Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI

Size: px
Start display at page:

Download "Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI"

Transcription

1 Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI Bob Gruszczynski VWoA OBD Communication Expert

2

3 Current Cybersecurity Status Challenges to OEMs regarding data access Vehicle data access vs. vehicle security Many entities requesting both legitimate and nonlegitimate access Inspection and Maintenance Workshop/Service Engineering and Environmental Office (EEO) 3

4 Current Cybersecurity Status Vehicle data access vs. vehicle security Insurance telematics Other telematics Prognostics Modification of powertrain components ( tuning ) Malicious attacks ( hacking ) Digital Millennium Copyright Act (DMCA) Engineering and Environmental Office (EEO) 4

5 Initially, due to research activity into vehicle hacking, efforts began to describe/define issues SAE- Electrical and Electronics Diagnostic Committee (J3005), Cybersecurity Systems Engineering Committee (J3061) NHTSA - Request for Comment on Automotive Electronic Control Systems Safety and Security US Government- GAO, US DOT, DHS S&T, NIST ISO TC204, TC32 Engineering and Environmental Office (EEO) 5

6 Current Cybersecurity Status OBD Devices Wirelessly enabled Wireless network can be spoofed Bluetooth enabled Malware installed in phone app Carnegie Mellon University study with NIST Volpe Research Center results at: pdf Preliminary results show poor software design and cybersecurity practices across a high percentage of currently deployed devices. Engineering and Environmental Office (EEO) 6

7 Current situation: scenario hacker attack over the mobile communication to the customer OBD dongle hacker attack hacker starts critical functions over the UDS protocol Engineering and Environmental Office (EEO) 7

8 There are many discussions about further concepts to solve the security problem with e.g. 3 rd -party dongles: 1. concept for a short-term solution Gateway equipped Non-Gateway equipped Hybrid 2. concept for a long-term solution Planned in future as a two step solution first step: protection of diagnostic access second step: protection of diagnostic data Engineering and Environmental Office (EEO) 8

9 Concept for a long-term solution first step: protection of diagnostics access secure channel Electronic Control Unit (ECU) signature verification and public key Diagnostic system private key and certificate signing request routing of security token Individual-ID: (VIN, ECU-ID, Project-ID) IT-Backend creation of security token identity and access management Log saves all events, accesses, and errors Engineering and Environmental Office (EEO) 9

10 Concept for a long-term solution second step: protection of diagnostic data secure channel Electronic Control Unit (ECU) signature verification and public key for every request which change data or start secured functions Engineering and Environmental Office (EEO) Diagnostic system Individual-ID: (VIN, ECU-ID, Project-ID) IT-Backend private key and certificate signing request & data For the second step there are a lot of open questions regarding process and possible advantages/ disadvantages, potential risks and problems (e.g. total dependence on Backend-System) 10

11 Why the Renewed Focus on OBDII Security? September 12: Letter from House Committee on Energy and Commerce to NHTSA RE: OBD-II Security request that NHTSA convene an industry-wide effort to develop a plan of action for addressing the risk posed by the existence of the OBD-II port in the modern vehicle ecosystem. September 28: NHTSA requests SAE to take the lead and convene industry group to examine issue October 14: NHTSA response to House Committee highlights SAE role: At NHTSA s urging, SAE International has started a working group that is looking to explore ways to harden the OBD-II port. This group is making good progress and the Agency remains hopeful that the group will move expeditiously to develop a set of recommendations. Engineering and Environmental Office (EEO) 11

12 SAE Committees/Task Forces J3061 Cybersecurity Guidebook for Cyber-Physical Vehicle Systems J3016 Guidebook Helping to Frame Cybersecurity Policy J3005-1, -2 Guidelines for Operation and Security of Devices Connected to the Data Link Connector (DLC) J3138 Next slides Engineering and Environmental Office (EEO) 12

13 SAE hosted invitation-only industry workshop December 1. Goals: 1. Identify common issues, needs, and approach to secure the OBD 2. Gain buy-in to development of an accelerated standards approach Very well-attended by industry Leads: Mark Zachos, DGTech and Bob Gruszczynski, VW OEMS: BMW, Ford, GM, Honda, Hyundai, Isuzu, Toyota, VW Heavy Truck: Volvo, Cummins Associations: MEMA, ETI, Booz-Allen (Auto ISAC) Government/Regulators: ARB, NHTSA, NIST Engineering and Environmental Office (EEO) 13

14 Discussion yielded the following high-level scope items: What are we worried about? DLC access Point (J1939/J1962 connector) Re-programming modules; only concerned about unlocking Someone spoofing normal message content (writing non-diagnostic messages) Overloading the CAN Bus Overloading the gateway Ensuring solution complies with existing regulations and MOUs New on-road vehicles (less than 14K pound GVW) What are we not worried about? Other access points (infotainment, etc.) J1979 functionality Emission-related diagnostics; J1939 equivalent diagnostic functionality Physical attacks to the in-vehicle network Privacy Tool/dongle security Engineering and Environmental Office (EEO) 14

