Connected Cars & Security Challenges. Stéphane Desneux CTO at IoT.bzh

Size: px
Start display at page:

Download "Connected Cars & Security Challenges. Stéphane Desneux CTO at IoT.bzh"

Transcription

1 Connected Cars & Security Challenges Stéphane Desneux CTO at IoT.bzh Printemps des Entreprises IUT Vannes 15 Mars 2016

2 Agenda IoT.bzh & AGL Project Connected Cars Security: Issues and Solutions Conclusion Q&A 2

3 IoT.bzh & AGL Project 3

4 IoT.bzh Specialized on Embedded & IoT systems Strong Open Source culture Expertise domains: System architecture Security Application Framework Graphics & Multimedia Middleware & Connectivity Linux Kernel Located in Vannes - Brittany, France 4

5 My definition of IoT IoT: acronym for Internet of Things Network of physical objects composed of: Electronics Software Sensors Connectivity Multiple data exchanges with: Operators and final users Object Manufacturer Other local or remote IoT devices Cloud services 5

6 IoT Revolution IoT is hype but the buzz is justified: 2020: 25 to 50 billion objects (Gartner) IoT market will generate around $2000 billion of economic benefits Strong impact in many human activities: Home automation, Domestic appliances Transportation, Storage, Energy Healthcare, Life science, Wearables Financial, Insurance & Legal services... Connected Cars are part of this revolution Many constraints, interactions and domains to cover 6

7 AGL Project Hosted by the Linux Foundation Goal: build a reference Automotive Linux Distribution Open Source project Specifications are open Source code is open Project management is public IoT.bzh works for Renesas (Platinum member of AGL) 7

8 IoT.bzh contributions to AGL Changes on Gerrit 4% 2% 4% 30% 6% 20% 27% Panasonic IoT.bzh Linux Foundation Jaguar Land Rover Denso Qt Company Renesas Microchip Konsulko Mentor Fujitsu-Ten Pioneer Wind River 8

9 Connected Cars 9

10 What is an Automotive system? Homescreen AM/FM radio HVAC control Geolocation Media Player Phone Rear cameras & radars Navigation helper Application manager Driver assistance Diagnostics 10

11 Connected Cars: sensors Many Sensors / Signals to handle Vehicle parameters: engine, transmission, energy, diagnostics as usual GPS IR/Visible spectrum Cameras Radar/Lidar/Microwave/IR/Ultrasound sensors Accelerometers, Gyroscope, Magnetometers (9 DOF chips) Weather sensors... ADAS (Advanced Driver Assistance System) example Toyota ADAS: 11

12 Toyota ADAS <Video Toyota> 12

13 Connected Cars: connectivity Multiple channels 3G/4G Wifi Bluetooth Low energy networks (6LowPAN, SIGFOX )... Example: interaction with passengers devices Ford SDL: 13

14 Ford SDL <Video Ford> 14

15 Connected Cars: services 15

16 Security: Issues and Solutions 16

17 Why Securing Connected Cars? Attacking cars is a viable business Expensive piece of equipment Huge Mass market Enough customers to steal from But attacking cars is complex & expensive, no? Yes, but hackers have both time & money! Betting on hackers lack of skills is a very risky bet One single small security hole might be enough Automotive industry has limited knowledge and return of experience on being connected Car will be Connected & Connected Car will be Attacked 17

18 Security Fundamentals (1) Minimize attack surface area (2) Control the code which is run (3) Provide a bullet-proof update model (4) Apply security patches within days rather than weeks (5) Leverage HW security helpers (6) Isolate & compartmentalize wherever possible (7) Analysis and report of incidents (8) Development and QA with security turned on (9) Provide adequate tools to develop with security enabled (10) Do not rely on humans but on platform 18

19 Security/Complexity Mitigation Security Mechanisms might be short circuit Lack of knowledge Performances Time-to-market Cost concerns Embedded Security Expert is a rare animal 9M Mobile Developers 8M Web Developers 0.5M Embedded Developers How many Embedded Security Developers? Security cannot be added after the fact Must consist in built-in APIs & be transparent to applications Developers SHOULD NOT be in charge of security Baked in from day one: Architecture, Dev, QA, Maintenance,etc. 19

20 Layered Architecture Client/UI (untrusted) Risk of code injection (HTML5/QML) UI on external devices (Mobiles, Tablets) Access to secure service APIs only [REST] Applications & Services (semi-trusted) Unknown developers & Multi-source High-grain protection by Linux UserIDs & SMACK labels Run under control of Application Framework: need to provide a security manifest Platform & System services (trusted) D-Bus Services started by systemd Fine grain privilege provided by Cynara (privileges manager) Part of baseline distribution and certified services only 20

