Network and security practices in automotive systems

Slides:



Advertisements
Similar presentations
The Fully Networked Car Geneva, 3-4 March 2010 Security risk analysis approach for on-board vehicle networks 1 Alastair Ruddle Consultant, MIRA Limited.
Advertisements

LAPD TELEMATICS PRESENTATION. Why Consider Telematics? 1. Advanced Vehicle Technology 2. Advanced Wireless Communications 3. New Generation of Police.
Car Hacking Patrick, James, Penny.
Introduction to Cyber Physical Systems Yuping Dong Sep. 21, 2009.
B.RAMAMURTHY UNIVERSITY AT BUFFALO Introduction to Hardware (& Software) 5/30/2013 Amrita-UB-MSES-CSE
Michael Westra, CISSP June BSides Detroit Security Presentation: Vehicle Hacking “If you think technology can solve your security problems, then.
© 2012 IBM Corporation IBM Israel Software Lab (ILSL( Daniel Yellin, Director March 2013.
MOBILE DEVICE SECURITY. WHAT IS MOBILE DEVICE SECURITY? Mobile Devices  Smartphones  Laptops  Tablets  USB Memory  Portable Media Player  Handheld.
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
Safety All The Time Oyuki Ogawa Executive Vice President DENSO CORPORATION.
Computer Science Open Research Questions Adversary models –Define/Formalize adversary models Need to incorporate characteristics of new technologies and.
1 CAR 1 st Dec Core-group on Automotive R&D (CAR) Ministry of Science & Technology, Govt. of India. Constituted by Dr.R. Chidambaram,
Emergency Services Workshop, 21th-24 th of October, Vienna, Austria Page 1 IP-Based Emergency Applications and Services for Next Generation Networks PEACE.
Computer Security By Duncan Hall.
THE RMI ✦ Technology: driving change in the retail motor industry PRESENTED BY JAKKIE OLIVIER CAR CONFERENCE  23 OCTOBER 2013.
CAMPUS LAN DESIGN GUIDE Design Considerations for the High-Performance Campus LAN.
Communication Protocol Engineering Lab. VANET-cloud : a generic cloud computing model for vehicular ad hoc networks IEEE Wireless Communications February.
AUTOMOBILE CYBER SECURITY David McPeak. EVOLUTION IN DESIGN/TECHNOLOGY.
Smart City As Unified Multi-tier IoT Solution. Increased Smart City IQ Generation 1: local management systems (e.g. traffic lights synchronization) Generation.
SCADA Supervisory Control And Data Acquisition Pantech Solutions Here is the key to learn more.
Surveillance and Security Systems Cyber Security Integration.
MarketsandMarkets Presents Automotive Embedded System Market worth 7.41 Billion USD by 2022.
Principles Identified - UK DfT -
Connected Vehicles in the Internet of Things Presenter
CS457 Introduction to Information Security Systems
Who Wants To Be A Safe Communicator?
Fundamentals of Information Systems, Sixth Edition
Koji Nakao, Dai Arisue NICT, Japan
Information & Safety Systems
Objectives Overview Explain why computer literacy is vital to success in today’s world Define the term, computer, and describe the relationship between.
Technology Overdrive Understanding the Security Impact that the Advanced Machinery has throughout Infrastructure of the Car Dr. Barbara L. Ciaramitaro,
Security of In-Vehicle Software
<The Future of IVI and CE Connectivity> Pavel Stankoulov
Components of information systems
Software and Regulation
VANET.
Connected Vehicle Deployment – DfT perspective
    PRODUCT PRESENTATION ON :   INCREASING REVENUE BY USING GLO 3G NETWORK TO SUPPORT REMOTE AUTO DIAGNOSIS AND MANAGEMENT (GLO VEHICLE DIAGNOSIS AND MANAGEMENT)
How SCADA Systems Work?.
Computer Hardware-Meeting the machine
Connected Vehicle Technology
CYBERSECURITY FOR AUTONOMOUS VEHICLES
Hello, Today we will look at cyber security and the Internet of Things and how it could impact our business.
National Mining University
Adaptable safety and security in v2x systems
provided by OICA/CLEPA
Cyber Security & Embedded Systems Training Bootcamp VISIT TONEX.COM.
5G Security Training
Aniket Shah & Alexander Witt
Infotainment (1) General description
Internet of Things Vulnerabilities
Examples of Real-Time and Embedded Systems
Connected and Autonomous Vehicle Cybersecurity Controller Area Network
Internet of Things.
Faculty of Science IT Department By Raz Dara MA.
Sustainable Mobility for Rural Small University Towns
Denial-of-Service Jammer Detector Training Course Worldsensing
Topics in Formal Reasoning for Cyber-Physical Systems
Network and security trends in connected cars
The SAFERtec project on V2I security assurance: concept and vision
Introduction to Hardware
Global megatrends (relevant for our business)
Internet of Things (IoT)
Welcome to The World of Internet of Things
ETSI Contribution to 3rd Meeting of EC Expert Group on RRS
CRYPTA LABS in collaboration with
A proposal for approach to proceed work in Cybersecurity TF
Automotive Infotainment Market Segmentation by Application, Technology, Region, Industry Size, Share, Growth and Demand Forecast.
Lecture 36.
Lecture 36.
Presentation transcript:

