Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

Similar documents
Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security

Automotive Cyber Security

Automotive Anomaly Monitors and Threat Analysis in the Cloud

Security for V2X Communications

Cyber Security and Vehicle Diagnostics. Mark Zachos DG Technologies

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

Connected vehicle cloud

Trusted Platform Modules Automotive applications and differentiation from HSM

Open Source in Automotive Infotainment

4G and 5G Cellular Technologies Enable Intelligent Transportation Use Cases

Securing the future of mobility

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

Strong Security Elements for IoT Manufacturing

Turbocharging Connectivity Beyond Cellular

Securing V2X communications with Infineon HSM

Preventing External Connected Devices From Compromising Vehicle Systems Vector Congress November 7, 2017 Novi, MI

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is

ARM processors driving automotive innovation

Security and Privacy in Car2Car Adhoc Networks

Connected vehicle cloud Commercial presentation

The case for a Vehicle Gateway.

Driving virtual Prototyping of Automotive Electronics

Heavy Vehicle Cybersecurity Update. National Motor Freight Traffic Association, Inc.

Secure Product Design Lifecycle for Connected Vehicles

Examining future priorities for cyber security management

Future Implications for the Vehicle When Considering the Internet of Things (IoT)

WardsAuto Interiors Conference Creating the Ultimate User Experience

The Oracle Trust Fabric Securing the Cloud Journey

Security Challenges with ITS : A law enforcement view

Cybersecurity Engineering and Assurance for Connected and Automated Vehicles

Cybersecurity for Automobiles: BlackBerry s 7-Pillar Recommendation

The Remote Exploitation of Unaltered Passenger Vehicles Revisited. 20 th October 2016 Mark Pitchford, Technical Manager, EMEA

Third public workshop of the Amsterdam Group and CODECS C-ITS Deployment in Europe: Common Security and Certificate Policy

NC1701 ENHANCED VEHICLE COMMUNICATIONS CONTROLLER

Why This Major Automaker Decided BlackBerry Cybersecurity Consulting was the Right Road to Protecting its Connected Cars

Cyber security mechanisms for connected vehicles

Standards for V2X Communication and Implications for OEMs and ITS

13W-AutoSPIN Automotive Cybersecurity

Smart Connected Vehicles: Driving to the Bottom Line!

Demystifying Industrial Security

AUTOSAR proofs to be THE automotive software platform for intelligent mobility

Welcome Note. Dr. Thomas Scharnhorst, AUTOSAR Spokesperson 10 th AUTOSAR Open Conference 8 th Nov 2017, Mountain View, California

Vehicle & Transportation Infrastructure Cyber Security Discussions. IQMRI

Diagnostic Trends 2017 An Overview

CSI: VIDEO SURVEILLANCE CONVERTING THE JUGGERNAUT

Cyber security of automated vehicles

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Who s Protecting Your Keys? August 2018

AUTOMOTIVE FOUNDATIONAL SOFTWARE SOLUTIONS FOR THE MODERN VEHICLE

KPIT S Connected Vehicle Practice

hidglobal.com HID ActivOne USER FRIENDLY STRONG AUTHENTICATION

The Future of Mobility

Heavy Vehicle Cyber Security Bulletin

SECURING THE CONNECTED ENTERPRISE.

Trust & Privacy: Information Security and Identity Management for Autonomous Vehicles. March 31, failure analysis & prevention

Roger C. Lanctot Director, Automotive Connected Mobility

In today s business environment, data creates value so it s more important than ever to protect it as a vital business asset

MEMA Perspectives on Connected Vehicles Policy. Leigh Merino Senior Director, Regulatory Affairs Northern Virginia Technology Council April 27, 2017

Next Generation Infotainment Systems

NEXT GENERATION INFOTAINMENT CONNECTIVITY AND TELEMATICS SOFTWARE FROM PROOF-OF-CONCEPT TO START-OF-PRODUCTION

Offense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent

Securing Your Most Sensitive Data

Efficient testing of ECUs despite Security

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

Accelerating solutions for highway safety, renewal, reliability, and capacity. Connected Vehicles and the Future of Transportation

Application Strategic Focus

Expand Your Cyber Expertise. Secure Your Future.

M2MD Communications Gateway: fast, secure and efficient

Autorama, Connecting Your Car to

March 6, Dear Electric Industry Vendor Community: Re: Supply Chain Cyber Security Practices

Charter of Trust. on Cybersecurity. charter-of-trust.com #Charter of Trust

CAMP. Intelligent Transportation Systems. A Security Credential Management System for Vehicle-to-Vehicle Communications

M2MD Communications Gateway: fast, secure, efficient

Governmental Committee

Public Key Infrastructure

TRENDS IN SECURE MULTICORE EMBEDDED SYSTEMS

How to make Connected Car Reality? Dr. Walter J. Buga CEO

IT Consulting and Implementation Services

Mass Transit Systems for Rail On Board Applications

Aerohive and IntelliGO End-to-End Security for devices on your network

Visiongain. -v1531/ Publisher Sample

Automotive Security through New Communication Lockdown Utilizing Programmable Logic Solutions