21 Layer/Service Segregation Run services not as root - systemd is your friend Create a dedicated UID per service Use MAC & DAC to minimize open access Drop privileges POSIX privileges MAC privileges Use CGroups Control RAM/CPU/IO Reduce offending power Use Namespaces Limit access to private data Limit access to connectivity Allows containerization 21

22 Need for Resilient Architecture Smart Multi Layers Security Architecture Breaking an application should not break a full layer Breaking a layer should not break the full system Compromised ID/keys are lost for good Per-device unique ID Per-device symmetric keys Use HW ID protection Non-Reproductibility of breakages Breaking in one car should not extend to all models / all cars Dev/Debug I/O, Sockets, should be disabled No Root Password & No shared super-user RSA key Password, when used, should not be easy to compute 22

23 AGL : use SMACK for MAC! Simplified Mandatory Access Control Kernel implemented as a Linux Security Module (LSM) since Safe principle: NO RULE = NO ACCESS and as a consequence: WHAT IS NOT EXPLICITELY AUTHORIZED IS FORBIDDEN! Smack access rules are defined by triplets: Subject Object Permissions Example: The rule ( System User rwx) allows processes running with label System to read, write and execute files with label User 23

24 AGL : Application Framework Contains a Package manager Package Installation Package Uninstallation Package Upgrade Application Lifecycle: Start (Pause Resume) Stop Event & signals propagation Privileges granting & checking API for interaction with applications 24

25 AGL : Action! 25

26 Conclusion 26

27 AGL and IoT Connected Cars are IoT devices AGL can reuse/adopt some methods, mechanisms, protocols and source code coming from generic IoT systems Example: Ostro ( IoT systems may benefit from some base AGL components Security framework Application framework 27

28 Security aspects Strong isolation & compartmentalization are required Untrusted applications should never have direct accesses and should always use intermediate APIs Platform services must be protected with privileges Shortcuts remain possible Services not compatible with a full isolation model can still bypass the security framework while still benefiting partially of it Reduce costs of development Security must be baked into the platform, not added later Developpers shouldn't take care of security Application Framework is a mandatory feature and structuring component. 28

29 Q&A Gulf of Morbihan, south of Brittany, France 29

30 Links IoT.bzh: AGL: Linux Foundation: 30

Application & Security Framework AGL-2.0 Architecture Proposal. Winter/AGL-AMM Tokyo 2016 Fulup Ar Foll Lead Architect

Application & Security Framework AGL-2.0 Architecture Proposal. Winter/AGL-AMM Tokyo 2016 Fulup Ar Foll Lead Architect Application & Security Framework AGL-2.0 Architecture Proposal Winter/AGL-AMM Tokyo 2016 Fulup Ar Foll Lead Architect fulup@iot.bzh Who Are We? Fulup Ar Foll Lead Architect Stéphane Desneux Manuel Bachmann

More information

Security and privacy in your embedded systems

Security and privacy in your embedded systems Security and privacy in your embedded systems Strong isolation of applications using Smack and Cynara José Bollo security at IoT.bzh jose.bollo@iot.bzh IoT.bzh Specialized on Embedded & IoT Contributing

More information

Introduction to application framework

Introduction to application framework Introduction to application framework for AGL Version 1.0 June 2016 Abstract This document presents the application framework created by IoT.bzh for AGL. Document revisions Date Version Designation Author

More information

X(cross) Development System make AGL application development easier. July 2017 Sébastien Douheret

X(cross) Development System make AGL application development easier. July 2017 Sébastien Douheret make AGL application development easier Sébastien Douheret sebastien.douheret@iot.bzh IoT.bzh Located in France - Brittany ( Vannes / Lorient / Rennes ) People background: 40% coming from Tizen IVI (Intel+Samsung)

More information

X(cross) Development System make AGL application development easier. December 2017 Sébastien Douheret

X(cross) Development System make AGL application development easier. December 2017 Sébastien Douheret make AGL application development easier Sébastien Douheret sebastien.douheret@iot.bzh IoT.bzh Located in France - Brittany ( Vannes / Lorient / Rennes ) People background: 40% coming from Tizen IVI (Intel+Samsung)

More information

Creating a profile from Tizen:Common. Stéphane Desneux Senior Software Engineer Eurogiciel

Creating a profile from Tizen:Common. Stéphane Desneux Senior Software Engineer Eurogiciel Creating a profile from Tizen:Common Stéphane Desneux Senior Software Engineer Eurogiciel Eurogiciel IT Services Company Open source development and integration:

More information

Tizen IVI Architecture New features. Dominig ar Foll, Intel Open Source

Tizen IVI Architecture New features. Dominig ar Foll, Intel Open Source Tizen IVI Architecture New features Dominig ar Foll, Intel Open Source Agenda What is Tizen IVI How to join the project Our road map Architecture New Features 2 What is Tizen IVI Tizen IVI Support Intel

