SlideShare a Scribd company logo
1 of 16
TheConnectedcarandSecurity
2016Alan Tatourian
Security Architect, Advanced Driving Technologies, Intel
Founding Member, Automotive Security Review Board (ASRB)
Member, SAE VESS, TCG, and NIST Cyber-Physical Systems Groups
alan.tatourian@intel.com
October 6, 2016
7th Summit on the
Future of the Connected Vehicle
2
Vehicle Architecture Today and Tomorrow
CAN
Gateway
CAN FlexRay . . . . . .
Gateway
EthernetEthernet Ethernet Ethernet Ethernet
Vehicle Connectivity
Vehicle Automation
Data Analytics
Limited but Expanding
(Telematics, Infotainment)
Developing/Immature
(Partial/Semi-Autonomous)
Focus on Vehicle
Performance/Location
Fully Connected Environment
(V2V, V2I, V2X)
Pervasive/Highly Developed
Focus on Consumer
Experience/Personal Data
Current State
Low Complexity
Future State
High Complexity
Risk is increasing and will continue to grow
Where we are Where we are heading
Image credit: Volvo
Image credit: Volvo
3
Connected, Autonomous Car
Cloud Services
Sensing
Planning
Radar, LIDAR Vehicle Platform Navigation
Error
Management
Visualization
Situation AnalysisSituation Awareness
Vision FusionCameras, LIDAR, Radar
…
Data Fusion
LoggingVehicle Control
Localization
Automotive Bus
Traffic Maps
Distributed Services
Source: RTI
4
External Vehicle Connections
V2V
Radio Data
System (RDS)
Mobile
Devices
Electric
Chargers
External systems and
networks support new
services and interactions
… and increase risk.
Ad-Hock
Network
Trusted Network
(e.g. Repair Shop)
Internet
Backbone
Automotive
Company
Application
Center
Local ServiceAP
Untrusted
Network
Local
Service
Open AP
Road Side
Unit (RSU)
3rd Party
Application
Center
ISP
BS
BS
ISP
ISP
Uni-directional Communication
Bi-directional Communication
Access Point (AP)
GPS
4
5
Automotive Security Research
2006 2020
Today
2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016
Security threats to automotive CAN networks —
Practical examples and selected short-term
countermeasures
2008
Comprehensive Experimental
Analyses of Automotive Attack
Surfaces
2011
Script Your Car!
Using existing hardware platforms to
integrate python into your dashboard
2013
A Survey of Remote Automotive
Attack Surfaces
2014
Remote Exploitation of an
Unaltered Passenger Vehicle
2015
CAN Message Injection
2016
State of the Art: Embedding Security in Vehicles
2006
2017 2018 2019
6
What does Security Mean?
Security covers all the processes and mechanisms by which digital equipment, information and services are protected
from unintended or unauthorized access, change or destruction.
 Wikipedia
Existing Definition, also used by NIST
1999 National Academies study “Trust in Cyberspace”
Security research during the past few decades has been based on formal policy models that focus on protecting
information from unauthorized access by specifying which users should have access to data or other system objects. It is
time to challenge this paradigm of “absolute security” and move toward a model built on three axioms of insecurity:
1. insecurity exists;
2. insecurity cannot be destroyed; and
3. insecurity can be moved around’.
7
Response from the Industry
2. SAE J3061 – Cybersecurity Guidebook for Cyber-Physical
Vehicle Systems
a) Enumerate all attack surfaces and conduct threat analysis
b) Reduce Attack Surface
c) Harden hardware and software
d) Security Testing (Penetration, fuzzing, etc.)
1. SAE J3101 – Hardware-Protected Security for Ground
Vehicle Applications
a) Secure Boot
b) Secure Storage
c) Secure Execution Environment
d) Other hardware capabilities…
e) OTA, authentication, detection, recovery mechanisms…
8
V2X
antenn
a
Mobile Devices
ISP
BS
BS
GPS
Electric Chargers
Occupant safety
Surround sensors
Brake control system
Electric power steering
CAN bus
Fast cryptographic performance
Device identification
Isolated execution
(Message) Authentication
Hardware security services that can be used by applications
Platform boot integrity and Chain of Trust
Secure Storage (keys and data)
Secure Communication
Secure Debug
Tamper detection and protection from side channel attacks
Hardware security building blocks
Over-the Air Updates
IDPS / Anomaly Detection
Network enforcement
Certificate Management Services
Antimalware and remote monitoring
Biometrics
Software and Services
Security features in the silicon, for example Memory Scrambling,
Execution Prevention, etc.
Defense in Depth
HardwareRootofTrust
Analog security monitoring under the CPU
Defense in Depth
9
Hardware Security Building Blocks
1. Verified boot
2. Secure Storage (encrypted flash)
3. Trusted Execution Environment (HSM)
4. Cryptographic Acceleration
5. Key Generation
6. Secure Clock
7. Monotonic Counters
8. True RNG
9. Unique device id
10. Secure Debug
11. Physical Tamper Detection and protection against side-channel attacks
Platform boot integrity and Chain of Trust