15 Next Steps 1. SAE staff work with volunteer leaders to further define rationale, scope, and process 2. Created new SAE Committee Data Link Connector Vehicle Security Committee 3. Created new Task Force to house New Work Item J3138 (Task Force Name TBD) 4. Committee meets monthly 5. J3138 in ballot 6. New Work Item Proposals started to address long-term items above Engineering and Environmental Office (EEO) 15

16 Thanks for your attention!!! Bob Gruszczynski OBD Communication Expert Volkswagen Group Engineering and Environmental Office (EEO) 16

Cyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies

Cyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies Cyber Security and Vehicle Diagnostics Mark Zachos DG Technologies SAE INTERNATIONAL SAE J3061 Cybersecurity Guidebook for Cyber-Physical Automotive Systems Published January 2016; drive to a risk-based,

More information

The case for a Vehicle Gateway.

The case for a Vehicle Gateway. The case for a Vehicle Gateway. Equipment and Tool Institute ETI-ToolTech_2015_Gateway.pptx 1 Vehicle Data Access Last year we proposed a Vehicle Station Gateway and its associated Unified Gateway Protocol

More information

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security In less than a year, 100s of millions connected cars Aftermarket connectivity most prevalent

More information

13W-AutoSPIN Automotive Cybersecurity

13W-AutoSPIN Automotive Cybersecurity 13W-AutoSPIN Automotive Cybersecurity Challenges and opportunities Alessandro Farsaci (CNH industrial) Cosimo Senni (Magneti Marelli) Milan, Italy November 12th, 2015 Agenda Automotive Cybersecurity Overview

More information

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018 Securely Connecting People, Applications, and Devices Ted Shorter Chief Technology Officer CSS Ted.Shorter@css-security.com

More information

Heavy Vehicle Cybersecurity Update. National Motor Freight Traffic Association, Inc.

Heavy Vehicle Cybersecurity Update. National Motor Freight Traffic Association, Inc. Heavy Vehicle Cybersecurity Update National Motor Freight Traffic Association, Inc. National Motor Freight Traffic Association, Inc. (NMFTA) Industry non-profit representing more than 600 companies operating

More information

Security Challenges with ITS : A law enforcement view

Security Challenges with ITS : A law enforcement view Security Challenges with ITS : A law enforcement view Central Observatory for Intelligent Transportation Systems FRENCH MINISTRY OF INTERIOR GENDARMERIE NATIONALE Colonel Franck MARESCAL franck.marescal@gendarmerie.interieur.gouv.fr

More information

Securing the future of mobility

Securing the future of mobility Kaspersky Transportation System Security AVL Software and Functions Securing the future of mobility www.kaspersky.com #truecybersecurity Securing the future of mobility Connected car benefits The need

More information

Automotive Anomaly Monitors and Threat Analysis in the Cloud

Automotive Anomaly Monitors and Threat Analysis in the Cloud Automotive Anomaly Monitors and Threat Analysis in the Cloud Dr. André Weimerskirch Vector Automotive Cyber Security Symposium October 12, 2017 Cybersecurity Components Secure Internal & External Communications

More information

Secure Product Design Lifecycle for Connected Vehicles

Secure Product Design Lifecycle for Connected Vehicles Secure Product Design Lifecycle for Connected Vehicles Lisa Boran Vehicle Cybersecurity Manager, Ford Motor Company SAE J3061 Chair SAE/ISO Cybersecurity Engineering Chair AGENDA Cybersecurity Standards

More information

Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego

Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Modern Automotive Vulnerabilities: Causes, Disclosure & Outcomes Stefan Savage UC San Diego Steve Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage (UCSD) Karl Koscher,

More information

Vehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI

Vehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI Vehicle & Transportation Infrastructure Cyber Security Discussions IQMRI Guy.Rini@iqmri.org Michael.Dudzik@iqmri.org IQM Research Institute IQMRI created in response to the structural changes in delivery

More information

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cybersecurity Challenges for Connected and Automated Vehicles Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute Cars are becoming complex (and CAV is only part of it) 1965: No

More information

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update) Koji NAKAO, NICT, Japan (Expert of UNECE WP29/TFCS) General Flow of works in WP29/TFCS and OTA Data protection

More information

Governmental Committee

Governmental Committee Governmental Committee November 1, 2016 Las Vegas COMMITTEE MEMBERS STEPHEN REGAN, CHAIR JANET CHANEY, VICE- CHAIR DAVE McCLUNE HERB LIEBERMANN RANDY HANSON HOWARD BATCHELOR JEANNIE SILVER RICK TUURI RON

More information

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division

Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Automotive Cybersecurity: Why is it so Difficult? Steven W. Dellenback, Ph.D. Vice President R&D Intelligent Systems Division Cybersecurity is not one Entry Point Four Major Aspects of Cybersecurity How