More information

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,

More information

Tizen IVI Architecture New features

Tizen IVI Architecture New features Tizen IVI Architecture New features, Intel Open Source dominig.arfoll@fridu.net Agenda 2 What is Tizen IVI How to join the project Our road map Architecture New Features Tizen IVI Support Intel and ARM

More information

Tizen-Meta as Security and Connectivity Layers For Yocto Project

Tizen-Meta as Security and Connectivity Layers For Yocto Project Tizen-Meta as Security and Connectivity Layers For Yocto Project () dominig.arfoll@fridu.net October 2014 Tizen-Meta What is Tizen How to build Tizen with Yocto tools Which Connectivity is available with

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including

More information

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT

USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT USING DEVICE LIFECYCLE MANAGEMENT TO FUTURE PROOF YOUR IOT DEPLOYMENT Tom Gibbings Market Development Manager 2017 WIND RIVER. ALL RIGHTS RESERVED. IOT IS CHANGING HOW WE LIVE AND WORK 2 2017 WIND RIVER.

More information

SECURING DEVICES IN THE INTERNET OF THINGS

SECURING DEVICES IN THE INTERNET OF THINGS SECURING DEVICES IN THE INTERNET OF THINGS EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe consequences, including steep financial losses, damage

More information

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled

More information

Strong Security Elements for IoT Manufacturing

Strong Security Elements for IoT Manufacturing Strong Security Elements for IoT Manufacturing LANCEN LACHANCE VICE PRESIDENT PRODUCT MANAGEMENT GLOBALSIGN WHAT YOU WILL LEARN TODAY 1 2 3 Examining of security risks with smart connected products Implementing

More information

Securing Devices in the Internet of Things

Securing Devices in the Internet of Things AN INTEL COMPANY Securing Devices in the Internet of Things WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Security breaches at the device level in the Internet of Things (IoT) can have severe

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

Operating System Security

Operating System Security Operating System Security Operating Systems Defined Hardware: I/o...Memory.CPU Operating Systems: Windows or Android, etc Applications run on operating system Operating Systems Makes it easier to use resources.

More information

LINUX CONTAINERS. Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER

LINUX CONTAINERS. Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER Where Enterprise Meets Embedded Operating Environments WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Flexible and connected platforms are core components in leading computing fields, including

More information

Securing the Connected Car. Eystein Stenberg CTO Mender.io

Securing the Connected Car. Eystein Stenberg CTO Mender.io Securing the Connected Car Eystein Stenberg CTO Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled Software defined

More information

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS

THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS THE RTOS AS THE ENGINE POWERING THE INTERNET OF THINGS By Bill Graham and Michael Weinstein WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Driven by the convergence of cloud technology, rapidly

More information

Automotive Anomaly Monitors and Threat Analysis in the Cloud

Automotive Anomaly Monitors and Threat Analysis in the Cloud Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications

More information

Introduction to Device Trust Architecture

Introduction to Device Trust Architecture Introduction to Device Trust Architecture July 2018 www.globalplatform.org 2018 GlobalPlatform, Inc. THE TECHNOLOGY The Device Trust Architecture is a security framework which shows how GlobalPlatform

More information

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services

Managing IT Risk: What Now and What to Look For. Presented By Tina Bode IT Assurance Services Managing IT Risk: What Now and What to Look For Presented By Tina Bode IT Assurance Services Agenda 1 2 WHAT TOP TEN IT SECURITY RISKS YOU CAN DO 3 QUESTIONS 2 IT S ALL CONNECTED Introduction All of our

More information

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom

INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS. Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom INSPIRING IOT INNOVATION: MARKET EVOLUTION TO REMOVE BARRIERS Mark Chen Taiwan Country Manager, Senior Director, Sales of Broadcom CAUTIONARY STATEMENT This presentation may contain forward-looking statements

More information

Leveraging webos Technologies for Automotive. Lokesh Kumar Goel / Steve Lemke

Leveraging webos Technologies for Automotive. Lokesh Kumar Goel / Steve Lemke Leveraging webos Technologies for Automotive Lokesh Kumar Goel / Steve Lemke Agenda LG Silicon Valley Lab (SVL) Background LG SVL AGL Demo at CES 2018 webos Open Source Edition (OSE) webos Web App Runtime

More information

Azure Sphere: Fitting Linux Security in 4 MiB of RAM. Ryan Fairfax Principal Software Engineering Lead Microsoft

Azure Sphere: Fitting Linux Security in 4 MiB of RAM. Ryan Fairfax Principal Software Engineering Lead Microsoft Azure Sphere: Fitting Linux Security in 4 MiB of RAM Ryan Fairfax Principal Software Engineering Lead Microsoft Agenda o o o o Intro to Azure Sphere Kernel Customizations User mode services / App Model

