SlideShare a Scribd company logo
1
Is cybersecurity protection of commercial
vehicles harder?
Gilad Bandel
Cymotive Technologies
2
Commercial vehicles’ unique risks:
Passenger vehicles account for 60% of
the while commercial vehicles account
for the remaining 40%. However:
• Commercial vehicles travel by far
longer distances than passenger
vehicles
• The lifespan of a commercial
vehicle is longer than a passenger
vehicle
• Many commercial vehicles are part
of national critical infrastructure,
especially during times of crisis and
military conflict
• Many enemies: terrorists, criminals
and owners
3
Unique cyber risks to
commercial vehicles:
Focus on trucks &
agriculture equipment
Motives: Transporting tens of $
billions of goods, threats to
disrupting services resulting in
considerable financial and legal
damages.
Risk to mission-critical or
military equipment transported
by trucks motivated by political
or criminal reasons
4
The differences in attack surfaces and threat models
Viral effects of modular attachments
Agricultural vehicle attachments and trailers can serve
as a vector, as easily accessible and compromised
One trailer/attachment may serve many vehicles
Compromised vehicles can, in turn, serve as a vector to
attack yet to be compromised attachments and trailers
5
Service, tools and the right to repair
Consideration
• Diagnostics and testing tools connected
through the OBD connector require
cryptographic authentication usually
from the gateway
• The right-to-repair compound risks
imply keys should be made available to
vehicle owners
• This opens new opportunities for
hackers to attack vehicles
6
Why do we need a different approach for commercial vehicles?
Tailored solutions
are vital to low
bandwidth
networks
Reduce network
overhead
Limit the need for
costly hardware
investment
Threat models & attack
vectors vary by protocol
– SAE J1939
standardized usage
across many OEMs
Potential casualties and damages of a
commercial vehicle are much higher than
passenger vehicles
7
SAE J1939 - Frame format
8
SAE J1939 – Transport protocol
9
How do attack surfaces and threat
models differ to regular CAN?
Attack surfaces and threat
models
• Remote attacks as a preferred
methodology
• Routine maintenance deters physical
attacks, though still possible
• Standardized protocol across
manufacturers, little to no variation in
component design and integration
• Component interoperability leaves
multiple OEMs/Tiers open to attack by a
single kill-chain
10
Attack vectors and scenarios
Addressing
• SAE J1939 uses a 29-bit, extended CAN
addressing, proprietary format. No way to truly
authenticate the origin of the message.
• Any spoofing or impersonation attack is possible
 ECUs can send any message ID
 No authentication
 Man in The Middle (MiTM) also a
possibility
Vehicle Configuration
• Commercial vehicles have a complex and
dynamic life-cycle with many opportunities
for rogue actors to integrate compromised
components or upload malicious software.
• Interoperability means components can be
mixed and matched.
• Attachments and other equipment may be
shared by many vehicles.
11
11
Attack vectors and scenarios
Aftermarket Fleet Management & Equipment
installation
Devices added by fleet owners to monitor and control
their fleet. In some cases, regulation requires the
installation of driver-hours recording ELDs (Electronic
Logging Devices) and other telematics equipment.
• Not part of the OEM cybersecurity control process
• Usually not part of the OEM supply chain
• Cyber-protection cannot be guaranteed
Specific Embedded Software Issues
There are several types of vulnerabilities when
implementing a protocol or a standard:
• Inherent protocol vulnerabilities
• Defined in a vulnerable way
• Implementation vulnerabilities
• Buffer Overflow (BoF)
• Badly defined/complex protocol
• Or bad code flow exposing the protocol to