More information

Development of Intrusion Detection System for vehicle CAN bus cyber security

Development of Intrusion Detection System for vehicle CAN bus cyber security Development of Intrusion Detection System for vehicle CAN bus cyber security Anastasia Cornelio, Elisa Bragaglia, Cosimo Senni, Walter Nesci Technology Innovation - SSEC 14 Workshop Automotive SPIN Italia

More information

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017 Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen Axel Freiwald 1/2017 All OEMs Will Implement Software OTA As Soon As Possible IHS Study Motivation: Save on recalls caused by software bugs Evolution

More information

NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER

NC1701  ENHANCED VEHICLE COMMUNICATIONS CONTROLLER NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER Nebula Systems has created the first dedicated controller for use in Telematics embedded systems, enabling companies in the Connected Car space to access

More information

Technology Solutions Toward Improved Driver Focus

Technology Solutions Toward Improved Driver Focus International Conference on Distracted Driving: Panel on Technology and Distracted Driving Technology Solutions Toward Improved Driver Focus Robert Mike Gardner Director Intelligent Systems Research Laboratory

More information

MEMA Perspectives on Connected Vehicles Policy. Leigh Merino Senior Director, Regulatory Affairs Northern Virginia Technology Council April 27, 2017

MEMA Perspectives on Connected Vehicles Policy. Leigh Merino Senior Director, Regulatory Affairs Northern Virginia Technology Council April 27, 2017 MEMA Perspectives on Connected Vehicles Policy Leigh Merino Senior Director, Regulatory Affairs Northern Virginia Technology Council April 27, 2017 Presentation Overview About MEMA Building Block Technologies

More information

Automotive Security Standardization activities and attacking trend

Automotive Security Standardization activities and attacking trend Automotive Standardization activities and attacking trend Ingo Dassow, Deloitte November 2017 Automotive Risk Overview Trends and risks for connected vehicles 2 Value and Components of a Car Autonomous

More information

Cyber Security Measures in Automated Driving Systems. March 30, 2018 Panel on Business Strategies for Automated Driving

Cyber Security Measures in Automated Driving Systems. March 30, 2018 Panel on Business Strategies for Automated Driving Cyber Security Measures in Automated Driving Systems March 30, 2018 Panel on Business Strategies for Automated Driving 0. Introduction (1/2) External Communication Risks of Automated Driving Systems For

More information

Future Implications for the Vehicle When Considering the Internet of Things (IoT)

Future Implications for the Vehicle When Considering the Internet of Things (IoT) Future Implications for the Vehicle When Considering the Internet of Things (IoT) FTF-AUT-F0082 Richard Soja Automotive MCU Systems Engineer A P R. 2 0 1 4 TM External Use Agenda Overview of Existing Automotive

More information

Measurement Challenges and Opportunities for Developing Smart Grid Testbeds

Measurement Challenges and Opportunities for Developing Smart Grid Testbeds Measurement Challenges and Opportunities for Developing Smart Grid Testbeds 10th Carnegie Mellon Conference on the Electricity Industry April 1, 2015 Paul Boynton boynton@nist.gov Testbed Manager Smart

More information

Reprogram Vehicles Using The EASE Universal Reprogrammer II+ & Your PC

Reprogram Vehicles Using The EASE Universal Reprogrammer II+ & Your PC Reprogram Vehicles Using The EASE Universal Reprogrammer II+ & Your PC Do you know that many times reprogramming is the only way to repair a vehicle and eliminate false DTCs? Have you ever stopped working

More information

Cyber Attacks & Breaches It s not if, it s When

Cyber Attacks & Breaches It s not if, it s When ` Cyber Attacks & Breaches It s not if, it s When IMRI Team Aliso Viejo, CA Trusted Leader with Solution Oriented Results Since 1992 Data Center/Cloud Computing/Consolidation/Operations 15 facilities,

More information

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Automotive The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020. Cars are becoming increasingly connected through a range of wireless networks The increased

More information

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données

ISO INTERNATIONAL STANDARD. Road vehicles Extended data link security. Véhicules routiers Sécurité étendue de liaison de données INTERNATIONAL STANDARD ISO 15764 First edition 2004-08-15 Road vehicles Extended data link security Véhicules routiers Sécurité étendue de liaison de données Reference number ISO 15764:2004(E) ISO 2004

More information

Examining future priorities for cyber security management

Examining future priorities for cyber security management Examining future priorities for cyber security management Cybersecurity Focus Day Insurance Telematics 16 Andrew Miller Chief Technical Officer Thatcham Research Owned by the major UK Motor Insurers with

More information

Voertuigconstructeurs en data economie

Voertuigconstructeurs en data economie Voertuigconstructeurs en data economie STUDIEDAG VERKEERSVEILIGHEID VLAAMS HUIS VOOR DE VERKEERSVEILIGHEID DEPT MOW VLAAMS PARLEMENT, BRUSSEL 11 DECEMBER 2017 Saturday, 30 December 2017 AGENDA 1. Context

