Automotive Security An Overview of Standardization in AUTOSAR

Similar documents
IS CAR HACKING OVER? AUTOSAR SECURE ONBOARD COMMUNICATION

Cyber security mechanisms for connected vehicles

Software Architecture for Secure ECUs. Rudolf Grave EB TechDay-June 2015

Current status and Future of AUTOSAR. Markus Bechter 7 th AUTOSAR Open Conference Oct. 22 nd -23 rd 2014, Detroit

Secure Ethernet Communication for Autonomous Driving. Jared Combs June 2016

Secure automotive on-board networks

Introducing Hardware Security Modules to Embedded Systems

Efficient testing of ECUs despite Security

AUTOSAR Overview and Classic Platform

UNIT - IV Cryptographic Hash Function 31.1

Security Requirements for Crypto Devices

盤技術Approaches for Secure and Efficient In-Vehicle Key Management*

Securing V2X communications with Infineon HSM

Automotive Security: Challenges and Solutions

OFF-ROAD VEHICLE DIAGNOSTICS WITH AUTOSAR. Jigar Patel Namdeo Dhawle July 18, 2018

IEEE Std and IEEE Std 1363a Ashley Butterworth Apple Inc.

Sicherheitsaspekte für Flashing Over The Air in Fahrzeugen. Axel Freiwald 1/2017

EB TechPaper. Combining the strengths of Elektrobit's SecOC with Argus IDPS. elektrobit.com

CardOS Secure Elements for Smart Home Applications

Connecting Securely to the Cloud

Countermeasures against Cyber-attacks

AUTOSAR proofs to be THE automotive software platform for intelligent mobility

10 th AUTOSAR Open Conference

Cryptographic Concepts

Flash Bootloader. Product Information

Market Trends and Challenges in Vehicle Security

Uses of Cryptography

Cyber security of automated vehicles

BCA III Network security and Cryptography Examination-2016 Model Paper 1

Remote Key Loading Spread security. Unlock efficiency

Designing Network Encryption for the Future Emily McAdams Security Engagement Manager, Security & Trust Organization BRKSEC-2015

Compliance Verification Process for Ethernet ECUs

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 11 Basic Cryptography

CSE 127: Computer Security Cryptography. Kirill Levchenko

Atmel Trusted Platform Module June, 2014

POST-QUANTUM CRYPTOGRAPHY VIENNA CYBER SECURITY WEEK DR. DANIEL SLAMANIG

CRYPTOGRAPHY AND NETWROK SECURITY-QUESTION BANK

1) Revision history Revision 0 (Oct 29, 2008) First revision (r0)

Crypto Background & Concepts SGX Software Attestation

Connected driving is the future. However, data exchange between vehicles. and roadside equipment will only become genuinely beneficial when it is

Introduction to Network Security Missouri S&T University CPE 5420 Data Integrity Algorithms

MASP Chapter on Safety and Security

Security in NFC Readers

Overview. SSL Cryptography Overview CHAPTER 1

SW-Update. Thomas Fleischmann June 5 th 2015

Trusted Platform Modules Automotive applications and differentiation from HSM

L13. Reviews. Rocky K. C. Chang, April 10, 2015

The question paper contains 40 multiple choice questions with four choices and students will have to pick the correct one (each carrying ½ marks.).

Securing the future of mobility

NIST Cryptographic Toolkit

Encryption. INST 346, Section 0201 April 3, 2018

VPN Overview. VPN Types

Biometrics. Overview of Authentication

Sharing Secrets using Encryption Facility - Handson

Lecture 9a: Secure Sockets Layer (SSL) March, 2004

Artop (AUTOSAR Tool Platform) Whitepaper

Cryptography MIS

Ref:

(a) Symmetric model (b) Cryptography (c) Cryptanalysis (d) Steganography

Decentralised Communication: The challenge of balancing interoperability and privacy.

Trustworthy ICT. FP7-ICT Objective 1.5 WP 2013

Securing Internet of things Infrastructure Standard and Techniques

KALASALINGAM UNIVERSITY

Autokey Version 2 Specification

This presentation covers Gen Z s Security capabilities.

ISACA CISA. ISACA CISA ( Certified Information Systems Auditor ) Download Full Version :

Security in ECE Systems

(2½ hours) Total Marks: 75

PROTECTING CONVERSATIONS

Lecture Nov. 21 st 2006 Dan Wendlandt ISP D ISP B ISP C ISP A. Bob. Alice. Denial-of-Service. Password Cracking. Traffic.

