Cyber security mechanisms for connected vehicles

Similar documents
CardOS Secure Elements for Smart Home Applications

Accelerating the implementation of trusted computing

iotrust Security Solutions

Securing V2X communications with Infineon HSM

Server side management system for multiple IoT terminals in industrial systems

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

EBV Personalization Services for Security Devices

Automotive Security An Overview of Standardization in AUTOSAR

Automotive Security: Challenges and Solutions

Efficient testing of ECUs despite Security

Trusted Platform Modules Automotive applications and differentiation from HSM

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

How Security Mechanisms Can Protect Cars Against Hackers. Christoph Dietachmayr, CIS Solution Manager EB USA Techday, Dec.

Automotive Cybersecurity: A steep learning curve

Flash Bootloader. Product Information

Introducing Hardware Security Modules to Embedded Systems

Software Architecture for Secure ECUs. Rudolf Grave EB TechDay-June 2015

Cyber security of automated vehicles

SW-Update. Thomas Fleischmann June 5 th 2015

Secure automotive on-board networks

Assystem in Germany OCTOBER 19, 2017

Market Trends and Challenges in Vehicle Security

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016

Countermeasures against Cyber-attacks

Spotlight on IoT Security. Choose the right security for the Internet of Things.

Giesecke+Devrient. Company Presentation

10 th AUTOSAR Open Conference

The Adaptive Platform for Future Use Cases

ASCLIN Asynchronous Synchronous Interface

Industrial PROFET. Universal Application Board User s Manual

Securing the future of mobility

Functional Safety and Cyber-Security Experiences and Trends

Virtual Hardware ECU How to Significantly Increase Your Testing Throughput!

Application Note, V1.0, Jul AP08049 XC886/888CLM. Migration of Flash to ROM Device: Memory Protection Configurations.

Windows IoT Security. Jackie Chang Sr. Program Manager

TRESCCA Trustworthy Embedded Systems for Secure Cloud Computing

Connecting Securely to the Cloud

Demystifying Industrial Security

Implementing security has never been easier. Infineon Security Partner Network.

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017

TechPaper. Over-the-air updates what advantages does the AUTOSAR Adaptive Platform offer?

KSAR Support. for. ST s SPC5 32-bit Automotive MCUs

Application Note TLE9252V. About this document. Application Note. Safety Recommendations Z8F

Press Release. ETAS GmbH. Borsigstraße Stuttgart, Germany Phone Press and Public Relations: Anja Krahl

Secure Product Design Lifecycle for Connected Vehicles

Security of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices

Architecture concepts in Body Control Modules

MASP Chapter on Safety and Security

Security in NFC Readers

STMicroelectronics Automotive MCU Technical Day 意法半导体汽车微控制器技术日 2017 年 ST 汽车 MCU 技术日 2017 年 6 月 6 日, 上海 2017 年 6 月 8 日, 深圳 2017 年 6 月 13 日, 北京

Delivering High-mix, High-volume Secure Manufacturing in the Distribution Channel

INTERNET OF THINGS KONTRON

Verizon Software Defined Perimeter (SDP).

ST33F1M, ST33F1M0, ST33F896, ST33F768, ST33F640, ST33F512

ST33F1M. Smartcard MCU with 32-bit ARM SecurCore SC300 CPU and 1.25 Mbytes high-density Flash memory. Features. Hardware features.

PREEvision Technical Article

UNECE WP29/TFCS Regulation standards on threats analysis (cybersecurity) and OTA (software update)

Automotive Anomaly Monitors and Threat Analysis in the Cloud

Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is

Riccardo Mariani, Intel Fellow, IOTG SEG, Chief Functional Safety Technologist

AUTOSAR proofs to be THE automotive software platform for intelligent mobility

Scalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018

IS CAR HACKING OVER? AUTOSAR SECURE ONBOARD COMMUNICATION

standards and frameworks and controls oh my! Mike Garcia Senior Advisor for Elections Best Practices

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

Operating temperature T a

TLT807B0EPV Demoboard

How to protect Automotive systems with ARM Security Architecture

SIMATIC. Industrial PC Microsoft Windows 7. Safety instructions 1. Initial startup: Commissioning the operating. system

vflash Vector Webinar V

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

Create, Embed, Empower. Crevavi Technologies Company profile

Compliance Verification Process for Ethernet ECUs

Future Challenges and Changes in Industrial Cybersecurity. Sid Snitkin VP Cybersecurity Services ARC Advisory Group