More information

Mongoose Pro Quick Start Guide

Mongoose Pro Quick Start Guide Mongoose Pro Quick Start Guide PLEASE NOTE Mongoose Pro interfaces have been carefully designed and tested to comply with OBDII protocols. However, some vehicle models are not in full compliance with these

More information

Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations

Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations Convergence of Safety, Systems & Cybersecurity Bill StClair, Director, LDRA, US Operations Agenda Nexus of Safety and Cybersecurity Separation and Connectivity Trends in Aerospace Cybersecurity Isn t Security

More information

SECURITY OF VEHICLE TELEMATICS SYSTEMS. Daniel Xiapu Luo Department of Computing The Hong Kong Polytechnic University

SECURITY OF VEHICLE TELEMATICS SYSTEMS. Daniel Xiapu Luo Department of Computing The Hong Kong Polytechnic University SECURITY OF VEHICLE TELEMATICS SYSTEMS Daniel Xiapu Luo Department of Computing The Hong Kong Polytechnic University 1 2 3 TELEMATICS 4 TELEMATICS 5 OBD-II On-Board Diagnostic Perform emissions related

More information

Car hacks 2018 (BMW, Audi) for the "not so hands-on"

Car hacks 2018 (BMW, Audi) for the not so hands-on Car hacks 2018 (BMW, Audi) for the "not so hands-on" Computest (VW/Audi) published their research on the VW/Audi vulnerabilities and Keen Security Lab (BMW) published theirs on BMW. Even though the OEMs

More information

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development

December 10, Statement of the Securities Industry and Financial Markets Association. Senate Committee on Banking, Housing, and Urban Development December 10, 2014 Statement of the Securities Industry and Financial Markets Association Senate Committee on Banking, Housing, and Urban Development Hearing Entitled Cybersecurity: Enhancing Coordination

More information

Automotive Cyber Security

Automotive Cyber Security Automotive Cyber Security Rajeev Shorey (Ph.D.) Principal Scientist TCS Innovation Labs Cincinnati, USA & Bangalore, India Copyright 2013 Tata Consultancy Services Limited Connected Vehicles Chennai, 18

More information

DOT/DHS: Joint Agency Work on Vehicle Cyber Security

DOT/DHS: Joint Agency Work on Vehicle Cyber Security DOT/DHS: Joint Agency Work on Vehicle Cyber Security Principal Investigator (PI): Kevin Harnett DOT-Volpe Center s Advanced Vehicle Technology Division August 16, 2017 The National Transportation Systems

More information

SGS CYBER SECURITY GROWTH OPPORTUNITIES

SGS CYBER SECURITY GROWTH OPPORTUNITIES SGS CYBER SECURITY GROWTH OPPORTUNITIES Eric Krzyzosiak GENERAL MANAGER DIGITAL Jeffrey Mc Donald Executive Vice President CERTIFICATION & BUSINESS ENHANCEMENT Eric Lee WIRELESS & CONSUMER RETAIL CYBER

More information

IEEE 802 CALM Tutorial 14 November 2006 R. Roy VII/VIIC Program Overview

IEEE 802 CALM Tutorial 14 November 2006 R. Roy VII/VIIC Program Overview IEEE 802 CALM Tutorial 14 November 2006 R. Roy (dickroy@alum.mit.edu) VII/VIIC Program Overview VII/VIIC Program Overview VII Program is an ITS Tier-1 Initiative for electronically connecting vehicles

More information

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 PENETRATION TESTING OF AUTOMOTIVE DEVICES Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017 Imagine your dream car 2 Image: 2017 ESCRYPT. Exemplary attack demonstration only. This is NOT

More information

정형기법을활용한 AUTOSAR SWC 의구현확인및정적분석

정형기법을활용한 AUTOSAR SWC 의구현확인및정적분석 정형기법을활용한 AUTOSAR SWC 의구현확인및정적분석 Develop high quality embedded software 이영준 Principal Application Engineer 2015 The MathWorks, Inc. 1 Agendas Unit-proving of AUTOSAR Component and Runtime error Secure Coding

More information

Abrites J2534 passthru driver user manual

Abrites J2534 passthru driver user manual 1 Document version Version date Version details 22.12. Document created Table of content: 1. Introduction. 1.1 Installation. 2. Supported third party applications. 3. Using the Abrites J2534 passthru driver

More information

Introduction to Cyber Security Issues for Transportation

Introduction to Cyber Security Issues for Transportation Introduction to Cyber Security Issues for Transportation T3 Webinar December 7, 2011 Michael G. Dinning Cyber Security is One of the Most Serious Potential Risks in Transportation Increasing dependence

More information

Security Concerns in Automotive Systems. James Martin

Security Concerns in Automotive Systems. James Martin Security Concerns in Automotive Systems James Martin Main Questions 1. What sort of security vulnerabilities do modern cars face today? 2. To what extent are external attacks possible and practical? Background