Secure Storage (keys and data)
Secure Communication
Secure Debug
Tamper detection and protection from side channel attacks
Hardware security building blocks
Defense in Depth
HardwareRootofTrust
10
Software Security Services
Basic Cryptography Key Management Miscellaneous
Hash
 SHA2, SHA3
Key Derivation Function (KDF)
 NIST 800-108
Compression/Decompressi
on
Message Authentication Code (CMAC, HMAC)
 Generation
 Verification
Secure Key and Certificate Storage
 Access Management
 Import/Export Services
 Generation
 Update
Checksum
Signatures
 Generation
 Verification
Key exchange protocols
Random Number Generation
Encryption/Decryption
 Symmetric (CBC, CTR)
 Asymmetric
 ECC (25519, P-256, P-384, P-512, Brainpool)
Secure Clock
 Time stamping
 Validity check for key data
Fast cryptographic performance
Device identification
Isolated execution
(Message) Authentication
Hardware security services that can be used by applications
Defense in Depth
HardwareRootofTrust
11
Evolution of Technology and Security Solutions
1. Interactive computing.
2. Time sharing.
3. User authentication.
4. File sharing via
hierarchical file systems.
5. Prototypes of ‘computer
utilities’.
Emerging
concerns
1. Access controls
2. Passwords
3. Supervisor state
Security
Technologies
1960s
1. Packet networks
(ARPANET)
2. Local networks (LANs)
3. Communication secrecy
and authentication
4. Object-oriented design
5. Multilevel security
6. Mathematical models of
security
7. Provably secure systems
1. Public key cryptography
2. Cryptographic protocols
3. Cryptographic hashes
4. Security verification
1. Adoption of TCP/IP
protocols for the
Internet
2. Exponential growth of
Internet
3. Proliferation of PCs and
workstations
4. Client-server model for
network services
5. Viruses, worms, Trojans,
and other forms of
malware
6. Buffer overflow attacks
1. Malware detection
(antivirus)
2. Intrusion detection
3. Firewalls
1. World Wide Web
2. Browsers
3. Commercial
transactions
4. Data repositories and
breaches
5. Portable apps and
scripts
6. Internet fraud
7. Web-based attacks
8. Social engineering and
phishing attacks
9. Peer-to-peer (P2P)
Networks
1. Virtual private networks
(VPNs)
2. Public-key
infrastructure (PKI)
3. Secure web connections
(SSL/TLS)
4. Biometrics
5. 2-factor authentication
6. Confinement (virtual
machines, sandboxes)
1. Botnets
2. Denial-of-service attacks
3. Wireless networks
4. Cloud platforms
5. Massive data breaches
6. Ransomware
7. Malicious adware
8. Internet of things
9. Surveillance
10. Cyber warfare
1. Secure coding and
development processes
2. Threat intelligence and
sharing
3. Adware blocking
4. Denial-of-service
mitigation
5. WiFi security
1970s 1980s 1990s 2000s
12
The Evolution of Malware
1980 1985 1990 1995 2000 2005
Source: escrypt
Increasing digitalization and
digital integration
Security
Escalation:
Hypothetical vulnerabilities
identified
Security threats become
relevant in practice
Regular security breaches
with severe damages
Auto
ICS
Mobile Phones
PC
Servers
ICS-CERT
(2008)
20152010 2020
???
CAESS
(2010)
GSM Interface
Exploit (2015)
Stuxnet and Duqu
(2010/11)
German Steel
Plant (2014)
AS/1 Card
Cracking (2009)
IMSI Catcher, NSA
iBanking (2014)
Cabir, Premium
SMS Fraud (2008)
DOS via SMS
DoCaMo (2008)
I Love You
(2010)
Heart Bleed
(2014)
Sasser
(2004)
Melissa
(1999)
Michelangelo
(1992)
Leandro
(1993)
Brain
(1986)
F. Cohen
(1981)
Confliker
(2008)
NSA, PRISM Reign
(2014)
SQL Slammer
(2003)
Code Red
(2001)
Morris Worm
(1988)
Tribe Flood DDOS
(1998)
CCC BTX Hack
(1984)
Creeper
(1971)
13
Need for new Thinking about Security
Every 30 years there is a new wave of things that computers do. Around 1950 they began to model events in the world (simulation), and around 1980 to
connect people (communication). Since 2010 they have begun to engage with the physical world in a non-trivial way (embodiment – giving them bodies).
Butler Lampson, Microsoft Research
Emerging
concerns
Security
Technologies
Attacks against Cyber-Physical Systems (CPS):
1. Autonomous vehicles
2. Smart communities
3. Aviation and transportation
4. Robots
5. Drones
6. Infrastructure
1. Self-adaptive Systems which can evaluate and modify
their own behavior to improve efficiency, and which
can self-heal.
2. Multi-agent Systems, a loosely coupled network of
software agents that interact to solve problems, are
resilient and partition tolerant.
3. Artificial Intelligence (Genetic Algorithms)
2010/2020s
14
Summary
1. Absolutely secure systems are impossible, with enough money and commitment
any system can be broken
2. Assume your system is compromised and build it so that it can recover
15
Thank you!
15
Alan Tatourian
Security Architect, Advanced Driving Technologies, Intel
Founding Member, Automotive Security Review Board (ASRB)
Member, SAE VESS, TCG, and NIST Cyber-Physical Systems Groups
alan.tatourian@intel.com
Automotive security (cvta)

