Software Architecture for Secure ECUs. Rudolf Grave EB TechDay-June 2015

Similar documents
How Security Mechanisms Can Protect Cars Against Hackers. Christoph Dietachmayr, CIS Solution Manager EB USA Techday, Dec.

Software integration challenge multi-core experience from real world projects

The Safe State: Design Patterns and Degradation Mechanisms for Fail- Operational Systems

Adaptive AUTOSAR: Infrastructure Software for Advanced Driver Assistance. Chris Thibeault June 7, 2016

Automotive Security An Overview of Standardization in AUTOSAR

Cyber security mechanisms for connected vehicles

Automotive Security: Challenges and Solutions

SW-Update. Thomas Fleischmann June 5 th 2015

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016

ISO meets AUTOSAR - First Lessons Learned Dr. Günther Heling

Scalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018

10 th AUTOSAR Open Conference

Autonomous Driving From Fail-Safe to Fail-Operational Systems

Introduction to Adaptive AUTOSAR. Dheeraj Sharma July 27, 2017

Introducing Hardware Security Modules to Embedded Systems

KSAR Support. for. ST s SPC5 32-bit Automotive MCUs

AUTOSAR Overview and Classic Platform

EB TechPaper. Combining the strengths of Elektrobit's SecOC with Argus IDPS. elektrobit.com

Taking the Right Turn with Safe and Modular Solutions for the Automotive Industry

A Safe Basis. Safety Functions Status and Challenge V

Arccore AB 2017, all rights reserved. Accelerating innovation

STMicroelectronics Automotive MCU Technical Day 意法半导体汽车微控制器技术日 2017 年 ST 汽车 MCU 技术日 2017 年 6 月 6 日, 上海 2017 年 6 月 8 日, 深圳 2017 年 6 月 13 日, 北京

Safety and Security for Automotive using Microkernel Technology

IS CAR HACKING OVER? AUTOSAR SECURE ONBOARD COMMUNICATION

Countermeasures against Cyber-attacks

Securing the future of mobility

10 th AUTOSAR Open Conference

AUTOBEST: A microkernel-based system (not only) for automotive applications. Marc Bommert, Alexander Züpke, Robert Kaiser.

ASC Chairman. Best Practice In Data Security In The Cloud. Speaker Name Dr. Eng. Bahaa Hasan

Isolation of Cores. Reduce costs of mixed-critical systems by using a divide-and-conquer startegy on core level

Adaptive AUTOSAR Extending the Scope of AUTOSAR-based Embedded Software

Market Trends and Challenges in Vehicle Security

Virtualization of Heterogeneous Electronic Control Units Testing and Validating Car2X Communication

Trusted Platform Modules Automotive applications and differentiation from HSM

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

Model Based Development and Code Generation for Automotive Embedded Systems. April 26, 2017 Dr. Gergely Pintér, Dr. Máté Kovács thyssenkrupp Steering

盤技術Approaches for Secure and Efficient In-Vehicle Key Management*

TechPaper. Over-the-air updates what advantages does the AUTOSAR Adaptive Platform offer?

What s New in AUTOSAR?

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

S. Erfani, ECE Dept., University of Windsor Network Security

Cryptographic Checksums

CIS 5373 Systems Security

STMicroelectronics Automotive MCU Technical Day

OFF-ROAD VEHICLE DIAGNOSTICS WITH AUTOSAR. Jigar Patel Namdeo Dhawle July 18, 2018

Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist

Adaptive AUTOSAR Extending the Scope of AUTOSAR-based Embedded Software

Link Security Considerations in the. Enterprise

Virtual Hardware ECU How to Significantly Increase Your Testing Throughput!

Is This What the Future Will Look Like?

Threat Modeling. Bart De Win Secure Application Development Course, Credits to

AUTOSAR design flow. Yoon-Jin Kim Application Engineer. July mentor.com/automotive

CIS 4360 Secure Computer Systems Applied Cryptography

TCL. ASIL Level. Software. Automotive ISO Tool-Qualification. Safety Manual. Software for Safety-Related Automotive Systems

CS 161 Computer Security

Automotive Cybersecurity: A steep learning curve

Micro-Architectural Attacks and Countermeasures

Internet of Things: Threats and counter measures with Java

SPC584C80C3, SPC58EC80C3

SGX Security Background. Masab Ahmad Department of Electrical and Computer Engineering University of Connecticut

ITU activities on secure vehicle software updates

Agenda. > AUTOSAR Overview. AUTOSAR Solution. AUTOSAR on the way

10 th AUTOSAR Open Conference

Adaptive AUTOSAR for high-performance in-car computers

AUTOSAR Method. Webinar

Using a Separation Kernel to Protect against the Remote Exploitation of Unaltered Passenger Vehicles