Diagnostic Trends 2017 An Overview

XMC1000 EEPROM emulation and data retention

Automotive Gateway: A Key Component to Securing the Connected Car

Functional Safety and Cyber Security Experiences and Trends

Digital Forensics - Global Market Outlook ( )

NovalithIC H-Bridge Demo Board

OPTIGA TM Trust B SLE95250

EB TechPaper. Combining the strengths of Elektrobit's SecOC with Argus IDPS. elektrobit.com

Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)

Hardware Security Challenges and Solutions. Mike Bartley TVS, Founder and CEO

Application Note, V 1.1, Apr AP08006 C868. Interfacing SPI/I2C Serial EEPROM with C868 Microcontroller. Microcontrollers. Never stop thinking.

Smart High-Side Power Switch BSP742RI PG-DSO8. AEC qualified Green product (RoHS compliant)

SIMATIC. Industrial PC Microsoft Windows 7 (USB stick) Safety instructions 1. Initial startup: Commissioning the operating system

SafeNet Authentication Client

Enabling Smart Lighting for Smart Cities. How Cheen Ng 18 August 2017

Interconnected, reliable and future-proof. Telematics units by Liebherr

OTA and Remote Diagnostics

SIMATIC. SIMATIC Logon V1.6. Security information 1. Conditions for secure operation of SIMATIC Logon 2. User management and electronic signatures 3

AUTOSAR Overview and Classic Platform

The Power to Log. Powerful Solution for Vehicle Testing and Validation of Automobile Networks

ABB Process Automation, September 2014

Utimaco IS GmBH. Teo Poh Soon Director. CryptoServer Products Aachen, Germany June 2014 Page 1

Provisioning secure Identity for Microcontroller based IoT Devices

Encryption Technology Connected Car Autonomous Vehicles Export Control Implications

TLx5012B 2go Evaluation Kit

13W-AutoSPIN Automotive Cybersecurity

Transcription:

Infineon Security Partner Network Partner Use Case Cyber security mechanisms for connected vehicles Protecting automotive vehicle networks and business models from cyber security attacks Products AURIX www.infineon.com/ispn

Use case Application context and security requirement The rapidly growing connectivity of vehicles is opening numerous opportunities for new features and attractive business models. At the same time, the potential for cyber-attacks on vehicle networks is also growing. Such attacks threaten the functional safety of the vehicle and could cause financial damage. Challenge Vehicles consist of numerous interconnected electronic control units (ECUs). The overall system only works if the software executed on the ECUs and the data transmitted between ECUs is protected against manipulation. Implementation The solution requires multiple layers of security mechanisms. The foundation is provided by microcontrollers which are equipped with security cores e.g. Aurix Hardware Security Module (HSM). They provide hardware acceleration for cryptographic primitives such as Advanced Encryption Standard (AES) and Elliptic Curve Cryptography (ECC) as well as protected storage of cryptographic keys. Based on these capabilities Vector is providing software and drivers for these HSMs that enable higher level security mechanisms such as secured boot, secured communication or anomaly detection. User benefits: Vehicle Electrical/Electronic (EE) architectures which integrate cyber security mechanisms offer the following benefits: Only authentic software updates can be installed and executed on the ECUs Communication between the vehicle and cloud services is protected against cyber attacks Manipulation attempts to the inter ECU communication are detected Services provided by the vehicle are protected against unauthorized access Security anomalies can be recorded for forensic analysis

Solution To achieve defense in depth, the Vector security mechanisms are operating on different logical levels: Secure Platform: The Crypto primitives which are accessible via a crypto stack allow an ECU to perform cryptographic operations such as encryption or signature verification. If crypto primitives are supported by HW they allow for protected storage of cryptographic keys and better performance of cryptographic operations. Secured boot checks the integrity of the bootloader, application and data during startup of the ECU. Secured flashing, also known as code signing, allows to check if a software update for an ECU is authentic. Secure In-Vehicle Communication: To protect in-vehicle communication the authenticity and freshness of messages is checked. If required, also the confidentiality of messages can be checked. Secure Gateways: Critical vehicle gateways are equipped with advanced security mechanisms such as intrusion detection, firewalls or vehicle key management infrastructure. Secure External Communication: Additionally, the communication from the vehicle to external services is protected. The computational and memory resources of most ECUs are still very restricted in comparison to other IT systems. This requires efficient implementations regarding the use of Random-Access Memory (RAM) and non-volatile memory for features like security event logging. Furthermore, efficient implementations are required to maximize the performance and security benefits provided by Infineon HSMs.