More information

OASIS TECHNICAL COMMITTEE FORMAT OF AUTOMOTIVE REPAIR INFORMATION

OASIS TECHNICAL COMMITTEE FORMAT OF AUTOMOTIVE REPAIR INFORMATION OASIS TECHNICAL COMMITTEE FORMAT OF AUTOMOTIVE REPAIR INFORMATION Document Control Document Code SC1-014 Author(s) John Chelsom Date 08-01-2003 Version Version 1.0 Notes: This document uses a standard

More information

Network, Policy & Privacy Considerations for Connected Autonomous Vehicle Initiatives

Network, Policy & Privacy Considerations for Connected Autonomous Vehicle Initiatives Network, Policy & Privacy Considerations for Connected Autonomous Vehicle Initiatives Wednesday, April 25, 2018 11:30 am - 12:00 pm (EDT) Presented by Lindsay Miller & Matthew Diaz Ice Miller LLP 250 West

More information

Water Information Sharing and Analysis Center

Water Information Sharing and Analysis Center SUPERCHARGE YOUR SECURITY Water Information Sharing and Analysis Center DHS Hunt and Incident Response Team September 12, 2018 SUPERCHARGE YOUR SECURITY Presenter Brian Draper, DHS NCCIC HIRT Slides and

More information

CDR Inventory Checklist & Quotation Request

CDR Inventory Checklist & Quotation Request CDR Inventory Checklist & Quotation Request Updated January 01, 2018 The tables below list all the current CDR hardware in production and available to purchase by release version. When you have completed

More information

Risk-based design for automotive networks. Eric Evenchik, Linklayer labs & Motivum.io Stefano Zanero, Politecnico di Milano & Motivum.

Risk-based design for automotive networks. Eric Evenchik, Linklayer labs & Motivum.io Stefano Zanero, Politecnico di Milano & Motivum. Risk-based design for automotive networks Eric Evenchik, Linklayer labs & Motivum.io Stefano Zanero, Politecnico di Milano & Motivum.io Who are we Eric Evenchick Stefano Zanero Linklayer Labs (Toronto,

More information

Managing Supply Chain Risks for SCADA Systems

Managing Supply Chain Risks for SCADA Systems Managing Supply Chain Risks for SCADA Systems Nadya Bartol, Vice President of Industry Affairs and Cybersecurity Strategist, UTC Nadya.bartol@utc.org 2014 Utilities Telecom Council Agenda Problem Definition

More information

Securing the Autonomous Automobile

Securing the Autonomous Automobile Securing the Autonomous Automobile Sridhar Iyengar Vice President, Intel Labs Intel Corporation CROSSING Conference May 15-17 2017 Legal Notices and disclaimers This presentation contains the general insights

More information

Frequently Asked Questions. AUTOSAR C++14 Coding Guidelines

Frequently Asked Questions. AUTOSAR C++14 Coding Guidelines Frequently Asked Questions AUTOSAR C++14 Coding Guidelines General Q: What is AUTOSAR? A: AUTOSAR (AUTomotive Open System ARchitecture) is a partnership of over 180 automotive manufacturers, automotive

More information

Click ISO to edit Master title style Update on development of the standard

Click ISO to edit Master title style Update on development of the standard Click ISO 26262 to edit Master title style Update on development of the standard Dr David Ward Head of Functional Safety January 2016 Agenda Why update ISO 26262? What is the process for updating the standard?

More information

OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS

OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE. Dr. Angelos Amditis Research Director, ICCS OVERVIEW OF AUTOMATED DRIVING RESEARCH IN EUROPE Dr. Angelos Amditis Research Director, ICCS OUTLINE Introduction L3Pilot: Pilot Testing INFRAMIX: Hybrid Infrastructure SAFERtec:Cyber-security / Security

More information

MASP Chapter on Safety and Security

MASP Chapter on Safety and Security MASP Chapter on Safety and Security Daniel Watzenig Graz, Austria https://artemis.eu MASP Chapter on Safety & Security Daniel Watzenig daniel.watzenig@v2c2.at Francois Tuot francois.tuot@gemalto.com Antonio

More information

PREEvision Technical Article

PREEvision Technical Article PREEvision Technical Article AUTOSAR-Conformant Vehicle Diagnostics over : Developing Diagnostic Communications for E/E Systems The electronically controlled systems of modern vehicles are networked with

More information

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation Accelerating solutions for highway safety, renewal, reliability, and capacity Regional Operations Forums Connected Vehicles and the Future of Transportation ti Session Overview What are connected and automated

More information

Cyber Security of Industrial Control Systems (ICSs)

Cyber Security of Industrial Control Systems (ICSs) Cyber Security of Industrial Control Systems (ICSs) February 23, 2016 Joe Weiss PE, CISM, CRISC, ISA Fellow Managing Partner Applied Control Solutions, LLC (408) 253-7934 joe.weiss@realtimeacs.com Applied