L7: Key Distributions. Hui Chen, Ph.D. Dept. of Engineering & Computer Science Virginia State University Petersburg, VA 23806

Crypto Background & Concepts SGX Software Attestation

Connecting Securely to the Cloud

Spring 2010: CS419 Computer Security

Current status and Future of AUTOSAR. Markus Bechter 7 th AUTOSAR Open Conference Oct. 22 nd -23 rd 2014, Detroit

Bitcoin, Security for Cloud & Big Data

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

CS 356 Operating System Security. Fall 2013

IPSec. Overview. Overview. Levente Buttyán

A Secure Update Architecture for High Assurance Mixed-Criticality System Don Kuzhiyelil Dr. Sergey Tverdyshev SYSGO AG

Linux and AUTOSAR Vector Informatik Congress, Stuttgart,

Security Requirements

Efficient testing of ECUs despite Security

AUTOSAR proofs to be THE automotive software platform for intelligent mobility

A Survey of BGP Security Review

TinySec: A Link Layer Security Architecture for Wireless Sensor Networks. Presented by Paul Ruggieri

UNIT - IV Cryptographic Hash Function 31.1

Message Authentication and Hash function

Functional Safety and Cyber-Security Experiences and Trends

Lecture 33. Firewalls. Firewall Locations in the Network. Castle and Moat Analogy. Firewall Types. Firewall: Illustration. Security April 15, 2005

Secure automotive on-board networks

Adaptive AUTOSAR. Ready for Next Generation ECUs V

Introducing a new temporal partitioning scheme to AUTOSAR OS

The modern car has 100 million lines of code and over half of new vehicles will be connected by 2020.

Data Integrity. Modified by: Dr. Ramzi Saifan

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Cyber security of automated vehicles

C and C++ Secure Coding 4-day course. Syllabus

Building Digital Key Solution for Automotive

Choosing the level that works for you!

AMDC 2017 Liviona Multi-Core in Automotive Powertrain and Next Steps Towards Parallelization

Computer Security Fall 2006 Joseph/Tygar MT 2 Solutions

Using Fault Injection to Verify an AUTOSAR Application According to the ISO 26262

Windows 10 IoT Core Azure Connectivity and Security

Transcription:

Software Architecture for Secure ECUs Rudolf Grave EB TechDay-June 2015

Agenda No safety without security and vice versa Established Safety Concepts Safety Analysis Methods for Security Analysis Secure Software Architecture Extensions Summary Elektrobit (EB), 2015 2

No safety without security and vice versa The Car of the Future: Increased comfort Increased potential for damage Autonomous Driving Highly safety-critical Requires latest data from the cloud Car-2-X Communication Communication with other cars infrastructure mobile phone or other devices ECUs have access to the on-board network Elektrobit (EB), 2015 3

No safety without security and vice versa Recent security breaches OpenSSL Heartbleed vulnerability Sensitive data accessible via maintenance function Encryption and maintenance functions are technically unrelated Cause: implementation error Remote door unlock Attacker could open cars with fake SMS Various vulnerabilities: Partially unencrypted communication Provision of sensitive data Missing integrity checks Weak or identical encryption keys Replay attacks possible Elektrobit (EB), 2015 4

Agenda No safety without security and vice versa Established Safety Concepts Safety Analysis Methods for Security Analysis Secure Software Architecture Extensions Summary Elektrobit (EB), 2015 5

Established Safety Concepts Memory Partitioning Safety RTE Protected communication between Memory Partitions QM SW-Cs ASIL SW-C SafetyE2E Protection Safety E2E Protection Safe communication to other ECUs Safety OS Safety RTE Microkernel QM Functions AUTOSAR OS BSW OEM modules QM CDD ASIL CDD Safety TimE Protection MCAL MCAL (ASIL) Wdg Memory Partitions Safety OS Data Protection Stack Protection Context Protection OS Protection Hardware Error management Elektrobit (EB), 2015 Safety TimE Protection Alive supervision Deadline Monitoring Control flow monitoring 6

Established Safety Concepts Time and Execution Protection Elektrobit (EB), 2015 7

Established Safety Concepts Communication Protection Elektrobit (EB), 2015 8

Agenda No safety without security and vice versa Established Safety Concepts Safety Analysis Methods for Security Analysis Secure Software Architecture Extensions Summary Elektrobit (EB), 2015 9

Safety Analysis Methods for Security Analysis Static vs. Dynamic Threat Model Safety: static threat model Security: dynamic threat model Threats are known at system design Threats are internal, e.g. random or systematic faults Iterations improve existing model with new knowledge New threats can emerge during system operation Threats are external Intelligent opponent has to be considered Elektrobit (EB) 2015 10