More Related Content

What's hot

Industry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseIndustry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseBryan Len
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 James Nesbitt
 
Field-to-Cloud Technology Building Blocks enabling a Sports Medical Solution....
Field-to-Cloud Technology Building Blocks enabling a Sports Medical Solution....Field-to-Cloud Technology Building Blocks enabling a Sports Medical Solution....
Field-to-Cloud Technology Building Blocks enabling a Sports Medical Solution....Eurotech
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]Ian Skerrett
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeBlock Armour
 
IoT Acceleration Secrets
IoT Acceleration SecretsIoT Acceleration Secrets
IoT Acceleration SecretsEurotech
 
Managing Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned AircraftManaging Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned AircraftReal-Time Innovations (RTI)
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015Eurotech
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT GatewayEurotech
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksPriyanka Aash
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsurancePriyanka Aash
 
Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Ian Skerrett
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd Iaetsd
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHBlock Armour
 
Connecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesConnecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesAlcatel-Lucent Enterprise
 
Wearables and IoT Strategy
Wearables and IoT StrategyWearables and IoT Strategy
Wearables and IoT StrategyAllSeen Alliance
 

What's hot (20)

Industry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseIndustry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training Course
 
Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015 Industrial Control Cyber Security Europe 2015
Industrial Control Cyber Security Europe 2015
 
Field-to-Cloud Technology Building Blocks enabling a Sports Medical Solution....
Field-to-Cloud Technology Building Blocks enabling a Sports Medical Solution....Field-to-Cloud Technology Building Blocks enabling a Sports Medical Solution....
Field-to-Cloud Technology Building Blocks enabling a Sports Medical Solution....
 
Eclipse IOT [IoT World Santa Clara]
Eclipse IOT  [IoT World Santa Clara]Eclipse IOT  [IoT World Santa Clara]
Eclipse IOT [IoT World Santa Clara]
 
Next-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space AgeNext-generation Zero Trust Cybersecurity for the Space Age
Next-generation Zero Trust Cybersecurity for the Space Age
 
IT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOsIT vs. OT: ICS Cyber Security in TSOs
IT vs. OT: ICS Cyber Security in TSOs
 
IoT Acceleration Secrets
IoT Acceleration SecretsIoT Acceleration Secrets
IoT Acceleration Secrets
 
Managing Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned AircraftManaging Avionics Safety Certification for Unmanned Aircraft
Managing Avionics Safety Certification for Unmanned Aircraft
 
IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015IoT Security in Action - Boston Sept 2015
IoT Security in Action - Boston Sept 2015
 
IGS-5227-6MT Industrial Managed Ethernet Switch
IGS-5227-6MT Industrial Managed Ethernet Switch IGS-5227-6MT Industrial Managed Ethernet Switch
IGS-5227-6MT Industrial Managed Ethernet Switch
 
Kura M2M IoT Gateway
Kura M2M IoT GatewayKura M2M IoT Gateway
Kura M2M IoT Gateway
 
Industrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & FrameworksIndustrial IoT Security Standards & Frameworks
Industrial IoT Security Standards & Frameworks
 
Reference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- InsuranceReference Security Architecture for Mobility- Insurance
Reference Security Architecture for Mobility- Insurance
 
EENA 2021: Critical communications (2/6)
EENA 2021: Critical communications (2/6)EENA 2021: Critical communications (2/6)
EENA 2021: Critical communications (2/6)
 
Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0Eclipse IoT for Industry 4.0
Eclipse IoT for Industry 4.0
 
Iaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systemsIaetsd zigbee for vehicular communication systems
Iaetsd zigbee for vehicular communication systems
 
Solution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFHSolution: Block Armour Secure Remote Access for WFH
Solution: Block Armour Secure Remote Access for WFH
 
Connecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's UniversitiesConnecting the Digital Campus - Building Tomorrow's Universities
Connecting the Digital Campus - Building Tomorrow's Universities
 
Wearables and IoT Strategy
Wearables and IoT StrategyWearables and IoT Strategy
Wearables and IoT Strategy
 
6. mr. sastry vns idrbt
6. mr. sastry   vns idrbt6. mr. sastry   vns idrbt
6. mr. sastry vns idrbt
 

Viewers also liked

20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"Alexander Much
 
Red Bend Software: Optimizing the User Experience with Over-the-Air Updates
Red Bend Software: Optimizing the User Experience with Over-the-Air UpdatesRed Bend Software: Optimizing the User Experience with Over-the-Air Updates
Red Bend Software: Optimizing the User Experience with Over-the-Air UpdatesRed Bend Software
 
IoT Seminar (Oct. 2016) Tao Lin - Movimento Group
IoT Seminar (Oct. 2016) Tao Lin - Movimento GroupIoT Seminar (Oct. 2016) Tao Lin - Movimento Group
IoT Seminar (Oct. 2016) Tao Lin - Movimento GroupOpen Mobile Alliance
 
Over-the-air (OTA) updates and the Connected car
Over-the-air (OTA) updates and the Connected carOver-the-air (OTA) updates and the Connected car
Over-the-air (OTA) updates and the Connected carPratik Desai, PhD
 
HARMAN Corporate Deck
HARMAN Corporate DeckHARMAN Corporate Deck
HARMAN Corporate DeckDvir Reznik
 
Vector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_en
Vector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_enVector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_en
Vector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_enRed Bend Software
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...CA API Management
 
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Luis Noguera
 
Los países más saludables
Los países más saludablesLos países más saludables
Los países más saludablesLuis Noguera
 
Decreto sobre renovación de transporte.
Decreto sobre renovación de transporte.Decreto sobre renovación de transporte.
Decreto sobre renovación de transporte.Luis Noguera
 
Informe de gestión de Horacio Cartes
Informe de gestión de Horacio CartesInforme de gestión de Horacio Cartes
Informe de gestión de Horacio CartesLuis Noguera
 