attack
12
Reducing risk
• ISO/SAE 21434
• AUTOSAR best practice, and many others
• This translates to a set of activities:
• Process and procedures
• Cybersecurity management systems
• Secure by design approach of all the systems
• Secured software development lifecycle
• Compliance with standards such as A-SPICE
and MISRA
• Dedicated cybersecurity protection
mechanisms such as XDR (eXtended
Detection and Response) IDS/IPS, end point
protection, cryptographic solutions
Mitigating cyber-attacks on SAE J1939 commercial vehicles
Proactive Action is Required
Tier-1s and OEMs need to take proactive
action to protect the commercial vehicle for
many reasons, including:
• Regulations such as the UN R155
• Growing awareness within professional
bodies in the automotive industry
• Top management aiming to protect their
firm’s reputation, preventing loss of life
and damage to property
• Insurance companies requiring
cybersecurity adoption to minimize risk
13
13
SAE J1939 Layers scope
J1939-91 Network Security (WIP)
Layer 2
In-Vehicle Network
Layer 3
EE Architecture
Layer 4
Connected Vehicle
Layer 1
Individual ECU
ISO 14229-1
SAE J3101
14
14
Layer 1 security
Individual ECU
ISO 14229-1 and SAE J3101
• ECU Protected Boot, Secure Flash
• Authorization and Authentication
Note: many ECUs “standard” thus are
interchangeable between numerous makes and
models. This implies that a vulnerability detected on
a specific ECU can be exploited across many vehicle
types across the industry!
15
15
Layer 2 – J1939-91 Part “C”
In-Vehicle network security
J1939-91C defines recommendations for:
• Secure on-board communications between ECUs
• Update General Vehicle Network Gateway
recommendations and network topology reference
related to J1939-31
16
16
Layer 3 – J1939-91 Part “A”
Foundation layer security
J1939-91A Defines THE RECOMMENDATIONS FOR SECURITY OF THE VEHICLE
SIDE OF THE J1939-13 connector
• Recommendations for vehicle communications functions with a device which
is connected to J1939-13 interface - diagnostics interface security. [Similar
to SAE J3138 diagnostics link security and SAE J3005-2 “dongle” device
security]
• General requirements for “Imposter Reporting” for devices that may spoof
J1939 Source Addresses.
17
17
Layer 4 – SAE J1939-91 Part “B”
Connected vehicle security
Scope of SAE J1939-91B: Bi-Directional secure Over The Air (OTA)
communications via a telematics interface to the vehicle
• Extended Vehicle (ExVe) Systems and Intelligent Transportation Systems
(ITS)
• ISO 20077, ISO 20078, ISO 20080, etc.
• UN R156
• ISO 24089
• ISO TC204 work items (ITS)
18
Future trends
 SAE J1939-91 network security parts A, B and C are still WIP (Work in Progress)
 SecOC and message authentication
 UN R155 and GB/T certification for vehicle type approval
 ISO/SAE 21434 “cookbook” including the V-model, SecSDLC (Secured Software
Development Life Cycle), A-SPICE (Automotive Software Performance
Improvement and Capability dEtermination)
 V-XDR (Vehicle eXtended Detection and Response) systems a.k.a. IDPS (Intrusion
Detection and Prevention System) connected to a SIEM (Security Information and
Event Management) system at the V-SOC (Vehicle Security Operations Center)
 CSMS and continuous vulnerabilities management automated tools
 V2X including message plausibility and misbehavior detection
 Automotive Ethernet
 Connected and Automated Driving – platooning, etc.
 Cooperative Intelligent Transportation System
19
About
A global
footprint
Israel, North
America, Europe &
Asia
Industry
certifications
A growing
workforce
~220 employees
85% cyber experts
A full lifecycle
smart mobility
platform
ISO 9001, ISO/IEC 90003,
TISAX
Following A-SPICE Level 2
Founded in 2016 by leaders of
Israel’s National Security Services
—
Selected cyber partner of
the Volkswagen Group
—
Financially Strong & Profitable
20
cymotive.com
gilad.bandel@cymotive.com