Computer Security: Principles and Practice

Lecture 1 Applied Cryptography (Part 1)

Test Conditions. Closed book, closed notes, no calculator, no laptop just brains 75 minutes. Steven M. Bellovin October 19,

IPSec. Overview. Overview. Levente Buttyán

Security & Privacy. Web Architecture and Information Management [./] Spring 2009 INFO (CCN 42509) Contents. Erik Wilde, UC Berkeley School of

How to protect Automotive systems with ARM Security Architecture

Easy Incorporation of OPTIGA TPMs to Support Mission-Critical Applications

Provisioning secure Identity for Microcontroller based IoT Devices

Cipher Suite Configuration Mode Commands

Authenticated Encryption in TLS

Summary on Crypto Primitives and Protocols

Trusted Computing Group

Security. Communication security. System Security

10 th AUTOSAR Open Conference

CS408 Cryptography & Internet Security

Network Security and Cryptography. December Sample Exam Marking Scheme

CSC/ECE 774 Advanced Network Security

ECRYPT II Workshop on Physical Attacks November 27 th, Graz, Austria. Stefan Mangard.

AN12120 A71CH for electronic anticounterfeit protection

Trusted Computing in Drives and Other Peripherals Michael Willett TCG and Seagate 12 Sept TCG Track: SEC 502 1

CSCE 715: Network Systems Security

WAP Security. Helsinki University of Technology S Security of Communication Protocols

Chapter 24 Wireless Network Security

CPSC 467: Cryptography and Computer Security

CSC 774 Network Security

Introduction and Overview. Why CSCI 454/554?

CS Computer Networks 1: Authentication

M2MD Communications Gateway: fast, secure and efficient

IEEE WiMax Security

Automotive Security: Challenges, Standards and Solutions. Alexander Much 12 October 2017

Transcription:

Automotive Security An Overview of Standardization in AUTOSAR Dr. Marcel Wille 31. VDI/VW-Gemeinschaftstagung Automotive Security 21. Oktober 2015, Wolfsburg

Hackers take over steering from smart car driver 2 21. Oktober 2015

Topics 1. Status AUTOSAR 2. Security Features in AUTOSAR Secure on-board communication 3. The AUTOSAR Security Work Package 4. Conclusion and outlook 3 21. Oktober 2015

AUTOSAR Where we are AUTOSAR is the global standard for Automotive SW Architecture. Number of new developments and platforms adopting AUTOSAR is increasing fast More than 200 partners worldwide (July 2015) AUTOSAR is on the road: Millions of ECUs already use AUTOSAR solutions today. 4 21. Oktober 2015

AUTOSAR Partners overview Status: July 2015 5 21. Oktober 2015

AUTOSAR Some numbers Partnership More than 250 persons active in technical workgroups More than 70 companies active in the development of the standard Release 4.2.2 size ~ 19.600 Pages ~ 26.000 Requirements 116 standard specifications 102 auxiliary specifications 6 21. Oktober 2015

Topics 1. Status AUTOSAR 2. Security Features in AUTOSAR Secure on-board communication 3. The AUTOSAR Security Work Package 4. Conclusion and outlook 7 21. Oktober 2015

Selected drivers for security in E/E architectures Importance of security demonstrated by attacks on automotive communication systems Functionalities are more and more distributed over different ECUs within the car Growing need for communication of sensitive content inside the car and to the outside world (cars as part of the internet of things) Communication & access to the car must be protected against manipulation & must ensure authenticity and message freshness to ensure the trust in new features 8 21. Oktober 2015

Supported security features by AUTOSAR 2010 2011 2012 2013 2014 2015 2016 2017 today Release 4.0 Release 4.1 Release 4.2 Release 4.3 Crypto Service Manager Crypto Abstraction Library Crypto Interface? Utilization of Crypto Services Secure on-board communication The standard defines procedures and interfaces to secure on-board communication while secrets, calculation algorithms and configuration of the AUTOSAR security software modules remains in the responsibility of the OEM 9 21. Oktober 2015

Security in the current AUTOSAR software architecture CSM = Crypto Service Manager CAL = Crypto Abstraction Library SecOC = Secure On-board Communication Standardized interface for cryptographic services CSM and CAL define the same cryptographic functionality Support for hardware security modules Secure on-board communication by using APIs provided by CSM or CAL 10 21. Oktober 2015