25 años de la economía del Paraguay
25 años de la economía del Paraguay25 años de la economía del Paraguay
25 años de la economía del ParaguayLuis Noguera
 
Event Imaging Solution India Opportunity by Abhinava Mishra
Event Imaging Solution India Opportunity by Abhinava MishraEvent Imaging Solution India Opportunity by Abhinava Mishra
Event Imaging Solution India Opportunity by Abhinava MishraAbhinava Mishra
 
Paquetes para vacaciones de invierno.
Paquetes para vacaciones de invierno. Paquetes para vacaciones de invierno.
Paquetes para vacaciones de invierno. Luis Noguera
 
Business Continuity & Disaster Recovery Planning
Business Continuity & Disaster Recovery PlanningBusiness Continuity & Disaster Recovery Planning
Business Continuity & Disaster Recovery PlanningArpitaThakur
 
Beyond Zero: Solar Value
Beyond Zero: Solar ValueBeyond Zero: Solar Value
Beyond Zero: Solar Valuem0dern1
 
Reporte de tecnología de información
Reporte de tecnología de informaciónReporte de tecnología de información
Reporte de tecnología de informaciónLuis Noguera
 

Viewers also liked (20)

20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
20160914 EuroSPI: "Automotive Security: Challenges, Standards and Solutions"
 
Red Bend Software: Optimizing the User Experience with Over-the-Air Updates
Red Bend Software: Optimizing the User Experience with Over-the-Air UpdatesRed Bend Software: Optimizing the User Experience with Over-the-Air Updates
Red Bend Software: Optimizing the User Experience with Over-the-Air Updates
 
IoT Seminar (Oct. 2016) Tao Lin - Movimento Group
IoT Seminar (Oct. 2016) Tao Lin - Movimento GroupIoT Seminar (Oct. 2016) Tao Lin - Movimento Group
IoT Seminar (Oct. 2016) Tao Lin - Movimento Group
 
Over-the-air (OTA) updates and the Connected car
Over-the-air (OTA) updates and the Connected carOver-the-air (OTA) updates and the Connected car
Over-the-air (OTA) updates and the Connected car
 
HARMAN Corporate Deck
HARMAN Corporate DeckHARMAN Corporate Deck
HARMAN Corporate Deck
 
Vector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_en
Vector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_enVector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_en
Vector red bend_webinar_flashing_over_the_air_and_delta_technology_20140121_en
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 
Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo. Índice de software sin licencia en el mundo.
Índice de software sin licencia en el mundo.
 
Los países más saludables
Los países más saludablesLos países más saludables
Los países más saludables
 
Decreto sobre renovación de transporte.
Decreto sobre renovación de transporte.Decreto sobre renovación de transporte.
Decreto sobre renovación de transporte.
 
Informe de gestión de Horacio Cartes
Informe de gestión de Horacio CartesInforme de gestión de Horacio Cartes
Informe de gestión de Horacio Cartes
 
25 años de la economía del Paraguay
25 años de la economía del Paraguay25 años de la economía del Paraguay
25 años de la economía del Paraguay
 
Event Imaging Solution India Opportunity by Abhinava Mishra
Event Imaging Solution India Opportunity by Abhinava MishraEvent Imaging Solution India Opportunity by Abhinava Mishra
Event Imaging Solution India Opportunity by Abhinava Mishra
 
Crowdsourcing
Crowdsourcing Crowdsourcing
Crowdsourcing
 
Paquetes para vacaciones de invierno.
Paquetes para vacaciones de invierno. Paquetes para vacaciones de invierno.
Paquetes para vacaciones de invierno.
 
Business Continuity & Disaster Recovery Planning
Business Continuity & Disaster Recovery PlanningBusiness Continuity & Disaster Recovery Planning
Business Continuity & Disaster Recovery Planning
 
Beyond Zero: Solar Value
Beyond Zero: Solar ValueBeyond Zero: Solar Value
Beyond Zero: Solar Value
 
Apron divas
Apron divasApron divas
Apron divas
 
Reporte de tecnología de información
Reporte de tecnología de informaciónReporte de tecnología de información
Reporte de tecnología de información
 
Virtual World
Virtual WorldVirtual World
Virtual World
 

Similar to Automotive security (cvta)

Autonomous driving end-to-end security architecture
Autonomous driving end-to-end security architectureAutonomous driving end-to-end security architecture
Autonomous driving end-to-end security architectureAndrei Kholodnyi
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systemsAlan Tatourian
 
Understanding the Threat Landscape by SOPHOS
Understanding the Threat Landscape by SOPHOSUnderstanding the Threat Landscape by SOPHOS
Understanding the Threat Landscape by SOPHOSNetpluz Asia Pte Ltd
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?Alan Tatourian
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Ahmed Mohamed Mahmoud
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesMadhur Gupta
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Jason Shen
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaAndy Shutka
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011Arjun V
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursDilum Bandara
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtityAhmed Sallam
 
Right-sized security for IoT - ARM
Right-sized security for IoT - ARMRight-sized security for IoT - ARM
Right-sized security for IoT - ARMPhil Hughes
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securitypptSachin Roy
 
Mobile application security and threat modeling
Mobile application security and threat modelingMobile application security and threat modeling
Mobile application security and threat modelingShantanu Mitra
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityEryk Budi Pratama
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64Chema Alonso
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaAngeloluca Barba
 

Similar to Automotive security (cvta) (20)

Autonomous driving end-to-end security architecture
Autonomous driving end-to-end security architectureAutonomous driving end-to-end security architecture
Autonomous driving end-to-end security architecture
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 
Understanding the Threat Landscape by SOPHOS
Understanding the Threat Landscape by SOPHOSUnderstanding the Threat Landscape by SOPHOS
Understanding the Threat Landscape by SOPHOS
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?
 