More information

AUTOMOTIVE FOUNDATIONAL SOFTWARE SOLUTIONS FOR THE MODERN VEHICLE

AUTOMOTIVE FOUNDATIONAL SOFTWARE SOLUTIONS FOR THE MODERN VEHICLE www.qnx.com AUTOMOTIVE FOUNDATIONAL SOFTWARE SOLUTIONS FOR THE MODERN VEHICLE OVERVIEW Dear colleagues in the automotive industry, We are in the midst of a pivotal moment in the evolution of the car. Connected

More information

SURFACE VEHICLE RECOMMENDED PRACTICE

SURFACE VEHICLE RECOMMENDED PRACTICE 400 Commonwealth Drive, Warrendale, PA 15096-0001 SURFACE VEHICLE RECOMMENDED PRACTICE An American National Standard J1979 Issued 1991-12 Revised 1997-09 Superseding J1979 JUL96 REV. SEP97 E/E DIAGNOSTIC

More information

Vehicle Network Seminar Series

Vehicle Network Seminar Series CAN and Higher Layer Protocols One of our most popular seminars, this course is relevant for passenger cars and light duty trucks. CAN (Controller Area Network) is the worldwide standard for automotive

More information

User Manual. 1. Introduction MtrackScout OBD-II Compliant... 2

User Manual. 1. Introduction MtrackScout OBD-II Compliant... 2 User Manual Contents 1. Introduction... 2 1.1. MtrackScout OBD-II Compliant... 2 2. Hardware Features... 2 2.1. OBD-II Protocol... 2 2.2. Micro USB Connection... 2 2.3. Buzzer... 2 2.4. Power Supply...

More information

Vehicle List: 1 - Europe: This section includes diagnostic programs for European vehicles. ALFA ROMEO, AUDI, BMW, CITROEN, DACIA, FIAT, FORD, LANDROVE

Vehicle List: 1 - Europe: This section includes diagnostic programs for European vehicles. ALFA ROMEO, AUDI, BMW, CITROEN, DACIA, FIAT, FORD, LANDROVE HxH SCAN HxH Scan is a professional compact car diagnostic tool,it is the automotive fault diagnostic scanner. we provide near dealer level(o.e.) operations such as ECU reprogramming,key coding,airbag

More information

Cybersecurity- A Regulatory Perspective. Robert J. Lipot, CRISC Senior Financial Institutions Examiner Department of Business Oversight

Cybersecurity- A Regulatory Perspective. Robert J. Lipot, CRISC Senior Financial Institutions Examiner Department of Business Oversight Cybersecurity- A Regulatory Perspective Robert J. Lipot, CRISC Senior Financial Institutions Examiner Department of Business Oversight 1 Cybersecurity Issues Executive Order 13636 Key Areas of Focus Cyber

More information

VEHICLE FORENSICS. Infotainment & Telematics Systems. Berla Corporation Copyright 2015 by Berla. All Rights Reserved.

VEHICLE FORENSICS. Infotainment & Telematics Systems. Berla Corporation Copyright 2015 by Berla. All Rights Reserved. VEHICLE FORENSICS Infotainment & Telematics Systems Berla Corporation 2015 WELCOME Company Overview Infotainment & Telematics Systems Overview of Potentially Acquirable Data ive Software/Hardware ABOUT

More information

Offense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent

Offense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent Offense & Defense in IoT World Samuel Lv Keen Security Lab, Tencent Keen Security Lab of Tencent Wide coverage of software and hardware security research Mainstream PC & Mobile Operating Systems Mainstream

More information

Standardized Tool Components for NRMM-Diagnostics

Standardized Tool Components for NRMM-Diagnostics Standardized Tool Components for NRMM-Diagnostics Peter Subke (Softing Automotive Electronics) In the past, passenger car manufacturers have learned the lesson that competition on the level of bits and

More information

Compliance Verification Process for Ethernet ECUs

Compliance Verification Process for Ethernet ECUs Compliance Verification Process for Ethernet ECUs Automotive Ethernet Congress 2015 Munich, February 4, 2015 Dr.-Ing. Terezia Toth Head of Compliance Laboratory / Senior Consultant Engineer Agenda 1. Motivation

More information

USB-Link 2 Vehicle Interface Installation and Setup Manual

USB-Link 2 Vehicle Interface Installation and Setup Manual USB-Link 2 Vehicle Interface Installation and Setup Manual Chapter 1: Introducing the USB-Link 2...1 Component Checklist...2 Product Specifications...3 System Requirements...4 Communication Options: Wired

More information

INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061

INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061 INTEGRATING AUTOMOTIVE HAZARD AND THREAT ANALYSIS METHODS: HOW DOES THIS FIT WITH ASSUMPTIONS OF THE SAE J3061 23rd EuroAsiaSPI Conference, Graz, Austria Georg Macher AVL List GmbH (Headquarters) INTEGRATING

