Connected Cars & Autonomous Vehicles

Slides:



Advertisements
Similar presentations
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
Advertisements

STOP.THINK.CONNECT™ NATIONAL CYBERSECURITY AWARENESS CAMPAIGN SMALL BUSINESS PRESENTATION.
Autonomous Vehicles in California Stephanie Dougherty Chief of Strategic Planning, California DMV.
1. 2 A Smarter Supply Chain Using Information & Communications Technology to Increase Productivity in the Australian Transport & Logistics Industry Rocky.
Autonomous Vehicles in California Stephanie Dougherty California DMV
Resiliency Rules: 7 Steps for Critical Infrastructure Protection.
Autonomous Vehicles in California Bernard Soriano and Stephanie Dougherty.
Michael Westra, CISSP June BSides Detroit Security Presentation: Vehicle Hacking “If you think technology can solve your security problems, then.
IAEA International Atomic Energy Agency IAEA Nuclear Security Programme Enhancing cybersecurity in nuclear infrastructure TWG-NPPIC – IAEA May 09 – A.
National Cybersecurity Center of Excellence Increasing the deployment and use of standards-based security technologies Mid-Atlantic Federal Lab Consortium.
1 National Highway Traffic Safety Administration An Overview of NHTSAs Vehicle Safety Research Priorities Nathaniel Beuse Associate Administrator, Vehicle.
Connected and Autonomous Vehicles Supply Chain Security
Presented by: Mike Gerdes Director, Information Security Center of Expertise Cybersecurity State of the Union.
Automation & Enhanced Safety
SAS® Viya™ Overview ANDRĖ DE WAAL, GLOBAL ACADEMIC PROGRAM
SAE Cybersecurity Standards Activity
Connected Vehicles in the Internet of Things Presenter
Broadband Challenges 2017 Christopher Tamarin
The Impact of Emerging Technology on Portfolio Risk Management
Increasing Information and Data Security in Today’s Cybersecurity World 2017 Conference Review 6/6/2017.
CYBERSECURITY INCIDENCE IN THE FINANCIAL SERVICES SECTOR March 28, 2017 Presented by Osato Omogiafo Head IT Audit.
LIZ MOODY OPEN UNIVERSITY. LIZ MOODY OPEN UNIVERSITY.
Koji Nakao, Dai Arisue NICT, Japan
ALEX RUNNER Jason Rosselot Sedar labarre Will Farrell Johnson Controls
Information Security – Current Challenges
Autonomous Vehicles in California
Cybersecurity - What’s Next? June 2017
Dimitra Liveri | NIS Expert CSA CEE Summit 2017|Ljubljana - 9 March
Promises and pitfalls of Autonomous vehicles
Security of In-Vehicle Software
Public Facilities and Cyber Security
Bernard C. Soriano, Ph.D. Deputy Director
ASSET - Automotive Software cyber SEcuriTy
CAS-002 Dumps PDF CompTIA Advanced Security Practitioner (CASP) CAS-002 Dumps CompTIA.
CYBERSECURITY FOR AUTONOMOUS VEHICLES
BUILDING A PRIVACY AND SECURITY PROGRAM FOR YOUR NON-PROFIT
Speaker’s Name, SAP Month 00, 2017
HOSTED BY IN PARTNERSHIP WITH SUPPORTED BY Barcelona iCapital 2015.
KEYNOTE STAGE SPONSOR.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Automotive Cybersecurity Market to reach $837.1mn by 2024: Global Market.
Connected Car Market - Global Forecast to 2025.
Michael Nawrocki, Vice President of Technology and Solutions ATIS
SAM GDPR Assessment <Insert partner logo here>
The Vision 2.
Drones and Autonomous Systems
2018 Autonomous Vehicle Summit
An Urgent National Imperative
Qi Alfred Chen, Yucheng Yin, Yiheng Feng, Z. Morley Mao, Henry X
Government Relations Update
Smart Learning concepts to enhance SMART Universities in Africa
Digit as a new rule Clear and honest principles. digital leadership
Cyber security Policy development and implementation
Self Driving Car Market Self Driving Car Market.
Self Driving Car Market Self Driving Car Market.
Network and security practices in automotive systems
The Ottawa AV Ecosystem
The SAFERtec project on V2I security assurance: concept and vision
The Australian Government’s role in the Automated Vehicle environment
Global megatrends (relevant for our business)
Innovation in Railways NTA Ireland
Deborah Housen-Couriel, ADV.
Cybersecurity of Connected and Autonomous Vehicles
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Automotive V2X Market is set.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 In-Vehicle Connectivity Market.
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Connected Trucks Market is.
DIME / ITDG Meeting Luxemburg, 14 Feb 2017
© 2016 Global Market Insights, Inc. USA. All Rights Reserved Fuel Cell Market size worth $25.5bn by 2024 Automotive Operating Systems.
Access to data requirementS
©2018 Graphical Research. All rights reserved. North America Automotive Camera Market growth to outpace at $5bn by 2025: Graphical.
©2018 Graphical Research. All rights reserved. Asia Pacific Autonomous Cars Market Analysis And Segment Forecasts To 2024: Graphical.
Presentation transcript:

Connected Cars & Autonomous Vehicles The current state of Cybersecurity

A presentation given to the Self Driving and Autonomous Vehicle Technology meetup group at the Brighton Digital Catapult on January 20th 2017 Provides high-level overview of issues around cybersecurity of Connected Cars and what automotive industry is doing to address the problem

About your presenter

The story so far … Society of Automotive Engineers: standard SAE J3016 defines classes of vehicle automation

Levels of Vehicle Automation

Technology Timeline Multiple generations of technology will co-exist on our roads for many years.