More Related Content

What's hot

Frequently Asked Questions on AUTOSAR Services
Frequently Asked Questions on AUTOSAR ServicesFrequently Asked Questions on AUTOSAR Services
Frequently Asked Questions on AUTOSAR Services
Embitel Technologies (I) PVT LTD
 
TCMS Engineering
TCMS EngineeringTCMS Engineering
TCMS Engineering
BombardierRail
 
What is AUTOSAR Communiation Stack
What is AUTOSAR Communiation StackWhat is AUTOSAR Communiation Stack
What is AUTOSAR Communiation Stack
Embitel Technologies (I) PVT LTD
 
Multicore and AUTOSAR
Multicore and AUTOSARMulticore and AUTOSAR
Multicore and AUTOSAR
Hansang Lee
 
Misra c rules
Misra c rulesMisra c rules
Misra c rules
kiranyeligati
 
Model based design-Hardware in loop-software in loop
Model based design-Hardware in loop-software in loopModel based design-Hardware in loop-software in loop
Model based design-Hardware in loop-software in loop
Mahmoud Hussein
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded Systems
WalaaMohamed
 
Automotive Functional Safety ISO 26262 Training Bootcamp : Tonex Training
Automotive Functional Safety ISO 26262 Training Bootcamp : Tonex TrainingAutomotive Functional Safety ISO 26262 Training Bootcamp : Tonex Training
Automotive Functional Safety ISO 26262 Training Bootcamp : Tonex Training
Bryan Len
 
Autosar MCAL (Microcontroller Abstraction Layer)
Autosar MCAL (Microcontroller Abstraction Layer)Autosar MCAL (Microcontroller Abstraction Layer)
Autosar MCAL (Microcontroller Abstraction Layer)
Embitel Technologies (I) PVT LTD
 
Introduction to embedded systems
Introduction to embedded systemsIntroduction to embedded systems
Introduction to embedded systems
Dileep Kumar Tiwari
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
rahulpandey510
 
SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...
SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...
SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...
Embitel Technologies (I) PVT LTD
 
An integrative solution towards SOTIF and AV safety
An integrative solution towards SOTIF and AV safetyAn integrative solution towards SOTIF and AV safety
An integrative solution towards SOTIF and AV safety
Bernhard Kaiser
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
Manav Gupta
 
plc8-200417125816.pdf
plc8-200417125816.pdfplc8-200417125816.pdf
plc8-200417125816.pdf
Robin8015873726
 
Embedded Systems in Automotive
Embedded Systems in Automotive Embedded Systems in Automotive
Embedded Systems in Automotive
محمدعبد الحى
 
AUTOSAR Memory Stcak (MemStack).
AUTOSAR Memory Stcak (MemStack). AUTOSAR Memory Stcak (MemStack).
AUTOSAR Memory Stcak (MemStack).
Embitel Technologies (I) PVT LTD
 
Scada slide
Scada slideScada slide
Scada slide
Towfiqur Rahman
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
Real-Time Innovations (RTI)
 
Autosar basics by ARCCORE
Autosar basics by ARCCOREAutosar basics by ARCCORE
Autosar basics by ARCCORE
ARCCORE
 

What's hot (20)

Frequently Asked Questions on AUTOSAR Services
Frequently Asked Questions on AUTOSAR ServicesFrequently Asked Questions on AUTOSAR Services
Frequently Asked Questions on AUTOSAR Services
 
TCMS Engineering
TCMS EngineeringTCMS Engineering
TCMS Engineering
 
What is AUTOSAR Communiation Stack
What is AUTOSAR Communiation StackWhat is AUTOSAR Communiation Stack
What is AUTOSAR Communiation Stack
 
Multicore and AUTOSAR
Multicore and AUTOSARMulticore and AUTOSAR
Multicore and AUTOSAR
 
Misra c rules
Misra c rulesMisra c rules
Misra c rules
 
Model based design-Hardware in loop-software in loop
Model based design-Hardware in loop-software in loopModel based design-Hardware in loop-software in loop
Model based design-Hardware in loop-software in loop
 
Introduction to Embedded Systems
Introduction to Embedded SystemsIntroduction to Embedded Systems
Introduction to Embedded Systems
 
Automotive Functional Safety ISO 26262 Training Bootcamp : Tonex Training
Automotive Functional Safety ISO 26262 Training Bootcamp : Tonex TrainingAutomotive Functional Safety ISO 26262 Training Bootcamp : Tonex Training
Automotive Functional Safety ISO 26262 Training Bootcamp : Tonex Training
 
Autosar MCAL (Microcontroller Abstraction Layer)
Autosar MCAL (Microcontroller Abstraction Layer)Autosar MCAL (Microcontroller Abstraction Layer)
Autosar MCAL (Microcontroller Abstraction Layer)
 
Introduction to embedded systems
Introduction to embedded systemsIntroduction to embedded systems
Introduction to embedded systems
 
Vanet by Sujata Tiwari
Vanet by Sujata TiwariVanet by Sujata Tiwari
Vanet by Sujata Tiwari
 
SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...
SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...
SEooC ISO 26262 | What is Safety Element Out of Context in Automotive Functio...
 