More information

SECURIFY: A COMPOSITIONAL APPROACH OF BUILDING SECURITY VERIFIED SYSTEM

SECURIFY: A COMPOSITIONAL APPROACH OF BUILDING SECURITY VERIFIED SYSTEM 1 SRIFY: A COMPOSITIONAL APPROACH OF BUILDING SRITY VERIFIED SYSTEM Liu Yang, Associate Professor, NTU SG-CRC 2018 28 March 2018 2 Securify Approach Compositional Security Reasoning with Untrusted Components

More information

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017

mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM 2017 mbed OS Update Sam Grove Technical Lead, mbed OS June 2017 ARM mbed: Connecting chip to cloud Device software Device services Third-party cloud services IoT device application mbed Cloud Update IoT cloud

More information

Korea ICT Market Overview. Yoonmi Kim Finpro Korea

Korea ICT Market Overview. Yoonmi Kim Finpro Korea Korea ICT Market Overview Yoonmi Kim Finpro Korea 5G Advanced Network Key Players Network Service Provider Electronics Company Car and Car Component Company - 5G Antenna Technoloies for Mobile device and

More information

systemd integration and user management José Bollo

systemd integration and user management José Bollo systemd integration and user management José Bollo jose.bollo@iot.bzh Overview of applications Same ECU Security Context S Binder Security Context A Effective API Binder Shadow API local API Transport

More information

Building a Remote Control Robot with Automotive Grade Linux

Building a Remote Control Robot with Automotive Grade Linux Building a Remote Control Robot with Automotive Grade Linux Leon Anavi Konsulko Group leon.anavi@konsulko.com Embedded Linux Conference Europe 2017 23-25 October, Prague, Czech Republic Agenda Overview

More information

Virtualizaton: One Size Does Not Fit All. Nedeljko Miljevic Product Manager, Automotive Solutions MontaVista Software

Virtualizaton: One Size Does Not Fit All. Nedeljko Miljevic Product Manager, Automotive Solutions MontaVista Software Virtualizaton: One Size Does Not Fit All Nedeljko Miljevic Product Manager, Automotive Solutions MontaVista Software Agenda Linux and Automotive Challenges Solution: Virtualization Linux Containers Best

More information

Securing IoT with the ARM mbed ecosystem

Securing IoT with the ARM mbed ecosystem Securing IoT with the ARM mbed ecosystem Xiao Sun / Senior Applications Engineer / ARM ARM mbed Connect / Shenzhen, China December 5, 2016 Lots of interest in IoT security Researchers are looking into

More information

Regulation and the Internet of Things

Regulation and the Internet of Things Regulation and the Internet of Things 15 th Global Symposium for Regulators (GSR15) Prof. Ian Brown The views expressed in this presentation are those of the author and do not necessarily reflect the opinions

More information

Security for Secure IoT: Advanced Architectures for IoT Gateways. Simon Forrest Director of Segment Marketing, Consumer Electronics

Security for Secure IoT: Advanced Architectures for IoT Gateways. Simon Forrest Director of Segment Marketing, Consumer Electronics Security for Secure IoT: Advanced Architectures for IoT Gateways Simon Forrest Director of Segment Marketing, Consumer Electronics www.imgtec.com Imagination Technologies Company overview A world leader

More information

A new Distributed Security Model for Linux Clusters

A new Distributed Security Model for Linux Clusters A new Distributed Security Model for Linux Clusters Makan.Pourzandi@Ericsson.Com Open Systems Lab Montréal Canada June, 2004 Rev PA1 07/05/04 1 Outline Context Distributed Security Distributed Access Control

More information

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO

Incentives for IoT Security. White Paper. May Author: Dr. Cédric LEVY-BENCHETON, CEO White Paper Incentives for IoT Security May 2018 Author: Dr. Cédric LEVY-BENCHETON, CEO Table of Content Defining the IoT 5 Insecurity by design... 5 But why are IoT systems so vulnerable?... 5 Integrating

More information

AUTOMOTIVE FOUNDATIONAL SOFTWARE SOLUTIONS FOR THE MODERN VEHICLE

AUTOMOTIVE FOUNDATIONAL SOFTWARE SOLUTIONS FOR THE MODERN VEHICLE www.qnx.com AUTOMOTIVE FOUNDATIONAL SOFTWARE SOLUTIONS FOR THE MODERN VEHICLE OVERVIEW Dear colleagues in the automotive industry, We are in the midst of a pivotal moment in the evolution of the car. Connected

More information

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati

OWASP TOP Release. Andy Willingham June 12, 2018 OWASP Cincinnati OWASP TOP 10 2017 Release Andy Willingham June 12, 2018 OWASP Cincinnati Agenda A quick history lesson The Top 10(s) Web Mobile Privacy Protective Controls Why have a Top 10? Software runs the world (infrastructure,