Recent Highlights SAE J3016 has been formally validated by the US Department of Transport.  Tesla Motors Inc., BMW, Ford Motor Co. and Volvo Cars have all promised to have fully autonomous cars on the road within five years.   Alphabet Inc.’s (Google) autonomous test vehicles will surpass 3 million test miles on public roads by May 2017. China has set a goal for 10-20% of vehicles to be highly autonomous by 2025, and for 10% of cars to be fully self-driving in 2030. Nvidia and Mercedes-Benz announced intention to develop “cognitive car” using embedded AI technology.

Vehicle Cybersecurity: problem description

Attackers have many Faces Criminal gangs intent on: Stealing Personally Identifiable Information (e.g. Credit Card numbers) Deploying “ransomware” State-sponsored actors and politically motivated groups Small-time crooks intent on stealing vehicles “Curiosity driven” attacks (e.g. by car owners) http://opengarages.org/handbook/2014_car_hackers_handbook_compressed.pdf

It’s Complicated Example: the new Ford F150 pickup has 150 million lines of code Each vehicle has multiple Electronic Control Units (ECUs) from different vendors Presents multiple attack points for hackers Complexity is the enemy of security http://www.informationisbeautiful.net/visualizations/million-lines-of-code/

Examples of Risks Unauthorised access to vehicles Keyless door entry systems use mobile apps or electronic key-fobs Theft of personal information Owner details, GPS logs, Credit Card info, etc. ‘Hijacking’ of individual vehicles Feasibility demonstrated by ‘Jeep hack’ (2015) Creation of mobile ‘bots’ Vehicle software compromised by hackers and used to launch cyber-attacks Installation of ‘ransomware’ Victims must pay money to regain control of their vehicles

Threats to Infrastructure Cyber-attacks on infrastructure could cause: Traffic gridlock Economic losses Accidents and loss of life Massive insurance claims Political repercussions Need to think in broad terms Private vehicles Taxis Buses Trams and light rail Pedestrians and cyclists Emergency services vehicles

Vehicle Cybersecurity: emerging solutions

SAE J3061 “Cybersecurity Guidebook for Cyber-Physical Vehicle Systems” – published January 2016 Provides a framework to help organizations Identify and assess cybersecurity threats related to vehicles Design cybersecurity into cyber-physical vehicle systems throughout the entire development lifecycle process. Provides the foundation for further standards development.

OTA Updates “Over-the-air” software updates are crucial part of strategy Already implemented by vendors such as Tesla Motors Needs to be carefully implemented else OTA service can be hacked

Sharing of Expertise Automotive Information Sharing Advisory Centre (Auto-ISAC ) Established by the Auto industry to facilitate development of cybersecurity expertise within Automotive supply chain “An industry-operated environment created to enhance cyber security awareness and coordination across the global automotive industry” Published set of ‘Best Practices’ for automotive cybersecurity in July 2016 https://www.automotiveisac.com/best-practices/

Improve Software Quality Difficult to accurately estimate extent to which software code may deemed ‘buggy’ Perhaps 1 bug in every 1000 lines of code ?? Major initiatives designed to improve software quality NIST 8151 ‘Dramatically Reducing Software Vulnerabilities’ September 2016 General Motors announced recall of 3.6 million vehicles after fear that air-bags may fail to deploy due to software fault. NIST 8151 http://nvlpubs.nist.gov/nistpubs/ir/2016/NIST.IR.8151.pdf

Open Source Activities Open source code Open source hardware Bug Bounty programmes    http://opengarages.org/ index.php/Tools http://commai.blogspot .co.uk https://bugcrowd.com Significant increase in the level of open source activity in the Automotive space Vendors such as Fiat-Chrysler now offer ‘bug bounties’ to developers

Vehicle Cybersecurity: some final thoughts

Need for Holistic View End-to-end Security KEY V2V Vehicle-to-Vehicle V2I Vehicle-to-Infrastructure V2P Vehicle-to-Person Myriad of Stakeholders Phone-to-Car V2V V2I Data Storage Myriad of attack points V2P Data Analytics Back Office Billing Provisioning Operations The Cloud End-to-end Security

Two Distinct Cultures Safety culture Security culture AUTOMOTIVE INDUSTRY Safety culture INFORMATION INDUSTRY Security culture Major challenge to create a unified culture for these two very different industries.

Conclusions Industry has started to address issues of cybersecurity of vehicles Cybersecurity issues for Connected Cars remain poorly understood May take 1-3 years for security countermeasures to find their way into products Fragmented business ecosystem and global supply chains make compliance difficult Legal and regulatory framework lags well behind rate of technology development Risk that high costs may result in cybersecurity being given a lower priority than is required Need to think about cybersecurity from the standpoint of Vehicle Lifecycle ( Initial sale – Resale – End of Life )

Any Questions?