Countermeasures against Cyber-attacks

Similar documents
Scalable and Flexible Software Platforms for High-Performance ECUs. Christoph Dietachmayr Sr. Engineering Manager, Elektrobit November 8, 2018

Trusted Platform Modules Automotive applications and differentiation from HSM

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

Automotive Anomaly Monitors and Threat Analysis in the Cloud

SW-Update. Thomas Fleischmann June 5 th 2015

Turbocharging Connectivity Beyond Cellular

Automotive Security An Overview of Standardization in AUTOSAR

Cyber security mechanisms for connected vehicles

MIGRATING TO CAN FD. Tony Adamson. Marketing Director CAN / LIN / FlexRay

Market Trends and Challenges in Vehicle Security

10 th AUTOSAR Open Conference

PREEvision Technical Article

Automotive Gateway: A Key Component to Securing the Connected Car

Secure automotive on-board networks

PENETRATION TESTING OF AUTOMOTIVE DEVICES. Dr. Ákos Csilling Robert Bosch Kft., Budapest HUSTEF 15/11/2017

AUTOSAR stands for AUTomotive Open Systems ARchitecture. Partnership of automotive Car Manufacturers and their Suppliers

Security Concerns in Automotive Systems. James Martin

OTA-On-Demand (OOD) Services with AGL

10 th AUTOSAR Open Conference

Securing the future of mobility

Cybersecurity Challenges for Connected and Automated Vehicles. Robert W. Heller, Ph.D. Program Director R&D, Southwest Research Institute

Build a Driver Information System with IoT Technology

Automotive Cybersecurity: A steep learning curve

Advanced IP solutions enabling the autonomous driving revolution

1000BASE-T1 from Standard to Series Production

Architecture concepts in Body Control Modules

MATLAB Expo Simulation Based Automotive Communication Design using MATLAB- SimEvent. Sudhakaran M Anand H General Motors

A modern diagnostic approach for automobile systems condition monitoring

A NEW CONCEPT IN OTA UPDATING FOR AUTOMOTIVE

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017

ARM processors driving automotive innovation

Cyber security of automated vehicles

Automotive Linux Summit 2017 May 31-June 2, 2017, Tokyo, Japan Advances and challenges in remote configuration of connected cars

Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is

The CAN Bus From its Early Days to CAN FD By Friedhelm Pickhard (ETAS/P)

Infotainment Solutions. with Open Source and i.mx6. mentor.com/embedded. Andrew Patterson Business Development Director Embedded Automotive

How Security Mechanisms Can Protect Cars Against Hackers. Christoph Dietachmayr, CIS Solution Manager EB USA Techday, Dec.

Development of Intrusion Detection System for vehicle CAN bus cyber security

Software Architecture for Secure ECUs. Rudolf Grave EB TechDay-June 2015

Introducing Hardware Security Modules to Embedded Systems

Fast Firmware Updates Over-the-Air Mechanisms to speed up ECU updates in the vehicle

Software integration challenge multi-core experience from real world projects

Virtualization of Heterogeneous Electronic Control Units Testing and Validating Car2X Communication

Virtual Hardware ECU How to Significantly Increase Your Testing Throughput!

Offense & Defense in IoT World. Samuel Lv Keen Security Lab, Tencent

CODEBLUE Takahiro Matsuki (FFRI) Dennis Kengo Oka (ETAS)

Welcome Note. Dr. Thomas Scharnhorst, AUTOSAR Spokesperson 10 th AUTOSAR Open Conference 8 th Nov 2017, Mountain View, California

Security Analysis of modern Automobile

AUTOSAR proofs to be THE automotive software platform for intelligent mobility

Communication Patterns in Safety Critical Systems for ADAS & Autonomous Vehicles Thorsten Wilmer Tech AD Berlin, 5. March 2018

Overvoltage protection with PROTEK TVS diodes in automotive electronics

Experimental Security Analysis of a Modern Automobile

Smart Antennas and Hypervisor: Enabling Secure Convergence. July 5, 2017

盤技術Approaches for Secure and Efficient In-Vehicle Key Management*

Service Technical Resources MUT-III. (Multi-Use Tester-III*) Quick Reference Guide

Preventing Cyber Attacks on Aftermarket Connectivity Solutions Zach Blumenstein, BD Director Argus Cyber Security

Mentor Automotive Save Energy with Embedded Software! Andrew Patterson Presented to CENEX 14 th September 2016

Hardening Attack Vectors to cars by Fuzzing

Adaptive AUTOSAR Extending the Scope of AUTOSAR-based Embedded Software

November 16, TTTech Computertechnik AG / TTTech Auto AG Copyright TTTech Auto AG. All rights reserved

The case for a Vehicle Gateway.

