SlideShare a Scribd company logo
1 of 12
Download to read offline
WHAT IS
FASTR
Future of Automotive Security Technology Research
WHAT IS FASTR?
Automotive security is a significant concern and area of focus for the industry
 Security breaches and awareness of potential security issues will continue to grow,
likely acting as an inhibitor to successful autonomous vehicle deployment
There is significant activity in the ecosystem with OEMs,Tier 1s and specialist
automotive security companies striving to respond to identified exploits and
associated risks
 Communities of interest are developing and rallying around various aspects of the
challenges
FASTR WORKS WITH THE AUTOMOTIVE ECOSYSTEM
TO ENABLE THE ORGANICALLY SECURE VEHICLE OF THE FUTURE
2
FASTR INTOTHE AUTOMOTIVE FUTURE
CARS ARE UNDERGOING DRAMATIC TRANSFORMATION OF SOFTWARE
CONTENT, CONNECTIVITY, INFOTAINMENT SERVICES AND AUTONOMY
THE AUTOMOBILE BY 2022
 Car built around software as opposed to software
built around car
 Autonomy is prime use case
 Significantly expanded cyber attack surface
 Cyber security as enabling technology – autonomy
and trust coexist in equal measure
3
There is an opportunity to rethink and
redesign key vehicle information architecture
components with cyber security in mind.
Now is the time to build the organically
secure autonomous vehicle.
FASTR
will accelerate automotive security innovation to
enable trust in the autonomous vehicle of the future
by catalyzing the creation and deployment of key technologies.
5
THE FASTR
COMMUNITY OEMS
Sharing
Economy
Automotive
Vendors
Tier 1 and
Tier 2
Suppliers
Autonomous
Vehicle
Specialists
SOC
Providers,
Hardware and
Software
Suppliers
Specialist
Automotive
Security
Companies
Universities
and Research
Groups
Delivering the
Building Blocks
of Automotive
Security
Delivering Tools
and Solutions
Delivering
Advanced
Concepts
6
FASTR
MEMBERS
COMMUNITY
PARTNERS
 Universities: Build tech transfer links
 SRC: Support long-term research
mission with automotive security
expertise
 Genivi:Translate automotive security
innovation to deployable code
FASTR
ENGAGEMENT
MODEL
FASTR provides:
 Ahead-of-the curve technologies & solutions
 Specialist workshops
 Capabilities to learn about and influence the latest
automotive security technologies
 Help facilitating compliance with evolving regulations and
standards
 Investment guidance in automotive security
 Participate and influence automotive
security forums from a technology
perspective
 Assist & inform regulators and standards
bodies
 Raise awareness
7
FASTR INTHE INDUSTRY ECOSYSTEM
Automotive
Security
Regulation
• DoT
• NHTSA
Automotive
Security
Management
• Auto-ISAC
Automotive
Security
Technology
Deployment
• GENIVI
Automotive
Security
Standards
• SAE
• TCG
Automotive
Security
Enabling
Research &
Technologies
• FASTR
• SRC
RegulationManagementDeploymentStandardizationR&D
AUTOMOTIVE SECURITY LIFECYCLE
8
A LAYERED APPROACH FOR DEFENSE IN DEPTH
LAYER 1: CAR
• Emphasis on in-vehicle systems
LAYER 3: AUTONOMOUS CAR
•Emphasis on applications &
capabilities (consumer and
enterprise)
 Threat model
 Vulnerability
assessment
 Security
architecture
 Trusted supply
chain
 Cyber security
assurance case
LAYER 2: CONNECTED CAR
•Emphasis on connectivity
and cloud
9
DEFENSE IN DEPTH:WORKGROUP OUTPUT
ORGANIZE WORKGROUPS TO FOCUS ON EACH LAYER AND PROVIDE PROOF POINTS IN 2017
PROPOSED
WORKGROUP
STRUCTURE
IN-VEHICLE SYSTEMS
 TSC Leader(s)
 MemberVolunteers
 University Students
 Consultants or Contractors
CONNECTIVITY & CLOUD
 TSC Leader(s)
 MemberVolunteers
 University Students
 Consultants or Contractors
AUTONOMOUS APPS &
CAPABILITIES
 TSC Leader(s)
 MemberVolunteers
 University Students
 Consultants or Contractors
2017TSC CHAIR: CROSS WG COLLABORATION
10
FASTR MEMBERSHIP
MEMBERS ARE PART OF AN
INCLUSIVE, CROSS-INDUSTRY
ORGANIZATION
NEUTRAL
nonprofit entity
driving credible,
unbiased research
BRIDGING
the gap between
the security
researcher and
automotive
production
communities
EXCLUSIVE
focus on future
architectures and
greenfield approaches
to solving security
challenges
COMPREHENSIVE
insight derived from
broad automotive
ecosystem
representation
VISIBILITY
amongst corporate
and private
automotive industry
leaders
OPEN &
COLLABORATIVE
research
environment in a
neutral setting
TRUSTED
thought leader
advising global
agencies on
accelerated auto
security innovation
11
LEARN MORE AT FASTR.ORG
12