Internet of things security "Hardware Security"
Internet of things security "Hardware Security"Internet of things security "Hardware Security"
Internet of things security "Hardware Security"
 
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
 
Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009Stanford Cybersecurity January 2009
Stanford Cybersecurity January 2009
 
IoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfuaIoT security-arrow-roadshow #iotconfua
IoT security-arrow-roadshow #iotconfua
 
Information Security Business Middle East 2011
Information Security Business   Middle East 2011Information Security Business   Middle East 2011
Information Security Business Middle East 2011
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
Big data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is YoursBig data, Security, or Privacy in IoT: Choice is Yours
Big data, Security, or Privacy in IoT: Choice is Yours
 
Cyber tooth briefing
Cyber tooth briefingCyber tooth briefing
Cyber tooth briefing
 
The new era of mega trends securtity
The new era of mega trends securtityThe new era of mega trends securtity
The new era of mega trends securtity
 
Right-sized security for IoT - ARM
Right-sized security for IoT - ARMRight-sized security for IoT - ARM
Right-sized security for IoT - ARM
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securityppt
 
Mobile application security and threat modeling
Mobile application security and threat modelingMobile application security and threat modeling
Mobile application security and threat modeling
 
Network Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information SecurityNetwork Security - Defense Through Layered Information Security
Network Security - Defense Through Layered Information Security
 
Trends in network security feinstein - informatica64
Trends in network security   feinstein - informatica64Trends in network security   feinstein - informatica64
Trends in network security feinstein - informatica64
 
Iot Security
Iot SecurityIot Security
Iot Security
 
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca BarbaEvolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
 

More from Alan Tatourian

Systems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasisSystems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasisAlan Tatourian
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsAlan Tatourian
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive softwareAlan Tatourian
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive softwareAlan Tatourian
 
Securing future connected vehicles and infrastructure
Securing future connected vehicles and infrastructureSecuring future connected vehicles and infrastructure
Securing future connected vehicles and infrastructureAlan Tatourian
 
Functional Safety and Security process alignment
Functional Safety and Security process alignmentFunctional Safety and Security process alignment
Functional Safety and Security process alignmentAlan Tatourian
 
High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systemsAlan Tatourian
 

More from Alan Tatourian (7)

Systems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasisSystems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasis
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
 
Securing future connected vehicles and infrastructure
Securing future connected vehicles and infrastructureSecuring future connected vehicles and infrastructure
Securing future connected vehicles and infrastructure
 
Functional Safety and Security process alignment
Functional Safety and Security process alignmentFunctional Safety and Security process alignment
Functional Safety and Security process alignment
 
High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systems
 

Recently uploaded

Innovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC TechnologyInnovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC Technologyquickpartslimitlessm
 
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGERUNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGERDineshKumar4165
 
Transformative journey for Automotive Components Manufacturers- D&V Business ...
Transformative journey for Automotive Components Manufacturers- D&V Business ...Transformative journey for Automotive Components Manufacturers- D&V Business ...
Transformative journey for Automotive Components Manufacturers- D&V Business ...D&V Business Consulting
 
Delhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024AHOhOops1
 
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home DeliveryCall me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home DeliveryPooja Nehwal
 
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...Hot Call Girls In Sector 58 (Noida)
 
Rockwell Automation 2711R PanelView 800 HMI
Rockwell Automation 2711R PanelView 800 HMIRockwell Automation 2711R PanelView 800 HMI
Rockwell Automation 2711R PanelView 800 HMIAsteam Techno
 
VIP Mumbai Call Girls Thakur village Just Call 9920874524 with A/C Room Cash ...
VIP Mumbai Call Girls Thakur village Just Call 9920874524 with A/C Room Cash ...VIP Mumbai Call Girls Thakur village Just Call 9920874524 with A/C Room Cash ...
VIP Mumbai Call Girls Thakur village Just Call 9920874524 with A/C Room Cash ...Garima Khatri
 
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂Hot Call Girls In Sector 58 (Noida)
 
What Causes BMW Chassis Stabilization Malfunction Warning To Appear
What Causes BMW Chassis Stabilization Malfunction Warning To AppearWhat Causes BMW Chassis Stabilization Malfunction Warning To Appear
What Causes BMW Chassis Stabilization Malfunction Warning To AppearJCL Automotive
 
UNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
UNIT-1-VEHICLE STRUCTURE AND ENGINES.pptUNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
UNIT-1-VEHICLE STRUCTURE AND ENGINES.pptDineshKumar4165
 
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...shivangimorya083
 
Crash Vehicle Emergency Rescue Slideshow.ppt
Crash Vehicle Emergency Rescue Slideshow.pptCrash Vehicle Emergency Rescue Slideshow.ppt
Crash Vehicle Emergency Rescue Slideshow.pptVlademirGebDubouzet1
 
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHERUNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHERunosafeads
 
83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar
83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar
83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagardollysharma2066
 
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 

Recently uploaded (20)

Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...
Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...
Indian Downtown Call Girls # 00971528903066 # Indian Call Girls In Downtown D...
 
Innovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC TechnologyInnovating Manufacturing with CNC Technology
Innovating Manufacturing with CNC Technology
 
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGERUNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
UNIT-II-ENGINE AUXILIARY SYSTEMS &TURBOCHARGER
 
Transformative journey for Automotive Components Manufacturers- D&V Business ...
Transformative journey for Automotive Components Manufacturers- D&V Business ...Transformative journey for Automotive Components Manufacturers- D&V Business ...
Transformative journey for Automotive Components Manufacturers- D&V Business ...
 
Delhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls East Of Kailash 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call Girls in Shri Niwas Puri Delhi 💯Call Us 🔝9953056974🔝
Call Girls in  Shri Niwas Puri  Delhi 💯Call Us 🔝9953056974🔝Call Girls in  Shri Niwas Puri  Delhi 💯Call Us 🔝9953056974🔝
Call Girls in Shri Niwas Puri Delhi 💯Call Us 🔝9953056974🔝
 
GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024GREEN VEHICLES the kids picture show 2024
GREEN VEHICLES the kids picture show 2024
 
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home DeliveryCall me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
 
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
꧁ ୨⎯Call Girls In Ashok Vihar, New Delhi **✿❀7042364481❀✿**Escorts ServiCes C...
 
Rockwell Automation 2711R PanelView 800 HMI
Rockwell Automation 2711R PanelView 800 HMIRockwell Automation 2711R PanelView 800 HMI
Rockwell Automation 2711R PanelView 800 HMI
 
VIP Mumbai Call Girls Thakur village Just Call 9920874524 with A/C Room Cash ...
VIP Mumbai Call Girls Thakur village Just Call 9920874524 with A/C Room Cash ...VIP Mumbai Call Girls Thakur village Just Call 9920874524 with A/C Room Cash ...
VIP Mumbai Call Girls Thakur village Just Call 9920874524 with A/C Room Cash ...
 
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
꧁༒☬ 7042364481 (Call Girl) In Dwarka Delhi Escort Service In Delhi Ncr☬༒꧂
 
What Causes BMW Chassis Stabilization Malfunction Warning To Appear
What Causes BMW Chassis Stabilization Malfunction Warning To AppearWhat Causes BMW Chassis Stabilization Malfunction Warning To Appear
What Causes BMW Chassis Stabilization Malfunction Warning To Appear
 
UNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
UNIT-1-VEHICLE STRUCTURE AND ENGINES.pptUNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
UNIT-1-VEHICLE STRUCTURE AND ENGINES.ppt
 
Call Girls In Kirti Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Kirti Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICECall Girls In Kirti Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
Call Girls In Kirti Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SERVICE
 
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...Russian  Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
Russian Call Girls Delhi Indirapuram {9711199171} Aarvi Gupta ✌️Independent ...
 
Crash Vehicle Emergency Rescue Slideshow.ppt
Crash Vehicle Emergency Rescue Slideshow.pptCrash Vehicle Emergency Rescue Slideshow.ppt
Crash Vehicle Emergency Rescue Slideshow.ppt
 
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHERUNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
UNOSAFE ELEVATOR PRIVATE LTD BANGALORE BROUCHER
 
83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar
83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar
83778-77756 ( HER.SELF ) Brings Call Girls In Laxmi Nagar
 
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 

Automotive security (cvta)