An integrative solution towards SOTIF and AV safety
An integrative solution towards SOTIF and AV safetyAn integrative solution towards SOTIF and AV safety
An integrative solution towards SOTIF and AV safety
 
Embedded systems
Embedded systemsEmbedded systems
Embedded systems
 
plc8-200417125816.pdf
plc8-200417125816.pdfplc8-200417125816.pdf
plc8-200417125816.pdf
 
Embedded Systems in Automotive
Embedded Systems in Automotive Embedded Systems in Automotive
Embedded Systems in Automotive
 
AUTOSAR Memory Stcak (MemStack).
AUTOSAR Memory Stcak (MemStack). AUTOSAR Memory Stcak (MemStack).
AUTOSAR Memory Stcak (MemStack).
 
Scada slide
Scada slideScada slide
Scada slide
 
ISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software ComponentsISO 26262 Approval of Automotive Software Components
ISO 26262 Approval of Automotive Software Components
 
Autosar basics by ARCCORE
Autosar basics by ARCCOREAutosar basics by ARCCORE
Autosar basics by ARCCORE
 

Similar to Is cybersecurity protection of commercial vehicles harder?

13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf13. CEMA - AUTOMOTIVE.pdf
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
DorleControls
 
Forklift Impact Management, Defender system
Forklift Impact Management, Defender systemForklift Impact Management, Defender system
Forklift Impact Management, Defender system
Ted Jurca
 
Forklift Impact Management in Real Time
Forklift Impact Management in Real TimeForklift Impact Management in Real Time
Forklift Impact Management in Real Time
Ted Jurca
 
Forklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh TechnologyForklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh Technology
Ted Jurca
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
Tonex
 
Vehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdfVehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdf
DorleControls
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?
Alan Tatourian
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
Real-Time Innovations (RTI)
 
Hydraulische Wiegesysteme
Hydraulische WiegesystemeHydraulische Wiegesysteme
Hydraulische Wiegesysteme
ZeljkoJurca
 
Brochure skidweigh Defender
Brochure skidweigh DefenderBrochure skidweigh Defender
Brochure skidweigh Defender
Ted Jurca
 
Current state of automotive network security
Current state of automotive network securityCurrent state of automotive network security
Current state of automotive network security
FFRI, Inc.
 
Attinad Software IoT offerings
Attinad Software IoT offeringsAttinad Software IoT offerings
Attinad Software IoT offerings
Shafeer Badharudeen
 
Webinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected VehiclesWebinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected Vehicles
HARMAN Connected Services
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
Brad Nicholas
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
Seungjoo Kim
 
Three d company-AAI Presentation
Three d company-AAI PresentationThree d company-AAI Presentation
Three d company-AAI Presentation
Amit Kumar
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected Car
Angel Villar Garea
 

Similar to Is cybersecurity protection of commercial vehicles harder? (20)

13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf13. CEMA - AUTOMOTIVE.pdf
13. CEMA - AUTOMOTIVE.pdf
 
Cyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdfCyber security for Autonomous Vehicles.pdf
Cyber security for Autonomous Vehicles.pdf
 
Forklift Impact Management, Defender system
Forklift Impact Management, Defender systemForklift Impact Management, Defender system
Forklift Impact Management, Defender system
 
Forklift Impact Management in Real Time
Forklift Impact Management in Real TimeForklift Impact Management in Real Time
Forklift Impact Management in Real Time
 
Forklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh TechnologyForklift Fleet Management, SkidWeigh Technology
Forklift Fleet Management, SkidWeigh Technology
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
Vehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdfVehicle Diagnostics and Communication.pdf
Vehicle Diagnostics and Communication.pdf
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?
 
Advancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen AutomotiveAdvancing Active Safety for Next-Gen Automotive
Advancing Active Safety for Next-Gen Automotive
 
Hydraulische Wiegesysteme
Hydraulische WiegesystemeHydraulische Wiegesysteme
Hydraulische Wiegesysteme
 
Brochure skidweigh Defender
Brochure skidweigh DefenderBrochure skidweigh Defender
Brochure skidweigh Defender
 
Current state of automotive network security
Current state of automotive network securityCurrent state of automotive network security
Current state of automotive network security
 
Attinad Software IoT offerings
Attinad Software IoT offeringsAttinad Software IoT offerings
Attinad Software IoT offerings
 
Webinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected VehiclesWebinar - Automotive SOC - Security Data Analytics for Connected Vehicles
Webinar - Automotive SOC - Security Data Analytics for Connected Vehicles
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Verification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCLVerification of IVI Over-The-Air using UML/OCL
Verification of IVI Over-The-Air using UML/OCL
 
Three d company-AAI Presentation
Three d company-AAI PresentationThree d company-AAI Presentation
Three d company-AAI Presentation
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service DeliveryFriendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
Friendly Technologies - TR-069, IoT Management, Smart Home Service Delivery
 
VMware Solutions for the Connected Car
VMware Solutions for the Connected CarVMware Solutions for the Connected Car
VMware Solutions for the Connected Car
 

Recently uploaded

EV Charging at MFH Properties by Whitaker Jamieson
EV Charging at MFH Properties by Whitaker JamiesonEV Charging at MFH Properties by Whitaker Jamieson
EV Charging at MFH Properties by Whitaker Jamieson
Forth
 
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
afkxen
 
Here's Why Every Semi-Truck Should Have ELDs
Here's Why Every Semi-Truck Should Have ELDsHere's Why Every Semi-Truck Should Have ELDs
Here's Why Every Semi-Truck Should Have ELDs
jennifermiller8137
 
Kaizen SMT_MI_PCBA for Quality Engineerspptx
Kaizen SMT_MI_PCBA for Quality EngineerspptxKaizen SMT_MI_PCBA for Quality Engineerspptx
Kaizen SMT_MI_PCBA for Quality Engineerspptx
vaibhavsrivastava482521
 
AadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects ( Asp Cranes ) RaipurAadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects
 
Catalytic Converter theft prevention - NYC.pptx
Catalytic Converter theft prevention - NYC.pptxCatalytic Converter theft prevention - NYC.pptx
Catalytic Converter theft prevention - NYC.pptx
Blue Star Brothers
 
What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?
Hyundai Motor Group
 
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
afkxen
 
EN Artificial Intelligence by Slidesgo.pptx
EN Artificial Intelligence by Slidesgo.pptxEN Artificial Intelligence by Slidesgo.pptx
EN Artificial Intelligence by Slidesgo.pptx
aichamardi99
 
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
78tq3hi2
 
EV Charging at Multifamily Properties by Kevin Donnelly
EV Charging at Multifamily Properties by Kevin DonnellyEV Charging at Multifamily Properties by Kevin Donnelly
EV Charging at Multifamily Properties by Kevin Donnelly
Forth
 
53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...
53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...
53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...
MarynaYurchenko2
 
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
78tq3hi2
 
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill RoadsWhat Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
Sprinter Gurus
 
Hand Gesture Control Robotic Arm using image processing.pptx
Hand Gesture Control Robotic Arm using image processing.pptxHand Gesture Control Robotic Arm using image processing.pptx
Hand Gesture Control Robotic Arm using image processing.pptx
wstatus456
 
Globalfleet - global fleet survey 2021 full results
Globalfleet - global fleet survey 2021 full resultsGlobalfleet - global fleet survey 2021 full results
Globalfleet - global fleet survey 2021 full results
vaterland
 