More Related Content

What's hot

Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsJulien Ott
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017Bill Chamberlin
 
Cost of dependency on TCPIP based Aircrafts
Cost of dependency on TCPIP based AircraftsCost of dependency on TCPIP based Aircrafts
Cost of dependency on TCPIP based AircraftsAmbreen Zafar
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesNeil Kemp
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumZimperium
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceZimperium
 
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityAccelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityMelissa Luongo
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016IBM Security
 
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Cloud Security Alliance Lviv Chapter
 
20100121 04 - Présentation du CISQ par cast software
20100121 04 - Présentation du CISQ par cast software20100121 04 - Présentation du CISQ par cast software
20100121 04 - Présentation du CISQ par cast softwareLeClubQualiteLogicielle
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...Symantec
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityZimperium
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumZimperium
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?IBM Security
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeIBM Security
 

What's hot (19)

Veracode ciso riyadh
Veracode ciso riyadhVeracode ciso riyadh
Veracode ciso riyadh
 
Appaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applicationsAppaloosa & AppDome: deploy & protect mobile applications
Appaloosa & AppDome: deploy & protect mobile applications
 
Security Trend Report, 2017
Security Trend Report, 2017Security Trend Report, 2017
Security Trend Report, 2017
 
Automotive Hacking
Automotive Hacking Automotive Hacking
Automotive Hacking
 
Webinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the NumbersWebinar–Open Source Risk in M&A by the Numbers
Webinar–Open Source Risk in M&A by the Numbers
 
Cost of dependency on TCPIP based Aircrafts
Cost of dependency on TCPIP based AircraftsCost of dependency on TCPIP based Aircrafts
Cost of dependency on TCPIP based Aircrafts
 
Top 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your EmployeesTop 2016 Mobile Security Threats and your Employees
Top 2016 Mobile Security Threats and your Employees
 
Mobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by ZimperiumMobile Protect Pro - Powered by Zimperium
Mobile Protect Pro - Powered by Zimperium
 
How to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat IntelligenceHow to Gather Global Mobile Threat Intelligence
How to Gather Global Mobile Threat Intelligence
 
Accelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise MobilityAccelerating Innovation Through Enterprise Mobility
Accelerating Innovation Through Enterprise Mobility
 
Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016Recent ECB/ EBA regulations how they will impact European banks in 2016
Recent ECB/ EBA regulations how they will impact European banks in 2016
 
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
Michael Kropyva - Security Compliance For Cloud Providers - Customer`s Perspe...
 
20100121 04 - Présentation du CISQ par cast software
20100121 04 - Présentation du CISQ par cast software20100121 04 - Présentation du CISQ par cast software
20100121 04 - Présentation du CISQ par cast software
 
Unizen Corporate Profile 2016
Unizen Corporate Profile 2016Unizen Corporate Profile 2016
Unizen Corporate Profile 2016
 
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
What lies ahead? 2016 Cyber Security Predictions from Symantec in the EMEA (E...
 
Mobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested RealityMobile Security: Perceptions vs Device-harvested Reality
Mobile Security: Perceptions vs Device-harvested Reality
 
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - ZimperiumDeutsche Telekom Partnering Operating Alliance Summit - Zimperium
Deutsche Telekom Partnering Operating Alliance Summit - Zimperium
 
2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?2015 Mobile Security Trends: Are You Ready?
2015 Mobile Security Trends: Are You Ready?
 
Tolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't SeeTolly Report: Stopping Attacks You Can't See
Tolly Report: Stopping Attacks You Can't See
 

Viewers also liked

Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Iddan Halevy
 
Myths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalMyths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalNewellNYC
 
FASTRInfographic2017
FASTRInfographic2017FASTRInfographic2017
FASTRInfographic2017Craig Hurst
 
Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Joseph Hennawy
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsAndreas Mai
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threatHarman Innovation
 
From Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionFrom Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionAlexander Schellong
 
Michael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner, RCDD
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Bill Harpley
 
Public policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesPublic policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesBill Harpley
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT SecurityBill Harpley
 
Automotive security (cvta)
Automotive security (cvta)Automotive security (cvta)
Automotive security (cvta)Alan Tatourian
 
HARMAN Corporate Deck
HARMAN Corporate DeckHARMAN Corporate Deck
HARMAN Corporate DeckDvir Reznik
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Ankit Singh
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber SecurityStephen Lahanas
 
Cyber Security Defense by vulnerability mgmt nov 11 2015
Cyber Security Defense by  vulnerability mgmt nov 11 2015Cyber Security Defense by  vulnerability mgmt nov 11 2015
Cyber Security Defense by vulnerability mgmt nov 11 2015Kevin Murphy
 

Viewers also liked (18)

Build Safe and Secure Distributed Systems
Build Safe and Secure Distributed SystemsBuild Safe and Secure Distributed Systems
Build Safe and Secure Distributed Systems
 
Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010Feasible car cyber defense - ESCAR 2010
Feasible car cyber defense - ESCAR 2010
 
Myths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's HospitalMyths vs. Truths at St. Vincent's Hospital
Myths vs. Truths at St. Vincent's Hospital
 
FASTRInfographic2017
FASTRInfographic2017FASTRInfographic2017
FASTRInfographic2017
 
Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012Cyber Security Architecture - A Systems Approach December 05 2012
Cyber Security Architecture - A Systems Approach December 05 2012
 
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of CarsSAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
SAE 2014 - Cyber Security: Mission Critical for the Internet of Cars
 
Hackers are the new highway threat
Hackers are the new highway threatHackers are the new highway threat
Hackers are the new highway threat
 
From Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive RevolutionFrom Connected To Self-Driving - Securing the Automotive Revolution
From Connected To Self-Driving - Securing the Automotive Revolution
 
Michael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering BiographyMichael W. Meissner - Cyber Security Engineering Biography
Michael W. Meissner - Cyber Security Engineering Biography
 
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
 
Public policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesPublic policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous Vehicles
 
Scaling IoT Security
Scaling IoT SecurityScaling IoT Security
Scaling IoT Security
 
Automotive security (cvta)
Automotive security (cvta)Automotive security (cvta)
Automotive security (cvta)
 
HARMAN Corporate Deck
HARMAN Corporate DeckHARMAN Corporate Deck
HARMAN Corporate Deck
 
Cyber Security for the Connected Car
Cyber Security for the Connected Car Cyber Security for the Connected Car
Cyber Security for the Connected Car
 
Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)Security Vision for Software on Wheels (Autonomous Vehicles)
Security Vision for Software on Wheels (Autonomous Vehicles)
 
Introduction to Cyber Security
Introduction to Cyber SecurityIntroduction to Cyber Security
Introduction to Cyber Security
 
Cyber Security Defense by vulnerability mgmt nov 11 2015
Cyber Security Defense by  vulnerability mgmt nov 11 2015Cyber Security Defense by  vulnerability mgmt nov 11 2015
Cyber Security Defense by vulnerability mgmt nov 11 2015
 