  • 1. TheConnectedcarandSecurity 2016Alan Tatourian Security Architect, Advanced Driving Technologies, Intel Founding Member, Automotive Security Review Board (ASRB) Member, SAE VESS, TCG, and NIST Cyber-Physical Systems Groups alan.tatourian@intel.com October 6, 2016 7th Summit on the Future of the Connected Vehicle
  • 2. 2 Vehicle Architecture Today and Tomorrow CAN Gateway CAN FlexRay . . . . . . Gateway EthernetEthernet Ethernet Ethernet Ethernet Vehicle Connectivity Vehicle Automation Data Analytics Limited but Expanding (Telematics, Infotainment) Developing/Immature (Partial/Semi-Autonomous) Focus on Vehicle Performance/Location Fully Connected Environment (V2V, V2I, V2X) Pervasive/Highly Developed Focus on Consumer Experience/Personal Data Current State Low Complexity Future State High Complexity Risk is increasing and will continue to grow Where we are Where we are heading Image credit: Volvo Image credit: Volvo
  • 3. 3 Connected, Autonomous Car Cloud Services Sensing Planning Radar, LIDAR Vehicle Platform Navigation Error Management Visualization Situation AnalysisSituation Awareness Vision FusionCameras, LIDAR, Radar … Data Fusion LoggingVehicle Control Localization Automotive Bus Traffic Maps Distributed Services Source: RTI
  • 4. 4 External Vehicle Connections V2V Radio Data System (RDS) Mobile Devices Electric Chargers External systems and networks support new services and interactions … and increase risk. Ad-Hock Network Trusted Network (e.g. Repair Shop) Internet Backbone Automotive Company Application Center Local ServiceAP Untrusted Network Local Service Open AP Road Side Unit (RSU) 3rd Party Application Center ISP BS BS ISP ISP Uni-directional Communication Bi-directional Communication Access Point (AP) GPS 4
  • 5. 5 Automotive Security Research 2006 2020 Today 2006 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 Security threats to automotive CAN networks — Practical examples and selected short-term countermeasures 2008 Comprehensive Experimental Analyses of Automotive Attack Surfaces 2011 Script Your Car! Using existing hardware platforms to integrate python into your dashboard 2013 A Survey of Remote Automotive Attack Surfaces 2014 Remote Exploitation of an Unaltered Passenger Vehicle 2015 CAN Message Injection 2016 State of the Art: Embedding Security in Vehicles 2006 2017 2018 2019
  • 6. 6 What does Security Mean? Security covers all the processes and mechanisms by which digital equipment, information and services are protected from unintended or unauthorized access, change or destruction.  Wikipedia Existing Definition, also used by NIST 1999 National Academies study “Trust in Cyberspace” Security research during the past few decades has been based on formal policy models that focus on protecting information from unauthorized access by specifying which users should have access to data or other system objects. It is time to challenge this paradigm of “absolute security” and move toward a model built on three axioms of insecurity: 1. insecurity exists; 2. insecurity cannot be destroyed; and 3. insecurity can be moved around’.
  • 7. 7 Response from the Industry 2. SAE J3061 – Cybersecurity Guidebook for Cyber-Physical Vehicle Systems a) Enumerate all attack surfaces and conduct threat analysis b) Reduce Attack Surface c) Harden hardware and software d) Security Testing (Penetration, fuzzing, etc.) 1. SAE J3101 – Hardware-Protected Security for Ground Vehicle Applications a) Secure Boot b) Secure Storage c) Secure Execution Environment d) Other hardware capabilities… e) OTA, authentication, detection, recovery mechanisms…
  • 8. 8 V2X antenn a Mobile Devices ISP BS BS GPS Electric Chargers Occupant safety Surround sensors Brake control system Electric power steering CAN bus Fast cryptographic performance Device identification Isolated execution (Message) Authentication Hardware security services that can be used by applications Platform boot integrity and Chain of Trust Secure Storage (keys and data) Secure Communication Secure Debug Tamper detection and protection from side channel attacks Hardware security building blocks Over-the Air Updates IDPS / Anomaly Detection Network enforcement Certificate Management Services Antimalware and remote monitoring Biometrics Software and Services Security features in the silicon, for example Memory Scrambling, Execution Prevention, etc. Defense in Depth HardwareRootofTrust Analog security monitoring under the CPU Defense in Depth
  • 9. 9 Hardware Security Building Blocks 1. Verified boot 2. Secure Storage (encrypted flash) 3. Trusted Execution Environment (HSM) 4. Cryptographic Acceleration 5. Key Generation 6. Secure Clock 7. Monotonic Counters 8. True RNG 9. Unique device id 10. Secure Debug 11. Physical Tamper Detection and protection against side-channel attacks Platform boot integrity and Chain of Trust Secure Storage (keys and data) Secure Communication Secure Debug Tamper detection and protection from side channel attacks Hardware security building blocks Defense in Depth HardwareRootofTrust
  • 10. 10 Software Security Services Basic Cryptography Key Management Miscellaneous Hash  SHA2, SHA3 Key Derivation Function (KDF)  NIST 800-108 Compression/Decompressi on Message Authentication Code (CMAC, HMAC)  Generation  Verification Secure Key and Certificate Storage  Access Management  Import/Export Services  Generation  Update Checksum Signatures  Generation  Verification Key exchange protocols Random Number Generation Encryption/Decryption  Symmetric (CBC, CTR)  Asymmetric  ECC (25519, P-256, P-384, P-512, Brainpool) Secure Clock  Time stamping  Validity check for key data Fast cryptographic performance Device identification Isolated execution (Message) Authentication Hardware security services that can be used by applications Defense in Depth HardwareRootofTrust
  • 11. 11 Evolution of Technology and Security Solutions 1. Interactive computing. 2. Time sharing. 3. User authentication. 4. File sharing via hierarchical file systems. 5. Prototypes of ‘computer utilities’. Emerging concerns 1. Access controls 2. Passwords 3. Supervisor state Security Technologies 1960s 1. Packet networks (ARPANET) 2. Local networks (LANs) 3. Communication secrecy and authentication 4. Object-oriented design 5. Multilevel security 6. Mathematical models of security 7. Provably secure systems 1. Public key cryptography 2. Cryptographic protocols 3. Cryptographic hashes 4. Security verification 1. Adoption of TCP/IP protocols for the Internet 2. Exponential growth of Internet 3. Proliferation of PCs and workstations 4. Client-server model for network services 5. Viruses, worms, Trojans, and other forms of malware 6. Buffer overflow attacks 1. Malware detection (antivirus) 2. Intrusion detection 3. Firewalls 1. World Wide Web 2. Browsers 3. Commercial transactions 4. Data repositories and breaches 5. Portable apps and scripts 6. Internet fraud 7. Web-based attacks 8. Social engineering and phishing attacks 9. Peer-to-peer (P2P) Networks 1. Virtual private networks (VPNs) 2. Public-key infrastructure (PKI) 3. Secure web connections (SSL/TLS) 4. Biometrics 5. 2-factor authentication 6. Confinement (virtual machines, sandboxes) 1. Botnets 2. Denial-of-service attacks 3. Wireless networks 4. Cloud platforms 5. Massive data breaches 6. Ransomware 7. Malicious adware 8. Internet of things 9. Surveillance 10. Cyber warfare 1. Secure coding and development processes 2. Threat intelligence and sharing 3. Adware blocking 4. Denial-of-service mitigation 5. WiFi security 1970s 1980s 1990s 2000s
  • 12. 12 The Evolution of Malware 1980 1985 1990 1995 2000 2005 Source: escrypt Increasing digitalization and digital integration Security Escalation: Hypothetical vulnerabilities identified Security threats become relevant in practice Regular security breaches with severe damages Auto ICS Mobile Phones PC Servers ICS-CERT (2008) 20152010 2020 ??? CAESS (2010) GSM Interface Exploit (2015) Stuxnet and Duqu (2010/11) German Steel Plant (2014) AS/1 Card Cracking (2009) IMSI Catcher, NSA iBanking (2014) Cabir, Premium SMS Fraud (2008) DOS via SMS DoCaMo (2008) I Love You (2010) Heart Bleed (2014) Sasser (2004) Melissa (1999) Michelangelo (1992) Leandro (1993) Brain (1986) F. Cohen (1981) Confliker (2008) NSA, PRISM Reign (2014) SQL Slammer (2003) Code Red (2001) Morris Worm (1988) Tribe Flood DDOS (1998) CCC BTX Hack (1984) Creeper (1971)
  • 13. 13 Need for new Thinking about Security Every 30 years there is a new wave of things that computers do. Around 1950 they began to model events in the world (simulation), and around 1980 to connect people (communication). Since 2010 they have begun to engage with the physical world in a non-trivial way (embodiment – giving them bodies). Butler Lampson, Microsoft Research Emerging concerns Security Technologies Attacks against Cyber-Physical Systems (CPS): 1. Autonomous vehicles 2. Smart communities 3. Aviation and transportation 4. Robots 5. Drones 6. Infrastructure 1. Self-adaptive Systems which can evaluate and modify their own behavior to improve efficiency, and which can self-heal. 2. Multi-agent Systems, a loosely coupled network of software agents that interact to solve problems, are resilient and partition tolerant. 3. Artificial Intelligence (Genetic Algorithms) 2010/2020s
  • 14. 14 Summary 1. Absolutely secure systems are impossible, with enough money and commitment any system can be broken 2. Assume your system is compromised and build it so that it can recover
  • 15. 15 Thank you! 15 Alan Tatourian Security Architect, Advanced Driving Technologies, Intel Founding Member, Automotive Security Review Board (ASRB) Member, SAE VESS, TCG, and NIST Cyber-Physical Systems Groups alan.tatourian@intel.com