Expanding Access to Affordable At-Home EV Charging by Vanessa Warheit
Expanding Access to Affordable At-Home EV Charging by Vanessa WarheitExpanding Access to Affordable At-Home EV Charging by Vanessa Warheit
Expanding Access to Affordable At-Home EV Charging by Vanessa Warheit
Forth
 

Recently uploaded (17)

EV Charging at MFH Properties by Whitaker Jamieson
EV Charging at MFH Properties by Whitaker JamiesonEV Charging at MFH Properties by Whitaker Jamieson
EV Charging at MFH Properties by Whitaker Jamieson
 
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
一比一原版(WashU文凭证书)圣路易斯华盛顿大学毕业证如何办理
 
Here's Why Every Semi-Truck Should Have ELDs
Here's Why Every Semi-Truck Should Have ELDsHere's Why Every Semi-Truck Should Have ELDs
Here's Why Every Semi-Truck Should Have ELDs
 
Kaizen SMT_MI_PCBA for Quality Engineerspptx
Kaizen SMT_MI_PCBA for Quality EngineerspptxKaizen SMT_MI_PCBA for Quality Engineerspptx
Kaizen SMT_MI_PCBA for Quality Engineerspptx
 
AadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects ( Asp Cranes ) RaipurAadiShakti Projects ( Asp Cranes ) Raipur
AadiShakti Projects ( Asp Cranes ) Raipur
 
Catalytic Converter theft prevention - NYC.pptx
Catalytic Converter theft prevention - NYC.pptxCatalytic Converter theft prevention - NYC.pptx
Catalytic Converter theft prevention - NYC.pptx
 
What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?What do the symbols on vehicle dashboard mean?
What do the symbols on vehicle dashboard mean?
 
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
一比一原版(Columbia文凭证书)哥伦比亚大学毕业证如何办理
 
EN Artificial Intelligence by Slidesgo.pptx
EN Artificial Intelligence by Slidesgo.pptxEN Artificial Intelligence by Slidesgo.pptx
EN Artificial Intelligence by Slidesgo.pptx
 
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
快速办理(napier毕业证书)英国龙比亚大学毕业证在读证明一模一样
 
EV Charging at Multifamily Properties by Kevin Donnelly
EV Charging at Multifamily Properties by Kevin DonnellyEV Charging at Multifamily Properties by Kevin Donnelly
EV Charging at Multifamily Properties by Kevin Donnelly
 
53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...
53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...
53286592-Global-Entrepreneurship-and-the-Successful-Growth-Strategies-of-Earl...
 
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
原版制作(Exeter毕业证书)埃克塞特大学毕业证完成信一模一样
 
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill RoadsWhat Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
What Could Be Behind Your Mercedes Sprinter's Power Loss on Uphill Roads
 
Hand Gesture Control Robotic Arm using image processing.pptx
Hand Gesture Control Robotic Arm using image processing.pptxHand Gesture Control Robotic Arm using image processing.pptx
Hand Gesture Control Robotic Arm using image processing.pptx
 
Globalfleet - global fleet survey 2021 full results
Globalfleet - global fleet survey 2021 full resultsGlobalfleet - global fleet survey 2021 full results
Globalfleet - global fleet survey 2021 full results
 
Expanding Access to Affordable At-Home EV Charging by Vanessa Warheit
Expanding Access to Affordable At-Home EV Charging by Vanessa WarheitExpanding Access to Affordable At-Home EV Charging by Vanessa Warheit
Expanding Access to Affordable At-Home EV Charging by Vanessa Warheit
 

Is cybersecurity protection of commercial vehicles harder?