Similar to FASTR_Overview2017

ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPGreg Harms
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsTonex
 
Industry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseIndustry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseBryan Len
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdriveaccenture
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfDorleControls
 
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...BIS Research Inc.
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsSymantec
 
NEC5-18- Brief Summary
NEC5-18- Brief SummaryNEC5-18- Brief Summary
NEC5-18- Brief SummarySandeep Kar
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...IJCI JOURNAL
 
SANS - Developments car hacking - 36607
SANS - Developments car hacking - 36607SANS - Developments car hacking - 36607
SANS - Developments car hacking - 36607Felipe Prado
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected CarAngel Villar Garea
 
Strategy Analytics - Automotive Cyber Security - Oct 2020.pptx
Strategy Analytics - Automotive Cyber Security - Oct 2020.pptxStrategy Analytics - Automotive Cyber Security - Oct 2020.pptx
Strategy Analytics - Automotive Cyber Security - Oct 2020.pptxNiteshKumar958846
 
Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?PECB
 
Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...Dr. Anish Cheriyan (PhD)
 
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRockwell Automation
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Mahbubul Alam
 

Similar to FASTR_Overview2017 (20)

ConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WPConnectedAutos-Kymeta-7498-WP
ConnectedAutos-Kymeta-7498-WP
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
Industry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training CourseIndustry's Best Automotive Cybersecurity Training Course
Industry's Best Automotive Cybersecurity Training Course
 
Automotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into OverdriveAutomotive Cybersecurity: Shifting into Overdrive
Automotive Cybersecurity: Shifting into Overdrive
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 
NEC5-18- Brief Summary
NEC5-18- Brief SummaryNEC5-18- Brief Summary
NEC5-18- Brief Summary
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
Automotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still ExistsAutomotive Cybersecurity: The Gap Still Exists
Automotive Cybersecurity: The Gap Still Exists
 
SANS - Developments car hacking - 36607
SANS - Developments car hacking - 36607SANS - Developments car hacking - 36607
SANS - Developments car hacking - 36607
 
Automotive Cyber Security.pdf
Automotive Cyber Security.pdfAutomotive Cyber Security.pdf
Automotive Cyber Security.pdf
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected Car
 
Strategy Analytics - Automotive Cyber Security - Oct 2020.pptx
Strategy Analytics - Automotive Cyber Security - Oct 2020.pptxStrategy Analytics - Automotive Cyber Security - Oct 2020.pptx
Strategy Analytics - Automotive Cyber Security - Oct 2020.pptx
 
Revolution in Mobility
Revolution in MobilityRevolution in Mobility
Revolution in Mobility
 
Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?Are we going to have security issues on connected cars?
Are we going to have security issues on connected cars?
 
Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...Software defined vehicles,automotive standards (safety, security), agile cont...
Software defined vehicles,automotive standards (safety, security), agile cont...
 
AutonomousCars29
AutonomousCars29AutonomousCars29
AutonomousCars29
 
RA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I startRA TechED 2019 - SS16 - Security Where and Why do I start
RA TechED 2019 - SS16 - Security Where and Why do I start
 
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...Protecting Autonomous Vehicles and Connected Services with Software Defined P...
Protecting Autonomous Vehicles and Connected Services with Software Defined P...
 