How Microcontrollers help GPUs in Autonomous Drive

Diagnostic Trends 2017 An Overview

RazorMotion - The next level of development and evaluation is here. Highly automated driving platform for development and evaluation

Securing the Connected Car. Eystein Stenberg CTO Mender.io

Securing the Connected Car. Eystein Stenberg Product Manager Mender.io

Linux and AUTOSAR Vector Informatik Congress, Stuttgart,

Conquering Complexity: Addressing Security Challenges of the Connected Vehicle

Safety and Security for Automotive using Microkernel Technology

AGL Reference Hardware Specification Document

Functional Safety and Cyber Security Experiences and Trends

Taking the Right Turn with Safe and Modular Solutions for the Automotive Industry

13W-AutoSPIN Automotive Cybersecurity

Serial EEPROM for Automotive New Advanced series

Automotive Security Standardization activities and attacking trend

A specification proposed by JASPAR has been adopted for AUTOSAR.

ARM Moves Further Into Automotive with NXP's Launch of S32K Series to the General Market

Virtualizaton: One Size Does Not Fit All. Nedeljko Miljevic Product Manager, Automotive Solutions MontaVista Software

Security of Embedded Hardware Systems Insight into Attacks and Protection of IoT Devices

Connected Car Solutions Based on IoT

The Adaptive Platform for Future Use Cases

Security and Performance Benefits of Virtualization

SIMPLIFYING THE CAR. Helix chassis. Helix chassis. Helix chassis WIND RIVER HELIX CHASSIS WIND RIVER HELIX DRIVE WIND RIVER HELIX CARSYNC

Designing a software framework for automated driving. Dr.-Ing. Sebastian Ohl, 2017 October 12 th

Compliance Verification Process for Ethernet ECUs

10 th AUTOSAR Open Conference

Open Source in Automotive Infotainment

Context-aware Automotive Intrusion Detection

Interaction between AUTOSAR and non-autosar Systems on top of a Hypervisor

Application. Diagnosing the dashboard by the CANcheck software. Introduction

TechPaper. Over-the-air updates what advantages does the AUTOSAR Adaptive Platform offer?

Fast and Vulnerable A Story of Telematic Failures

Security issues related to the future Networked Car

Automotive Attack Surfaces. UCSD and University of Washington

Intrusion Detection Adapted for Automotive Challenges for Hardware - An Implementation Example

Press Release. ETAS GmbH. Borsigstraße Stuttgart, Germany Phone Press and Public Relations: Anja Krahl

IS CAR HACKING OVER? AUTOSAR SECURE ONBOARD COMMUNICATION

New ARMv8-R technology for real-time control in safetyrelated

WIRELESS SOLUTIONS FOR EVERYONE

Transcription:

Countermeasures against Cyber-attacks Case of the Automotive Industry

Agenda Automotive Basics ECU, domains, CAN Automotive Security Motivation, trends Hardware and Software Security EVITA, SHE, HSM Secure Communications Secure CAN Communications Network Isolation Secure gateways Secure External Communications Car-to-car communications

Bluetooth Audio Automotive Basics Electrical/Electronic Architecture Powertrain ECUs Safety, hard timing requirements / Lockstep CPUs Complex processing operations (partly) Chassis ECUs Safety, hard timing requirements / Lockstep CPUs Mixture of safety BM and non-safety ECUs (e.g., DAS) Partially MCU highend nodes ACC DAS Central Gateway C2C Head-Unit USS Cam WLAN Infotainment Multimedia- and communication devices No safety ECUs but partly safety cores integrated CCU Light High bandwidth communication SCU Door Climate Body-Domain Not safety critical Nodes do not require high bandwidth Mainly implemented by low cost parts TCU ABS HYD ESP Instrument Multimedia Immobilizer Powertrain Chassis Infotainment Body