Compute solutions for mass deployment of autonomy

Authentication with Privacy for Connected Cars - A research perspective -

10 th AUTOSAR Open Conference

Countermeasures against Cyber-attacks

Accelerating solutions for highway safety, renewal, reliability, and capacity. Future of Transportation

Storage as an IoT Device Roundtable Walt Hubis, CISSP Tom Coughlin

The Key Principles of Cyber Security for Connected and Automated Vehicles. Government

Mentor Automotive Save Energy with Embedded Software! Andrew Patterson Presented to CENEX 14 th September 2016

Development of Intrusion Detection System for vehicle CAN bus cyber security

Autonomous Driving needs Safety & Security. Embedded World 2018 Dr. Ciwan Gouma

Aviation & Airspace Solutions MODERNIZING SYSTEMS TRANSFORMING OPERATIONS DELIVERING PERFORMANCE

The Future of Smart Cards: Bigger, Faster and More Secure

DEx. Other initiatives, ongoing projects and applications within the strategic program Automotive Security and Privacy.

Vehicle To Android Communication Mode

Windows IoT Security. Jackie Chang Sr. Program Manager

New Business. Opportunities for Cellular IoT. Loic Bonvarlet Director of Marketing Secure Identity Arm. Copyright 2018 Arm, All rights reserved.

nshield GENERAL PURPOSE HARDWARE SECURITY MODULES

Transcription:

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018 Securely Connecting People, Applications, and Devices

Ted Shorter Chief Technology Officer CSS Ted.Shorter@css-security.com www.css-security.com Conquering Complexity: Addressing Security Challenges of the Connected Vehicle October 3, 2018

The Promise of Connected Vehicles Vehicle maintenance Infotainment Telematics Accident avoidance Software-defined Vehicles 3

The Promise of Connected Vehicles Automation Car sharing Coordination Security becomes critical 4

The Challenge of Connected Vehicles 5 5

Securing Vehicles is Hard Attractive target Constrained platforms OEMs manage complex supply chains Multi-vendor Cost-sensitive Difficult to patch or update 6

Securing Vehicles is Hard Long design times 5 years Long life spans 15-20 year life expectancy Average age of vehicles on the road: 11.6 years Safety comes first 7

Complexity is the Enemy of Security Components per vehicle: ~1800 80-150 ECUs per vehicle Hundreds of suppliers 8

Lines of Code Source: informationisbeautiful.net 9

CAN Bus and OBD-II CAN designed in 1983 No security built in design OBD mandated in 1996 Universal access to on-board diagnostics 10

Right to Repair Dealer repair 3rd-Party Mechanic repair Owner repair Upgrades and aftermarket CY2015 Automotive aftermarket: $450 Billion* *Source: Global Market Insights.com 11

Authentication and Authorization Roles Authentication & Authorization in the Enterprise: Subjects Roles Resources Assignment Permission (membership) (e.g., Read, Write) Application Administrators Application Users Application App Owners Business Units Data Data Data 12

Authentication and Authorization Roles Authentication & Authorization in the Vehicle: Manufacturer Engine Dealer Networks Owner* Infotainment Mechanic Dashboard Passenger* Rentee Vehicle ECUs Renter V2V Braking Telematics Suspension Firmware Steering 13

Crypto Agility The algorithms and keys we use today will not be secure in the future Constrained devices are not immune to this fact Know what you have: End-entity certificates and keys Roots of Trust Plan for algorithm end-of-life updatability 14

So, what now? Best Practices Still Apply Existing Technologies, Used in New Ways Defense in Depth Fail Safely (and Securely) Least Privilege Separation of Duties Segmentation / Multi-Bus / Firewalls Over-the-Air Updates Code Signing PKI / Digital Certificates Certificate & Key Management TCP/IP Federation Encryption Hardware Key Storage (TPM,HSM) RADIUS 15

Industry Groups Standards and Regulation are inevitable SAE (Society of Automotive Engineers) ISO (International Standards Organization) IEEE (Institute of Electronics Engineers) NIST / AIAG (Automotive Industry Action Group) Auto-ISAC (Automotive Information Sharing and Analysis Center) CAMP (Crash Avoidance Metrics Partners) 16

V2X Vehicle-to-Vehicle Vehicle-to-Infrastructure First pilots in 2012 Live in some vehicles today 17

In Summary The first step is knowing you have a problem IoT Security is hard; automotive security is harder Change is coming, but it will take time Regulation and Standards are also coming 18

Thank you! For more information on certificate management software, PKI managed services, or PKI professional services at CSS, please visit us at: www.css-security.com. Ted Shorter, Chief Technology Officer Certified Security Solutions, Inc. Email: Ted.Shorter@css-security.com Direct: (216) 785-2970 Follow us on As the market leader in enterprise and IoT digital identity security for data, devices and applications, CSS is a cyber security company that builds and supports platforms to enable secure commerce for global businesses connected to the Internet. Headquartered in Cleveland, Ohio, with operations throughout North America, CSS is at the forefront of delivering innovative software products and SaaS solutions that are secure, scalable, economical and easy to integrate into any business. All Rights Reserved.