More information

6.858 Quiz 2 Review. Android Security. Haogang Chen Nov 24, 2014

6.858 Quiz 2 Review. Android Security. Haogang Chen Nov 24, 2014 6.858 Quiz 2 Review Android Security Haogang Chen Nov 24, 2014 1 Security layers Layer Role Reference Monitor Mandatory Access Control (MAC) for RPC: enforce access control policy for shared resources

More information

Introduction to Automotive Grade Linux

Introduction to Automotive Grade Linux Introduction to Automotive Grade Linux AGL All-Member Meeting Tokyo February 20, 2018 Walt Miner ( @VStarWalt ) Community Manager, AGL, The Linux Foundation Automotive Grade Linux Collaborating to build

More information

Building Trust in the Internet of Things

Building Trust in the Internet of Things AN INTEL COMPANY Building Trust in the Internet of Things Developing an End-to-End Security Strategy for IoT Applications WHEN IT MATTERS, IT RUNS ON WIND RIVER EXECUTIVE SUMMARY Recent security breaches

More information

ARM Security Solutions and Numonyx Authenticated Flash

ARM Security Solutions and Numonyx Authenticated Flash ARM Security Solutions and Numonyx Authenticated Flash How to integrate Numonyx Authenticated Flash with ARM TrustZone* for maximum system protection Introduction Through a combination of integrated hardware

More information

Lecture 3 MOBILE PLATFORM SECURITY

Lecture 3 MOBILE PLATFORM SECURITY Lecture 3 MOBILE PLATFORM SECURITY You will be learning: What techniques are used in mobile software platform security? What techniques are used in mobile hardware platform security? Is there a common

More information

The Industrial Internet: Opportunities, Disruptions and Standards. Stephen Mellor Chief Technical Officer Industrial Internet Consortium

The Industrial Internet: Opportunities, Disruptions and Standards. Stephen Mellor Chief Technical Officer Industrial Internet Consortium The Industrial Internet: Opportunities, Disruptions and Standards Stephen Mellor Chief Technical Officer Industrial Internet Consortium Industrial vs. Consumer Internet of Things Similar Technology Drivers

More information

Chrome Extension Security Architecture

Chrome Extension Security Architecture Chrome Extension Security Architecture Presenter: Jienan Liu Network, Intelligence & security Lab outline Chrome extension introduction Threats towards extension Chrome extension s security architecture

More information

Smart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017

Smart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017 Smart Antennas and : Enabling Secure Convergence July 5, 2017 About OpenSynergy OpenSynergy develops software solutions for embedded automotive systems. OpenSynergy s product portfolio includes key software

More information

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No

More information

Connected Medical Devices

Connected Medical Devices Connected Medical Devices How to Reduce Risks Inherent in an Internet of Things that Can Help or Harm Laura Clark Fey, Esq., Principal, Fey LLC Agenda Overview of the Internet of Things for Healthcare

More information

Building mbed Together: An Overview of mbed OS and How To Get Involved

Building mbed Together: An Overview of mbed OS and How To Get Involved Building mbed Together: An Overview of mbed OS and How To Get Involved Hugo Vincent / Product Lead mbed OS, Paul Bakker / Product Strategy, mbed IoT Device Platform mbed Sponsored Session/ ARM Tech Con

More information

Creating a Practical Security Architecture Based on sel4

Creating a Practical Security Architecture Based on sel4 Creating a Practical Security Architecture Based on sel4 Xinming (Simon) Ou University of South Florida (many slides borrowed/adapted from my student Daniel Wang) 1 Questions for sel4 Community Is there

More information

A Peer-to-Peer Approach to Digital Key Sharing for Vehicle Access & Control. Tony Rosati Director of IOT Security, ESCRYPT

A Peer-to-Peer Approach to Digital Key Sharing for Vehicle Access & Control. Tony Rosati Director of IOT Security, ESCRYPT A Peer-to-Peer Approach to Digital Key Sharing for Vehicle Access & Control Tony Rosati Director of IOT Security, ESCRYPT Agenda Motivation for Digital Key Sharing Architecture Security Model Security

More information

Contributing to Automotive Grade Linux and GENIVI Development Platform

Contributing to Automotive Grade Linux and GENIVI Development Platform Contributing to Automotive Grade Linux and GENIVI Development Platform Leon Anavi Konsulko Group leon.anavi@konsulko.com Embedded Linux Conference 2017 21-23 February, Portland, Oregon Agenda Automotive

More information

Agile IoT Solution Driving Digital Transformation of Transportation

Agile IoT Solution Driving Digital Transformation of Transportation Agile IoT Solution Driving Digital Transformation of Transportation Dr. Wu Chou IEEE Fellow & CTO Enterprise Network Product Line, Huawei Products & Solutions IoT: Next Billions of Connections Smart Building

More information

Handling Top Security Threats for Connected Embedded Devices. OpenIoT Summit, San Diego, 2016