Safety Analysis Methods for Security Analysis Extending Safety Analysis to Security Analysis Safety and security rely on risk models It s crucial to recognize and use synergies Safety Security Extend hazard and risk analysis with malicious attacker Attacker has access to all communication channels Extend safety requirements with security requirements Searching for security vulnerabilities brings new safety exposures to light and vice versa Elektrobit (EB) 2015 11

Agenda No safety without security and vice versa Established Safety Concepts Safety Analysis Methods for Security Analysis Secure Software Architecture Extensions Summary Elektrobit (EB), 2015 12

Secure Software Architecture Extensions Using Partitioning to Protect Data Memory Partitioning Read protection Execution protection Allow access to sensitive data only for authorized tasks Stack Protection Stack protected via MPU Prevention against stack-overflow attacks Security-Task Stack Sensitive Data Elektrobit (EB) 2015 13

Secure Software Architecture Extensions Message Integrity Threats Countermeasures 1. Unauthorized message access Read, Modify, Delete 2. Impersonate other user Initiate communication 3. Temporal attacks Replay, Delay 1. Encryption Unauthorized read, modification, Impersonation of other user 2. Signatures Modification, Impersonation of other user 3. Integrity Checksums Modification 4. Message counters and timestamps Replay, Delay MACs containing signatures and freshness values eliminate most threads Elektrobit (EB) 2015 14

Secure Software Architecture Extensions Message Authentication MAC with key K is appended to message M Message M MAC (M,K) Alice Key K K MAC (M,K) Bob M? Key is known to sender and receiver M MAC M` MAC` Alterations from Eve are detected by Bob M* MAC Eve Elektrobit (EB) 2015 15

Secure Software Architecture Extensions AUTOSAR: E2E and SecOC Sender Unsafe channel between application and SecOC module Protect message with CRC from E2E in application Safe transport between ECUs SecOC transforms CRC to MAC Safe and secure transport between ECUs Receiver SecOC transforms MAC to CRC Application checks CRC Elektrobit (EB) 2015 16

Secure Software Architecture Extensions End-to-end protection with SecOC Single SecOC approach Use MAC algorithm also for message integrity Place ASIL developed SecOCin highest AUTOSAR layer Omit overhead for additional end-toend protection Elektrobit (EB) 2015 17

Secure Software Architecture Extensions AUTOSAR safety and security architecture Safety OS Memory write (safety), read and execution (security) protection TimE Protection Control flow monitoring (safety) E2E protection and SecOC Data integrity (safety, security) Authentication (security) Csm, CryShe Data encryption (security) Elektrobit (EB) 2015 18

Secure Software Architecture Extensions Csm, Cry, CryShe, Cal, Cpl, AUTOSAR defines two sets of crypto routines Crypto service manager (CSM/CRY) Crypto abstraction library (CAL/CPL) Both AUTOSAR specifications subdivide crypto modules into two layers Interface layer SERVICES Implementation layer PRIMITIVES CSM Interface layer CSM Implementation layer CRY CAL Interface layer CAL Implementation layer CPL Only the interface layer is properly specified in AUTOSAR This layer is completely standardized Contents of the implementation layer are left open for customer options This layer implements customer specific solutions with a standardized interface to the interface layer Elektrobit(EB) 2015 19

Secure Software Architecture Extensions Use case examples Secure Hardware Extension Attainable security level in software is limited. New automotive ECUs offer a Secure Hardware Extension (SHE) module. E.g. freescalebolero 3M/Calypso, Infineon TC179x, Fujitsu Atlas-L family, Renesas RH850 EB integrates the new hardware module with standard software. Development of drivers for SHE. Integration with AUTOSAR cryptographic module (Csm/CryShe). Tool driven configuration. We enable customers to easily switch between cryptographic routines in software and hardware. Interface layer Csm Implementation layer Cry { data = 42mil/h ; key = 0x1234; secure(data, key); } Software implementation Application AUTOSAR Csm CryShe Hardware SHE module Elektrobit (EB), 2015 20

Secure Software Architecture Extensions Outlook: Hypervisor setup Core1 Core2 Core3 Core4 QM SWCs E2E Lib ASIL SWC Linux- Application Autosar SecOC CSM CryHSM Linux Secure Hypervisor Inter OS communication Hardware Hardware Security Module (HSM) Elektrobit (EB) 2015 21

Agenda No safety without security and vice versa Established Safety Concepts Safety Analysis Methods for Security Analysis Secure Software Architecture Extensions Summary Elektrobit (EB), 2015 / Confidential 22

Summary Summary Extend safety analyses with security aspects Safety and security complement each other Employed methods are quite similar Safe and secure software architectures Use partitioning mechanisms for protection mechanisms Use secure authentication and integrity mechanisms for safe communication Hypervisors combines two worlds Access to board net via AUTOSAR Applications on e.g. Linux Protected communication through Firewall Elektrobit (EB) 2015 23

Thank you! Rudolf.Grave@elektrobit.com automotive.elektrobit.com