Crypto Service Manager (CSM) CSM provides access to cryptography services, based on a software library and/or a hardware module ( crypto library ) parallel access to different services possible incorporated crypto libraries provides the implementation of cryptographic routines, e.g. MD5, SHA-1, RSA, AES, Supported cryptographic services: Hash calculation Random number generation Generation and verification of message authentication codes Encryption and decryption using symmetrical algorithms Generation and verification of digital signature Key management operations 11 21. Oktober 2015

Secure On-board Communication Technical solution Security data will be added to the payload: Authentication code to protect the payload - can be truncated Freshness value truncated, transmission is optional Authentication code is created by using payload freshness value and secret key can be generated by symmetric or asymmetric cryptographic algorithms Freshness value is part of the authentication code calculation and prevents replay attacks can either be a simple counter or a time value Freshness value must be synchronized between sender and receiver in a secure way (not part of the standard) Freshness value must never overflow except after the secret keys have been replaced 12 21. Oktober 2015

Secure On-board Communication Validation & security assessment AUTOSAR considers validation as part of concept development process Validation by proof of concept implementation (prototype implementation) Performed by subcontracted BSW vendor Validation covered message authentication (transmission of full and truncated MAC with counter value of different length); Freshness-Counter usage; Propagation of the verification status Security Assessment Performed by independent security experts In scope: cryptographically strong integrity, authentication and anti-replay Out of scope: Key management, attacks on cryptographic algorithms The specified protection mechanisms follow acknowledged best practices regarding the replayprotected authentication of messages Conclusion: Secure On-board Communication features will safeguard against injection, altering, and replay of secure I-PDUs 13 21. Oktober 2015

Topics 1. Status AUTOSAR 2. Security Features in AUTOSAR Secure on-board communication 3. The AUTOSAR Security Work Package 4. Conclusion and outlook 14 21. Oktober 2015

AUTOSAR Work Package for Security (WP-X-SEC) WP-X-SEC started in November 2014 Comprehensive representation of automotive security experts from vehicle manufacturers, suppliers, software stack vendors and semiconductor vendors Motivation Connected vehicle is exposed to security threats Automotive industry must prove itself trustworthy Security is no competitive differentiating feature Higher quality of the security solution when examined and designed by more experts Cost efficiency and improved interoperability between different ECU manufactures Mission Maintain existing standard Identify and incorporate new security measures into AUTOSAR Holistic approach on a secure heterogeneous automotive SW architecture 15 21. Oktober 2015

AUTOSAR Work Package for Security (WP-X-SEC) Working Topics Crypto Interface concept standardization of cryptographic primitives as well as access to security hardware planned to be released with Rel. 4.3 Policy Manager concept Mechanisms, protocols and standardized format to define, configure, update security policies SOTA (Software Over The Air) subgroup security analysis of SOTA use cases Key Management subgroup analysis of all requirements relevant to key management on vehicle side Adaptive AUTOSAR security subgroup security analysis of use cases to be supported with Adaptive AUTOSAR 16 21. Oktober 2015

Topics 1. Status AUTOSAR 2. Security Features in AUTOSAR Secure on-board communication 3. The AUTOSAR Security Work Package 4. Conclusion and outlook 17 21. Oktober 2015

Making the car more secure Towards a secure automotive software architecture Enhance security software architecture e.g. by Crypto Interface concept technology trends like Car-2-X require cryptographic protection by security hardware as well as security software heterogeneous solutions with different proprietary drivers for diverse microcontroller lead to high costs Standardized interface to security hardware and software Security policies Key management Certificate handling 18 21. Oktober 2015

Conclusion AUTOSAR already supports fundamental security mechanisms since Release 4.0 With the latest Release 4.2 the vehicle-internal communication can be protected AUTOSAR Work Package Security is in place to further enhance security features like secure storage of keys or certificate handling in upcoming AUTOSAR releases in order to fully support future trends like Car-2-X or highly automated driving 19 21. Oktober 2015

Thank you for your attention! More Information about AUTOSAR: http://www.autosar.org Become a partner to join Work Package Security and get exploitation rights for the standard: request@autosar.org Published Releases (for information only - see disclaimer) e.g. http://www.autosar.org/specifications/release- 42/software-architecture/system-services http://www.autosar.org/specifications/release-42/softwarearchitecture/communication-stack 20 21. Oktober 2015