Handling Top Security Threats for Connected Embedded Devices. OpenIoT Summit, San Diego, 2016 Handling Top Security Threats for Connected Embedded Devices OpenIoT Summit, San Diego, 2016 Jeep Cherokee hacked in July 2015 Presented at Black Hat USA 2015 Charlie Miller Chris Valasek Remote exploit

More information

The Integrated Smart & Security Platform Powered the Developing of IOT

The Integrated Smart & Security Platform Powered the Developing of IOT The Integrated Smart & Security Platform Powered the Developing of IOT We Are Entering A New Era- 50million connections Smart-Healthcare Smart-Wearable VR/AR Intelligent Transportation Eco-Agriculture

More information

The Medeco Solution for Controlled Access and Accountability

The Medeco Solution for Controlled Access and Accountability Medeco XT The Medeco Solution for Controlled Access and Accountability Medeco XT is a powerful Intelligent Key System that uses innovative technology to deliver a flexible, cost-effective solution for

More information

B U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved.

B U I L D I N G O N T H E G A T E W A Y. Copyright 2015, Oracle and/or its affiliates. All rights reserved. B U I L D I N G O N T H E G A T E W A Y Safe Harbor Statement The following is intended to outline our general product direction. It is intended for information purposes only, and may not be incorporated

More information

M2MD Communications Gateway: fast, secure and efficient

M2MD Communications Gateway: fast, secure and efficient Solution Brief M2MD Communications Gateway: fast, secure and efficient Key Benefits G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular

More information

How To Prevent Rolling Spam Factories. Ryan Ware Lead Security Architect

How To Prevent Rolling Spam Factories. Ryan Ware Lead Security Architect How To Prevent Rolling Spam Factories Ryan Ware Lead Security Architect The Onslaught Is Coming 2 SSG System Software Division Connectivity Evolution Threat Space No IP Connectivity A/V Input CD DVD Analog

More information

Teradata and Protegrity High-Value Protection for High-Value Data

Teradata and Protegrity High-Value Protection for High-Value Data Teradata and Protegrity High-Value Protection for High-Value Data 12.16 EB7178 DATA SECURITY Table of Contents 2 Data Centric Security: Providing High-Value Protection for High-Value Data 3 Visibility:

More information

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction

A Data-Centric Approach for Modular Assurance Abstract. Keywords: 1 Introduction A Data-Centric Approach for Modular Assurance Gabriela F. Ciocarlie, Heidi Schubert and Rose Wahlin Real-Time Innovations, Inc. {gabriela, heidi, rose}@rti.com Abstract. A mixed-criticality system is one

More information

Security model for embedded systems using Smack *

Security model for embedded systems using Smack * Security model for embedded systems using Smack * Simple but secure * Simplified Mandatory Access Control Kernel - José Bollo - Context José Bollo Eurogiciel Intel Tizen Smack Linux Smack for embeddeds

More information

Mesh Networking Principles

Mesh Networking Principles Technology, N. Jones Research Note 8 July 2003 Mesh Topologies Promise Resilient Wireless Networks Mesh architecture will become an essential element of wireless networking because it is easy to install,

More information

M2MD Communications Gateway: fast, secure, efficient

M2MD Communications Gateway: fast, secure, efficient Solution Brief M2MD Communications Gateway: fast, secure, efficient G+D Mobile Security and M2MD enable automakers to improve user experience through fast, secure and efficient cellular automotive connectivity.

More information

Virtual Open Systems (VOSyS)

Virtual Open Systems (VOSyS) Virtual Open Systems (VOSyS) 2018-06-14 Company Profile contact@virtualopensystems.com 2018-05-05www.virtualopensystems.com Virtual Open Systems: Profile Virtual Open Systems (VOSyS) is a French fully

More information

Internet of Things Toolkit for Small and Medium Businesses

Internet of Things Toolkit for Small and Medium Businesses Your Guide #IoTatWork to IoT Security #IoTatWork Internet of Things Toolkit for Small and Medium Businesses Table of Contents Introduction 1 The Internet of Things (IoT) 2 Presence of IoT in Business Sectors

More information

Multiplying disruption: Modular data centres at the edge

Multiplying disruption: Modular data centres at the edge Multiplying disruption: Modular data centres at the edge Andrew Donoghue Director analyst relations EMEA 12.03.2019 2 Simplifying the Edge Workforce Revolution Smarter, More Efficient UPS Systems Pursuing

More information

Managed Services Rely on us to manage your business services

Managed Services Rely on us to manage your business services Managed Services Rely on us to manage your business services Your business relies on a number of interconnected systems used by different departments from HR, Marketing, Sales and IT. Keeping all these

More information

Designing for the Industrial Internet Accelerating the Industrial Internet of Things

Designing for the Industrial Internet Accelerating the Industrial Internet of Things Accelerating the Industrial Internet of Things 338 West Nanjing Road, 2707-09 Shanghai 200041 China www.iotone.com IoT enables Industrie 4.0. 2 Why IoT? The Internet enabled people to share information