Editor's Notes

  1. In Greek mythology Sisyphus was punished for his self-aggrandizing craftiness and deceitfulness by being forced to roll an immense boulder up a hill, only to have it roll back down; repeating this action for eternity.
  2. Complexity Up to 100 million lines of code, 30 million for the multimedia system 25 - 200 microprocessors (~100 ECUs) Intel produces IVI, Telematics Dongle, and now ADAS Recent high-end luxury car ECU connections: 10 for FlexRay, 73 for CAN and 61 for LIN Base vehicles employ 1,376 wires with a total length of 2,474 meters. A fully optioned vehicle requires 2,385 wires, with a total length of 4,293 meters (2.66 miles). 500 LEDs are deployed, no light bulbs 100 motors in the interior
  3. VW Wiring Diagram 1969 2006 Research Article State of the Art: Embedding Security in Vehicles By Marko Wolf, Andre Weimerskirch, and Thomas Wollinger http://www.jes.eurasipjournals.com/content/pdf/1687-3963-2007-074706.pdf   2008 Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures By Tobias Hoppe, Stefan Kiltz, and Jana Dittmann http://www.cse.msu.edu/~cse435/Handouts/CSE435-Security-Automotive/CAN-Security-CounterMeasures.pdf   2011 Comprehensive Experimental Analyses of Automotive Attack Surfaces By Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, and Stefan Savage - University of California, San Diego Karl Koscher, Alexei Czeskis, Franziska Roesner, and Tadayoshi Kohno - University of Washington http://www.autosec.org/pubs/cars-usenixsec2011.pdf   2013 Script Your Car! Using existing hardware platforms to integrate python into your dashboard By Felix "tmbinc" Domke https://events.ccc.de/congress/2013/Fahrplan/events/5360.html   2014 A Survey of Remote Automotive Attack Surfaces By Charlie Miller and Chris Valasek http://illmatics.com/remote%20attack%20surfaces.pdf   2015 Remote Exploitation of an Unaltered Passenger Vehicle By Dr. Charlie Miller and Chris Valasek     CAN Message Injection OG Dynamite Edition Charlie Miller, Chris Valasek June 28, 2016
  4. Center for Automotive Embedded Systems Security (CAESS): http://www.autosec.org/ OEM GSM Interface Exploit (2015): https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-guri-update.pdf
  5. In information technology, self-healing describes any device or system that has the ability to perceive that it is not operating correctly and, without human intervention, make the necessary adjustments to restore itself to normal operation. IBM, for example, is working on an autonomic computing initiative that the company defines as providing products that are self-configuring, self-optimizing, and self-protecting - as well as self-healing. For all of these characteristics together, IBM uses the term "self-managing."
  6. #1: German Enigma in WWII "Enigma-IMG 0484-black" by Photograph by Rama, Wikimedia Commons, Cc-by-sa-2.0-fr. Licensed under CC BY-SA 2.0 fr via Commons - https://commons.wikimedia.org/wiki/File:Enigma-IMG_0484-black.jpg#/media/File:Enigma-IMG_0484-black.jpg