Solution Main benefits of the Infineon product Infineon s Aurix HSM provides the security features to enable a multi-layered security concept. In combination with the AUTOSAR-like HSM drivers from Vector, automotive Original Equipment Manufacturers (OEMs) and TIER1-suppliers get high quality and production-ready embedded security solutions for their ECUs.

Partner Partners from the Infineon Security Partner Network help you secure your devices and applications: understand which threats can undermine your business, propose solutions that will protect your business, build and implement such security solutions and, when relevant manage their operation. They have been selected by Infineon on the basis of their system security competence and ability to design and deliver strong and trustworthy security solutions. Their activities are diverse and include security consulting, security solution provision, electronic design, systems integration and trust services management. For some, offers are off-the-shelf; while for others, offers are custom-built. Vector Informatik Vector Informatik is the leading supplier of software tools and components for developing and networking electronic automotive systems based on Ethernet, CAN, LIN, FlexRay and MOST as well as on many different CAN-based protocols. Customers around the world rely on solutions and products from the independent Vector Group. In addition to its headquarters in Stuttgart, Vector also has subsidiaries in the USA, Japan, France, Great Britain, Italy, Austria, Sweden, South Korea, India, China and Brazil. More than 2,000 employees support manufacturers and suppliers in the automotive industry and related sectors with a professional platform of tools, software components and services for developing embedded systems. Vector offers comprehensive solutions for the various tasks involved in bringing Cyber Security into vehicles. You benefit from software tools, embedded components and services. Vector Informatik s contribution to the Infineon Security Partner Network The Vector solution for Automotive Cyber Security consists of embedded components, tools and services: Secure and high-performance TLS communication with the embedded software modules vtls and vhsm Blocking unwanted communication with the embedded Ethernet firewall Secure communication with the SecOC mechanisms of AUTOSAR Secure software downloads, remote diagnosis and data acquisition for Big-Data using OTA technology Fuzz testing with CANoe, a building block in your security testing strategy Authorized access to protected ECUs and networks with the Vector Security Manager Efficient certificate management with the Security Manager Systematic security engineering with the Security Check HSM is an important building-block of several security strategies and the basis for many of the above-mentioned security mechanisms. Therefore, the partnership concentrates on the support of Infineon s Aurix Family with HSM. Vector implements optimized SW drivers for the HSM chips. The Software is part of Vector s AUTOSAR basic software called MICROSAR. In the near future, Ubiquitous Corporation will provide also a V2X solution. Published by Infineon Technologies AG 81726 Munich, Germany 2018 Infineon Technologies AG. All Rights Reserved. Date: 02 / 2018 Additional information For further information on technologies, our products, the application of our products, delivery terms and conditions and/or prices please contact your nearest Infineon Technologies office (www.infineon.com). Please note! THIS DOCUMENT IS FOR INFORMATION PURPOSES ONLY AND ANY INFORMATION GIVEN HEREIN SHALL IN NO EVENT BE REGARDED AS A WARRANTY, GUARANTEE OR DESCRIPTION OF ANY FUNCTIONALITY, CONDITIONS AND/OR QUALITY OF OUR PRODUCTS OR ANY SUITABILITY FOR A PARTICULAR PURPOSE. WITH REGARD TO THE TECHNICAL SPECIFICATIONS OF OUR PRODUCTS, WE KINDLY ASK YOU TO REFER TO THE RELEVANT PRODUCT DATA SHEETS PROVIDED BY US. OUR CUSTOMERS AND THEIR TECHNICAL DEPARTMENTS ARE REQUIRED TO EVALUATE THE SUITABILITY OF OUR PRODUCTS FOR THE INTENDED APPLICATION. WE RESERVE THE RIGHT TO CHANGE THIS DOCUMENT AND/OR THE INFORMATION GIVEN HEREIN AT ANY TIME. Warnings Due to technical requirements, our products may contain dangerous substances. For information on the types in question please contact your nearest Infineon Technologies office. Except as otherwise explicitly approved by us in a written document signed by authorized representatives of Infineon Technologies, our products may not be used in any lifeendangering applications, including but not limited to medical, nuclear, military, life-critical or any other applications where a failure of the product or any consequences of the use thereof can result in personal injury.