Automotive Basics CAN (Controller Area Network) Broadcast protocol, all ECUs access the bus at the same time ECU 1 ECU 3 CAN ID Payload CR C 0 0 0 0 1 0 1 0 0 0 0 1 1 1 ACK EO F CAN ID 0 0 0 1 ECU 3 sends ACK Recessive bit: looses arbitration ECU 2

Automotive Basics What is an ECU? SoC JTAG RAM Variables Boundary scan Flash memory OS, data Boundary scan Sensor e.g. air flow meter Network interface e.g. CAN Option: Security hardware e.g. coprocessor, secure memory On-chip debugger CPU Actuator e.g. fuel injection

Automotive Basics Historical Development From closed system to an interactive communication Reason: more safety, more efficiency, Day before yesterday Yesterday Today Tomorrow

Automotive Basics Software Complexity Today, a modern premium-class vehicle executes complex software on 70 to 100 μp-based ECUs realizing between up to 3000 singular functions with approx. 100 million LOC* Premium-class vehicle 100 Mac OS X 10.4 86 Windows Server 2003 50 Linux Kernel 3.6 15.9 Boeing 787 Dreamliner F-35 Joint Strike Fighter F-22 Raptor OpenSSL 6.5 5.7 1.7 0.5 Assuming NASA error rates (1 defects per 10,000 LOC), results in approx. 10,000 SW defects for a modern premium-class vehicle 0 20 40 60 80 100 120 Million Lines of Code (LOC) for different products * Figures according to [IEEE09] and [LOC]

8

Automotive Security Example from Black Hat 2015 2 Control messages sent over the air CAN C (powertrain, chassis) Engine Park assist EPS ABS ACC CAN IHS (body) Doors V850 (CAN GW ) Amp Lessons Learned: protecting interfaces not sufficient anymore Head unit SPI ARM 1 Unauthorized remote reprogramming of V850 through multiple head unit security vulnerability

Automotive Security Four Layers of Security Secure connected vehicle Vehicle firewalls and security standards for external interfaces Secure E/E architecture Use separation and securely configured gateways to protect functional domains of E/E architecture Secure in-vehicle network Protect integrity of critical in-vehicle signals Standardized in AUTOSAR release 4.2.1 Secure individual ECU Protect integrity of software and data Hardware Security Module (HSM)) Deeply Embedded Automotive Hypervisor

Secure Hardware and Software EVITA Project Landmark European FP7 Project On-die security extension To decrease cost and increase security No strong tamper resistance To decrease cost Counterbalanced with key management Guaranteed performance AES for EVITA light and medium Automotive grade (unlike TPM) E.G. temperature, vibrations, safety... Derived from EVITA project Secure Hardware Extension (EVITA light) Bosch Hardware Security Module (EVITA medium) Hardware separation e.g. memory controller, independent busses EVITA Secure memory Application CPU Normal memory

Secure Communications AUTOSAR SecOC EG: Infotainment EG: ADAS Data Counter MAC EG: Brakes MAC AES MAC =? MAC Counter Data AES Counter Data >? Counter

Network Isolation Secure Central Gateway OBD Hacked telematics unit attempting to spoof radar Device connected through OBD-II attempting to spoof radar Radar Brakes

Secure External Communications Flashing and Diagnostics Secure environment Server room Database Key Key Key HSM Secure server ECU keys Authen tication Internet (HTTPS) Dealer

Secure External Communications Security Concept for Car-to-Car Communications Multiple certificates (=identities) Can download new certificates from road-side units Signed messages n cars in range = 10n signature verifications per second

Wrap-up Holistic Security Approach is necessary! Hardware security MAC authentication Key injection Firewall Secure diagnostics tester authentication with server

ESCRYPT Worldwide Service Wherever It Is Needed North America Ann Arbor Germany Berlin Bochum Munich Stuttgart Wolfsburg Korea Seoul China Shanghai Japan Yokohama

Camille Vuillaume ETAS Japan - Embedded Security Phone: 045-222-0913 Email: camille.vuillaume@etas.com www.escrypt.com