More information

ICT Supply Chain Risk Management Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist

ICT Supply Chain Risk Management Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist ICT Supply Chain Risk Management Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist What is ICT Supply Chain Risk Management? Information and Communication Technology (ICT) products are assembled,

More information

OPUC Workshop March 13, 2015 Cyber Security Electric Utilities. Portland General Electric Co. Travis Anderson Scott Smith

OPUC Workshop March 13, 2015 Cyber Security Electric Utilities. Portland General Electric Co. Travis Anderson Scott Smith OPUC Workshop March 13, 2015 Cyber Security Electric Utilities Portland General Electric Co. Travis Anderson Scott Smith 1 CIP Version 5 PGE Implementation Understanding the Regulations PGE Attended WECC

More information

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017 Automotive Security: Challenges, Standards and Solutions Alexander Much 12 October 2017 Driver s fears are being fueled by recent news Connected Cars, new opportunities for hackers Autonomous Driving Concepts

More information

Network analysis and automotive diagnostics

Network analysis and automotive diagnostics Network analysis and automotive diagnostics Designed for the automotive industry Offers is a 5 in 1 CAN/LIN bus monitoring tool with integrated automotive diagnostic functions. Ÿ Automotive OBD Scan tool

More information

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io Securing the Connected Car Eystein Stenberg Product Manager Mender.io The software defined car Electronics Telematics Infotainment Connected Assisted driving Autonomous Hardware enabled Software enabled

More information

Fending Off Cyber Attacks Hardening ECUs by Fuzz Testing

Fending Off Cyber Attacks Hardening ECUs by Fuzz Testing Fending Off Cyber Attacks Hardening ECUs by Fuzz Testing In designing vehicle communication networks, security test procedures play an important role in the development process. Fuzz testing, which originated

More information

An Experimental Analysis of the SAE J1939 Standard

An Experimental Analysis of the SAE J1939 Standard Truck Hacking: An Experimental Analysis of the SAE J1939 Standard 10th USENIX Workshop On Offensive Technologies (WOOT 16) Liza Burakova, Bill Hass, Leif Millar & Andre Weimerskirch Are trucks more secure

More information

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT?

NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? NEW DATA REGULATIONS: IS YOUR BUSINESS COMPLIANT? What the new data regulations mean for your business, and how Brennan IT and Microsoft 365 can help. THE REGULATIONS: WHAT YOU NEED TO KNOW Australia:

More information

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government The Key Principles of Cyber Security for Connected and Automated Vehicles Government Contents Intelligent Transport System (ITS) & Connected and Automated Vehicle (CAV) System Security Principles: 1. Organisational

More information

Mongoose Pro GMII Quick Start Guide

Mongoose Pro GMII Quick Start Guide Mongoose Pro GMII Quick Start Guide PLEASE NOTE Mongoose Pro interfaces have been carefully designed and tested to comply with OBDII protocols. However, some vehicle models are not in full compliance with

More information

Quo Vadis SAE J1939 Standardization

Quo Vadis SAE J1939 Standardization Quo Vadis SAE J1939 Standardization Due to new application layer requirements, SAE is continuing to develop the J1939 standard, which is primarily used to network powertrains in commercial vehicles. However,

More information

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC W I N D R I V E R H E L I X C H A S S I S SIMPLIFYING THE WIND RIVER HELIX CHASSIS Helix Chassis brings together software, technologies, tools, and services to help automotive manufacturers unify, simplify,

More information

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Cybersecurity Engineering and Assurance for Connected and Automated Vehicles Paul Wooderson Vehicle cybersecurity concerns Privacy vehicle as a data hub Theft physical cybersecurity Safety - impacts of

More information

13-Oct-2012 Security related parts and Vehicle Interfaces

13-Oct-2012 Security related parts and Vehicle Interfaces 13-Oct-2012 Security related parts and Vehicle Interfaces Robert Beckmann President Beckmann Technologies & BlueLink Diagnostic Solutions Member NASTF VSC First generation security systems Simple signal

More information

EURO5 PASSTHRU REPROGRAMMING OF ECU S INFORMATION ON THE REPROGRAMMING OF ECU S WITH OTC D650 (INSTALLATION OF OTC PASSTHRU SOFTWARE ON PC/LAPTOP AND

EURO5 PASSTHRU REPROGRAMMING OF ECU S INFORMATION ON THE REPROGRAMMING OF ECU S WITH OTC D650 (INSTALLATION OF OTC PASSTHRU SOFTWARE ON PC/LAPTOP AND EURO5 PASSTHRU REPROGRAMMING OF ECU S INFORMATION ON THE REPROGRAMMING OF ECU S WITH OTC D650 (INSTALLATION OF OTC PASSTHRU SOFTWARE ON PC/LAPTOP AND PROGRAMMING SEQUENCE) D650 Info & Downloads Introduction