FASTR_Overview2017

  • 1. WHAT IS FASTR Future of Automotive Security Technology Research
  • 2. WHAT IS FASTR? Automotive security is a significant concern and area of focus for the industry  Security breaches and awareness of potential security issues will continue to grow, likely acting as an inhibitor to successful autonomous vehicle deployment There is significant activity in the ecosystem with OEMs,Tier 1s and specialist automotive security companies striving to respond to identified exploits and associated risks  Communities of interest are developing and rallying around various aspects of the challenges FASTR WORKS WITH THE AUTOMOTIVE ECOSYSTEM TO ENABLE THE ORGANICALLY SECURE VEHICLE OF THE FUTURE 2
  • 3. FASTR INTOTHE AUTOMOTIVE FUTURE CARS ARE UNDERGOING DRAMATIC TRANSFORMATION OF SOFTWARE CONTENT, CONNECTIVITY, INFOTAINMENT SERVICES AND AUTONOMY THE AUTOMOBILE BY 2022  Car built around software as opposed to software built around car  Autonomy is prime use case  Significantly expanded cyber attack surface  Cyber security as enabling technology – autonomy and trust coexist in equal measure 3
  • 4. There is an opportunity to rethink and redesign key vehicle information architecture components with cyber security in mind. Now is the time to build the organically secure autonomous vehicle.
  • 5. FASTR will accelerate automotive security innovation to enable trust in the autonomous vehicle of the future by catalyzing the creation and deployment of key technologies. 5
  • 6. THE FASTR COMMUNITY OEMS Sharing Economy Automotive Vendors Tier 1 and Tier 2 Suppliers Autonomous Vehicle Specialists SOC Providers, Hardware and Software Suppliers Specialist Automotive Security Companies Universities and Research Groups Delivering the Building Blocks of Automotive Security Delivering Tools and Solutions Delivering Advanced Concepts 6
  • 7. FASTR MEMBERS COMMUNITY PARTNERS  Universities: Build tech transfer links  SRC: Support long-term research mission with automotive security expertise  Genivi:Translate automotive security innovation to deployable code FASTR ENGAGEMENT MODEL FASTR provides:  Ahead-of-the curve technologies & solutions  Specialist workshops  Capabilities to learn about and influence the latest automotive security technologies  Help facilitating compliance with evolving regulations and standards  Investment guidance in automotive security  Participate and influence automotive security forums from a technology perspective  Assist & inform regulators and standards bodies  Raise awareness 7
  • 8. FASTR INTHE INDUSTRY ECOSYSTEM Automotive Security Regulation • DoT • NHTSA Automotive Security Management • Auto-ISAC Automotive Security Technology Deployment • GENIVI Automotive Security Standards • SAE • TCG Automotive Security Enabling Research & Technologies • FASTR • SRC RegulationManagementDeploymentStandardizationR&D AUTOMOTIVE SECURITY LIFECYCLE 8
  • 9. A LAYERED APPROACH FOR DEFENSE IN DEPTH LAYER 1: CAR • Emphasis on in-vehicle systems LAYER 3: AUTONOMOUS CAR •Emphasis on applications & capabilities (consumer and enterprise)  Threat model  Vulnerability assessment  Security architecture  Trusted supply chain  Cyber security assurance case LAYER 2: CONNECTED CAR •Emphasis on connectivity and cloud 9
  • 10. DEFENSE IN DEPTH:WORKGROUP OUTPUT ORGANIZE WORKGROUPS TO FOCUS ON EACH LAYER AND PROVIDE PROOF POINTS IN 2017 PROPOSED WORKGROUP STRUCTURE IN-VEHICLE SYSTEMS  TSC Leader(s)  MemberVolunteers  University Students  Consultants or Contractors CONNECTIVITY & CLOUD  TSC Leader(s)  MemberVolunteers  University Students  Consultants or Contractors AUTONOMOUS APPS & CAPABILITIES  TSC Leader(s)  MemberVolunteers  University Students  Consultants or Contractors 2017TSC CHAIR: CROSS WG COLLABORATION 10
  • 11. FASTR MEMBERSHIP MEMBERS ARE PART OF AN INCLUSIVE, CROSS-INDUSTRY ORGANIZATION NEUTRAL nonprofit entity driving credible, unbiased research BRIDGING the gap between the security researcher and automotive production communities EXCLUSIVE focus on future architectures and greenfield approaches to solving security challenges COMPREHENSIVE insight derived from broad automotive ecosystem representation VISIBILITY amongst corporate and private automotive industry leaders OPEN & COLLABORATIVE research environment in a neutral setting TRUSTED thought leader advising global agencies on accelerated auto security innovation 11
  • 12. LEARN MORE AT FASTR.ORG 12