Network and security practices in automotive systems Alexios Lekidis alexis.lekidis@forescout.com a.lekidis@tue.nl

Who am I? Senior Researcher at ForeScout Guest Lecturer at the Security Group of the Eindhoven University of Technology Internet of Things (2IMN15) course Programming methods (2IPC0) course Research areas: model-based development / performance evaluation / network monitoring in embedded systems Short Bio Software Architect in ASML’s Metrology department PostDoc in Dependability and Security group, Aristotle University of Thessaloniki PhD in Theoretical Computer Science, University of Grenoble Master in Electrical Engineering , Aristotle University of Thessaloniki Specialization: Electronics and Telecommunications

Today’s topic

Overview The evolution towards connected cars Threats in automotive systems Automotive security: Scope and objectives

Overview The evolution towards connected cars Threats in automotive systems Automotive security: Scope and objectives

Car historical evolution Embedded area: 1995-2002 Infotainment area: 2007-2012 R&D area: 1966-1995 1886 2000 2020

V2X area: 2012-ongoing Embedded area: 1995-2002 Infotainment area: 2007-2012 1886 2005 2020

New mobility area: 2020-onwards V2X area: 2012-ongoing New mobility area: 2020-onwards Embedded area: 1995-2002 Infotainment area: 2007-2012 1886 2005 2020

In-vehicle software complexity Question 2: Does Facebook have more software code than a car?

Why vehicles are getting so complicated? V2X for vehicle communication to everything Road Side Units (RSU) assisting the communication between vehicles Backend server performing traffic management

Vehicle to everything communication scenarios Wireless / Cellular communication Information disseminated to neighbouring vehicles / road stations

What about inside the vehicle? Cars are comprised by one or several Electronic Control Units (ECUs) Each ECU is an networked embedded device with the following components

Challenges in automotive system design In-vehicle systems in a glance Powertrain subsystem : 1) generation of power in the engine 2) transmission and gear control chassis subsystem : In-vehicle active safety (ABS, suspension system ) body subsystem : in-vehicle body / climate control Passive safety subsystem : airbags / seat belt pretensioners telematics subsystem : Infotainment (GPS, CD player) Slide 1: title page Slide 2: project information Slide 3: your future perspective

Overview The evolution towards connected cars Threats in automotive systems Automotive security: Scope and objectives

Is it safe? Buyers demand modern connected infotainment systems Cars are shifting towards being autonomous Additional risks as vehicle interfaces are exposed to possible threats Wireless and cellular connections (e.g. WiFi, 4G) Risk severity increases to automotive software cannot easily be updated No monthly security update

When security threats become safety-related Car = Cyber Physical System (CPS) Vital risks to vehicle passengers Crysler’s Jeep Cherokee CIA’s Vault 7 Smartphone navigation apps Cyber-security threats target add-on features and functionalities of the vehicle target critical in-vehicle components (e.g. engine, breaks)

Ransomware Encrypted individual messages from the ransomware client Vehicle could not start without paying the ransom up to 70% of the ransomware business victims and ~50% of consumer victims actually pay the ransom Total sum roughly $1 billion in 2017

Frequently exploited attack surfaces

Attack motivations Adversaries: Vehicle theft/copy the vehicle’s architectural designs and specifications espionage for tracking and recording sensitive information Car dealers: Suppression of vehicle notifications / avoidance of incurring replacement expenses targeting the safety of the vehicle Nation states, underworld and terror organizations: physical harm and wide-spread damage OBDII unit for in-vehicle diagnostics Interesting fact: Did you know that any car dealer can sell you any car like it’s a new one?

Example attack steps Understand the information that are exchanged Find a vulnerability in the vehicle’s “exposed” interfaces Format the information to be injected to the vehicle in a way that they are handled by the other ECUs Navigate to the ECU the attack is targeted on and interrupt/stop its functionality Transmitted mobility data SenderID Position Speed Heading Addressing details Geographical region

Overview The evolution towards connected cars Threats in automotive systems Automotive security: Scope and objectives

Security in connected cars Objectives: Protecting all communications Protecting each sensor, actuator, microcontroller (MCU), and microprocessor Safely and effectively managing the entire vehicle over the air (OTA) Mitigating advanced threats Standards define cybersecurity practises (e.g. J3061) Are not designed to meet all the objectives Are more guidelines than threat detection and protection mechanisms Instead the questions to be answered by hardware or software security solutions are: How to detect an attack on a vehicle? What should be done once detected?

What we learned so far: Security related to safety Automotive systems contain more in software than any other system Question: Why is automotive security so complex? Answer: Coming up in part 2..