More information

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services

Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services Enhancing infrastructure cybersecurity in Europe Rossella Mattioli Secure Infrastructures and Services European Union Agency for Network and Information Security Securing Europe s Information society 2

More information

Information and Communication Technology (ICT) Supply Chain Security Emerging Solutions

Information and Communication Technology (ICT) Supply Chain Security Emerging Solutions Information and Communication Technology (ICT) Supply Chain Security Emerging Solutions Nadya Bartol, CISSP, CGEIT UTC Senior Cybersecurity Strategist Agenda Problem Definition Existing and Emerging Practices

More information

Fintech District. The First Testing Cyber Security Platform. In collaboration with CISCO. Cloud or On Premise Platform

Fintech District. The First Testing Cyber Security Platform. In collaboration with CISCO. Cloud or On Premise Platform Fintech District The First Testing Cyber Security Platform In collaboration with CISCO Cloud or On Premise Platform WHAT IS SWASCAN? SWASCAN SERVICES Cloud On premise Web Application Vulnerability Scan

More information

AUTOSAR proofs to be THE automotive software platform for intelligent mobility

AUTOSAR proofs to be THE automotive software platform for intelligent mobility AUTOSAR proofs to be THE automotive software platform for intelligent mobility Dr.-Ing. Thomas Scharnhorst AUTOSAR Spokesperson Simon Fürst, BMW AG Stefan Rathgeber, Continental Corporation Lorenz Slansky,

More information

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led

EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led EC-Council Certified Network Defender (CND) Duration: 5 Days Method: Instructor-Led Certification: Certified Network Defender Exam: 312-38 Course Description This course is a vendor-neutral, hands-on,

More information

Precision Tec Diagnostics PO Box 2431 Cartersville, GA

Precision Tec Diagnostics PO Box 2431 Cartersville, GA Precision Tec Diagnostics PO Box 2431 Cartersville, GA 30120 e-mail: toolsupport@precisiontec.us info@precisiontec.us iscan3 PLATINUM provides a powerful tool for vehicle diagnostics. The intuitive user

More information

National Policy and Guiding Principles

National Policy and Guiding Principles National Policy and Guiding Principles National Policy, Principles, and Organization This section describes the national policy that shapes the National Strategy to Secure Cyberspace and the basic framework

More information

Heavy Vehicle Cyber Security Bulletin

Heavy Vehicle Cyber Security Bulletin Heavy Vehicle Cyber Security Update National Motor Freight Traffic Association, Inc. 1001 North Fairfax Street, Suite 600 Alexandria, VA 22314 (703) 838-1810 Heavy Vehicle Cyber Security Bulletin Bulletin

More information

Accelerating solutions for highway safety, renewal, reliability, and capacity. Future of Transportation

Accelerating solutions for highway safety, renewal, reliability, and capacity. Future of Transportation Accelerating solutions for highway safety, renewal, reliability, and capacity Connected Vehicles and the Future of Transportation Session Overview What are connected and automated vehicles? Connected vehicle

More information

CYBERSECURITY FEDERAL UPDATE. NCSL Cybersecurity Task Force

CYBERSECURITY FEDERAL UPDATE. NCSL Cybersecurity Task Force CYBERSECURITY FEDERAL UPDATE NCSL Cybersecurity Task Force FY 2018 BUDGET BLUEPRINT President s Management Agenda Identifies cybersecurity as a critical area to improving the federal government Department

More information

Failure Diagnosis and Prognosis for Automotive Systems. Tom Fuhrman General Motors R&D IFIP Workshop June 25-27, 2010

Failure Diagnosis and Prognosis for Automotive Systems. Tom Fuhrman General Motors R&D IFIP Workshop June 25-27, 2010 Failure Diagnosis and Prognosis for Automotive Systems Tom Fuhrman General Motors R&D IFIP Workshop June 25-27, 2010 Automotive Challenges and Goals Driver Challenges Goals Energy Rising cost of petroleum

More information

escan release notes: Revision History:

escan release notes: Revision History: escan release notes: Revision History: 04/29/2018: Rev 1.3.4: Very large update to Volumetric Efficiency baseline database. Added Volumetric Efficiency support for pressurized induction systems (please

More information

2018 Edition. Security and Compliance for Office 365

2018 Edition. Security and Compliance for Office 365 2018 Edition Security and Compliance for Office 365 [Proofpoint has] given us our time back to focus on the really evil stuff. CISO, Global 500 Manufacturer Like millions of businesses around the world,

More information

Cybersecurity, safety and resilience - Airline perspective

Cybersecurity, safety and resilience - Airline perspective Arab Civil Aviation Commission - ACAC/ICAO MID GNSS Workshop Cybersecurity, safety and resilience - Airline perspective Rabat, November, 2017 Presented by Adlen LOUKIL, Ph.D CEO, Resys-consultants Advisory,

More information