More information

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data

Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V3.0, MAY 2017 Multiple Layers of Protection Overview Password Salted-Hash Thank you

More information

Connect Vehicles: A Security Throwback

Connect Vehicles: A Security Throwback Connect Vehicles: A Security Throwback Chris Valasek (@nudehaberdasher) Director of Vehicle Security Research Introduction Hello Chris Valasek Director of Vehicle Security Research IPS Dev -> Windows RE

More information

Privilege Escalation

Privilege Escalation Privilege Coleman Kane Coleman.Kane@ge.com February 9, 2015 Security Vulnerability Assessment Privilege 1 / 14 root, or Privilege or Elevation is the act of gaining access to resources which were intended

More information

PRACTICING SAFE COMPUTING AT HOME

PRACTICING SAFE COMPUTING AT HOME PRACTICING SAFE COMPUTING AT HOME WILLIAM (THE GONZ) FLINN M.S. INFORMATION SYSTEMS SECURITY MANAGEMENT; COMPTIA SECURITY+, I-NET+, NETWORK+; CERTIFIED PATCHLINK ENGINEER ENTERPRISE INFORMATION SYSTEMS

More information

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE

DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE DATA SHEET RISK & CYBERSECURITY PRACTICE EMPOWERING CUSTOMERS TO TAKE COMMAND OF THEIR EVOLVING RISK & CYBERSECURITY POSTURE EXECUTIVE SUMMARY ALIGNING CYBERSECURITY WITH RISK The agility and cost efficiencies

More information

Authentication Technology for a Smart eid Infrastructure.

Authentication Technology for a Smart eid Infrastructure. Authentication Technology for a Smart eid Infrastructure. www.aducid.com One app to access all public and private sector online services. One registration allows users to access all their online accounts

More information

IGEEKS TECHNOLOGIES. Software Training Division. Academic Live Projects For BE,ME,MCA,BCA and PHD Students

IGEEKS TECHNOLOGIES. Software Training Division. Academic Live Projects For BE,ME,MCA,BCA and PHD Students Duration:40hours IGEEKS TECHNOLOGIES Software Training Division Academic Live Projects For BE,ME,MCA,BCA and PHD Students IGeekS Technologies (Make Final Year Project) No: 19, MN Complex, 2nd Cross, Sampige

More information

CAN Signaling Agent. A generic model to handle signals. AGL AMM Feb/2017 Fulup Ar Foll Lead Architect

CAN Signaling Agent. A generic model to handle signals. AGL AMM Feb/2017 Fulup Ar Foll Lead Architect CAN Signaling Agent A generic model to handle signals AGL AMM Feb/2017 Fulup Ar Foll Lead Architect fulup@iot.bzh st 1 technical Contributor Application Development Integration Yocto recipes Releases automation

More information

KuppingerCole Whitepaper. by Dave Kearns February 2013

KuppingerCole Whitepaper. by Dave Kearns February 2013 KuppingerCole Whitepaper by Dave Kearns February 2013 KuppingerCole Whitepaper Using Information Stewardship within by Dave Kearns dk@kuppingercole.com February 2013 Content 1. Summary... 3 2. Good information

More information

Improving Security in Embedded Systems Felix Baum, Product Line Manager

Improving Security in Embedded Systems Felix Baum, Product Line Manager Improving Security in Embedded Systems Felix Baum, Product Line Manager The Challenge with Embedded Security Business Imperatives Security Imperatives I need to keep my production expenses as low as possible.

More information

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS

NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS NEW LIFE FOR EMBEDDED SYSTEMS IN THE INTERNET OF THINGS INNOVATORS START HERE. EXECUTIVE SUMMARY The Internet of Things (IoT) is no longer a fanciful vision. It is very much with us, in everything from

More information

Welcome to IoTivity Developer Day. Introduction: Mark Skarpness, Intel VP & Director Embedded Operating Systems

Welcome to IoTivity Developer Day. Introduction: Mark Skarpness, Intel VP & Director Embedded Operating Systems Welcome to IoTivity Developer Day Introduction: Mark Skarpness, Intel VP & Director Embedded Operating Systems 1 IoT Challenges IoT APIs are rarely re-used They are brand-unique Communication methods are

More information

Vehicle To Android Communication Mode

Vehicle To Android Communication Mode Technical Disclosure Commons Defensive Publications Series May 12, 2017 Vehicle To Android Communication Mode Tanmay Wadhwa Neil Dhillon Follow this and additional works at: http://www.tdcommons.org/dpubs_series

More information

White Paper. Connected Car Brings Intelligence to Transportation

White Paper. Connected Car Brings Intelligence to Transportation White Paper Connected Car Brings Intelligence to Transportation 2 NEXCOM White Paper As urban population grows at an exponential rate, traffic jams are becoming more hideous and driving more and more tedious.

