develops software solutions for embedded automotive systems. OpenSynergy s product portfolio includes key software
More informationHewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0
Hewlett-Packard Development Company, L.P. NonStop Volume Level Encryption (NSVLE) Product No: T0867 SW Version: 2.0 FIPS 140 2 Non Proprietary Security Policy FIPS Security Level: 1 Document Version: 1.3
More informationNew STM32WB Series MCU with built-in Bluetooth 5 and IEEE
New STM32WB Series MCU with built-in Bluetooth 5 and IEEE 802.15.4 Make the Choice of STM32WB Series The 7 keys points to make the difference 2 Open 2.4 GHz radio Multi-protocol Dual-core / Full control
More informationWHAT FUTURE FOR CONTACTLESS CARD SECURITY?
WHAT FUTURE FOR CONTACTLESS CARD SECURITY? Alain Vazquez (alain.vazquez@louveciennes.sema.slb.com) 1/27 AV Contents Major contactless features : summary Contactless major constraints Major security issues
More informationARM Moves Further Into Automotive with NXP's Launch of S32K Series to the General Market
ARM Moves Further Into Automotive with NXP's Launch of S32K Series to the General Market Automotive Electronics (AES) Report Snapshot NXP has now launched its new S32K range of microcontrollers for the
More informationIntegral Memory PLC. Crypto Dual (Underlying Steel Chassis) and Crypto Dual Plus (Underlying Steel Chassis) FIPS Security Policy
Integral Memory PLC. Chassis) and Crypto Dual Plus (Underlying FIPS 140-2 Security Policy Table of Contents 1. INTRODUCTION... 1 1.1 Purpose....1 1.2 References... 1 1.3 Document History... 1 2. PRODUCT
More informationDolphin DCI 1.2. FIPS Level 3 Validation. Non-Proprietary Security Policy. Version 1.0. DOL.TD DRM Page 1 Version 1.0 Doremi Cinema LLC
Dolphin DCI 1.2 FIPS 140-2 Level 3 Validation Non-Proprietary Security Policy Version 1.0 DOL.TD.000921.DRM Page 1 Version 1.0 Table of Contents 1 Introduction... 3 1.1 PURPOSE... 3 1.2 REFERENCES... 3
More informationCompute solutions for mass deployment of autonomy
Compute solutions for mass deployment of autonomy Rod Watt Director of Vehicle Architecture and System Analysis Introduction 2 From inception to now 1990 Joint venture between Acorn Computers and Apple.
More information