More information

In the Driver s Seat

In the Driver s Seat In the Driver s Seat Use Cases of Qt in Automotive Dr Tuukka Ahoniemi Product Manager tuukka.ahoniemi@theqtcompany.com Contents Requirements for Automotive Systems Transition of Automotive Software Power

More information

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin

Internet of Things. Internet of Everything. Presented By: Louis McNeil Tom Costin Internet of Things Internet of Everything Presented By: Louis McNeil Tom Costin Agenda Session Topics What is the IoT (Internet of Things) Key characteristics & components of the IoT Top 10 IoT Risks OWASP

More information

"Charting the Course to Your Success!" Securing.Net Web Applications Lifecycle Course Summary

Charting the Course to Your Success! Securing.Net Web Applications Lifecycle Course Summary Course Summary Description Securing.Net Web Applications - Lifecycle is a lab-intensive, hands-on.net security training course, essential for experienced enterprise developers who need to produce secure.net-based

More information

How Tizen Compliance Reduces Fragmentation

How Tizen Compliance Reduces Fragmentation How Tizen Compliance Reduces Fragmentation Mats Wichmann Samsung Open Source Group mats@osg.samsung.com Topics The Problem Compliance Goals State of the program Compliance Profiles Feature comparison:

More information

Angela McKay Director, Government Security Policy and Strategy Microsoft

Angela McKay Director, Government Security Policy and Strategy Microsoft Angela McKay Director, Government Security Policy and Strategy Microsoft Demographic Trends: Internet Users in 2005.ru.ca.is.uk.nl.be.no.de.pl.ua.us.fr.es.ch.it.eg.il.sa.jo.tr.qa.ae.kz.cn.tw.kr.jp.mx.co.br.pk.th.ph.ng.in.sg.my.ar.id.au

More information

Linux Community Project Leaders Unite. Peter Vescuso EVP Marketing, Bus Dev Black Duck Software

Linux Community Project Leaders Unite. Peter Vescuso EVP Marketing, Bus Dev Black Duck Software Linux Community Project Leaders Unite Peter Vescuso EVP Marketing, Bus Dev Black Duck Software Agenda Trends Communities of communities Linux Community Projects 2 Innovation and FOSS - A Virtuous Circle

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

INDUSTRY-LED COLLABORATION

INDUSTRY-LED COLLABORATION INDUSTRY-LED COLLABORATION EUREKA Instruments EUREKA Innovation Days 24 May 2018 Zeynep Sarılar InterCluster spokesperson & ITEA Chairwoman Full members 41 full members (40 countries + European Commission)

More information

Offense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent

Offense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent Offense & Defense in IoT World Samuel Lv Keen Security Lab, Tencent Keen Security Lab of Tencent Wide coverage of software and hardware security research Mainstream PC & Mobile Operating Systems Mainstream

More information

INSTRUMENT CLUSTER 2.0

INSTRUMENT CLUSTER 2.0 INSTRUMENT CLUSTER 2.0 Summary THE CONTEXT Electronic Content Timeline The Challenge MAGNETI MARELLI TARGET Digital Cluster Advantages The Requirements THE SOLUTION Project Definition System PROJECT DEVELOPEMENT

More information

The Internet of Things and Security

The Internet of Things and Security INTERNAL USE ONLY The Internet of Things and Security Chuck DePalma CISSP CISM Network and Cloud Security Architect The Internet of Things 1998 Adoption of Mosaic Browsers 0ver 250 Millions of Internet

More information

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region

Securing IoT devices with STM32 & STSAFE Products family. Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region Securing IoT devices with STM32 & STSAFE Products family Fabrice Gendreau Secure MCUs Marketing & Application Managers EMEA Region 2 The leading provider of products and solutions for Smart Driving and

More information

Cloud Security Standards Supplier Survey. Version 1

Cloud Security Standards Supplier Survey. Version 1 Cloud Security Standards Supplier Survey Version 1 Document History and Reviews Version Date Revision Author Summary of Changes 0.1 May 2018 Ali Mitchell New document 1 May 2018 Ali Mitchell Approved Version

More information

Connecting with Tizen : An Overview & Roadmap. Mohan Rao

Connecting with Tizen : An Overview & Roadmap. Mohan Rao Connecting with Tizen : An Overview & Roadmap Mohan Rao Contents What is Tizen? Why Tizen? Device profile Tizen 2.4 Tizen 3.0 What s next? Conclusion 2 What is Tizen? (1/2) Designed for various category

More information

ASIC Design Starts for by Key End Market Applications

ASIC Design Starts for by Key End Market Applications ASIC Design Starts for 2014 by Key End Market Applications February 2014 Study No. SC101-14 Copyright Semico Research, 2014. All rights reserved. Reproduction in whole or part is prohibited without the

More information