  • 1. 1 Is cybersecurity protection of commercial vehicles harder? Gilad Bandel Cymotive Technologies
  • 2. 2 Commercial vehicles’ unique risks: Passenger vehicles account for 60% of the while commercial vehicles account for the remaining 40%. However: • Commercial vehicles travel by far longer distances than passenger vehicles • The lifespan of a commercial vehicle is longer than a passenger vehicle • Many commercial vehicles are part of national critical infrastructure, especially during times of crisis and military conflict • Many enemies: terrorists, criminals and owners
  • 3. 3 Unique cyber risks to commercial vehicles: Focus on trucks & agriculture equipment Motives: Transporting tens of $ billions of goods, threats to disrupting services resulting in considerable financial and legal damages. Risk to mission-critical or military equipment transported by trucks motivated by political or criminal reasons
  • 4. 4 The differences in attack surfaces and threat models Viral effects of modular attachments Agricultural vehicle attachments and trailers can serve as a vector, as easily accessible and compromised One trailer/attachment may serve many vehicles Compromised vehicles can, in turn, serve as a vector to attack yet to be compromised attachments and trailers
  • 5. 5 Service, tools and the right to repair Consideration • Diagnostics and testing tools connected through the OBD connector require cryptographic authentication usually from the gateway • The right-to-repair compound risks imply keys should be made available to vehicle owners • This opens new opportunities for hackers to attack vehicles
  • 6. 6 Why do we need a different approach for commercial vehicles? Tailored solutions are vital to low bandwidth networks Reduce network overhead Limit the need for costly hardware investment Threat models & attack vectors vary by protocol – SAE J1939 standardized usage across many OEMs Potential casualties and damages of a commercial vehicle are much higher than passenger vehicles
  • 7. 7 SAE J1939 - Frame format
  • 8. 8 SAE J1939 – Transport protocol
  • 9. 9 How do attack surfaces and threat models differ to regular CAN? Attack surfaces and threat models • Remote attacks as a preferred methodology • Routine maintenance deters physical attacks, though still possible • Standardized protocol across manufacturers, little to no variation in component design and integration • Component interoperability leaves multiple OEMs/Tiers open to attack by a single kill-chain
  • 10. 10 Attack vectors and scenarios Addressing • SAE J1939 uses a 29-bit, extended CAN addressing, proprietary format. No way to truly authenticate the origin of the message. • Any spoofing or impersonation attack is possible  ECUs can send any message ID  No authentication  Man in The Middle (MiTM) also a possibility Vehicle Configuration • Commercial vehicles have a complex and dynamic life-cycle with many opportunities for rogue actors to integrate compromised components or upload malicious software. • Interoperability means components can be mixed and matched. • Attachments and other equipment may be shared by many vehicles.
  • 11. 11 11 Attack vectors and scenarios Aftermarket Fleet Management & Equipment installation Devices added by fleet owners to monitor and control their fleet. In some cases, regulation requires the installation of driver-hours recording ELDs (Electronic Logging Devices) and other telematics equipment. • Not part of the OEM cybersecurity control process • Usually not part of the OEM supply chain • Cyber-protection cannot be guaranteed Specific Embedded Software Issues There are several types of vulnerabilities when implementing a protocol or a standard: • Inherent protocol vulnerabilities • Defined in a vulnerable way • Implementation vulnerabilities • Buffer Overflow (BoF) • Badly defined/complex protocol • Or bad code flow exposing the protocol to attack
  • 12. 12 Reducing risk • ISO/SAE 21434 • AUTOSAR best practice, and many others • This translates to a set of activities: • Process and procedures • Cybersecurity management systems • Secure by design approach of all the systems • Secured software development lifecycle • Compliance with standards such as A-SPICE and MISRA • Dedicated cybersecurity protection mechanisms such as XDR (eXtended Detection and Response) IDS/IPS, end point protection, cryptographic solutions Mitigating cyber-attacks on SAE J1939 commercial vehicles Proactive Action is Required Tier-1s and OEMs need to take proactive action to protect the commercial vehicle for many reasons, including: • Regulations such as the UN R155 • Growing awareness within professional bodies in the automotive industry • Top management aiming to protect their firm’s reputation, preventing loss of life and damage to property • Insurance companies requiring cybersecurity adoption to minimize risk
  • 13. 13 13 SAE J1939 Layers scope J1939-91 Network Security (WIP) Layer 2 In-Vehicle Network Layer 3 EE Architecture Layer 4 Connected Vehicle Layer 1 Individual ECU ISO 14229-1 SAE J3101
  • 14. 14 14 Layer 1 security Individual ECU ISO 14229-1 and SAE J3101 • ECU Protected Boot, Secure Flash • Authorization and Authentication Note: many ECUs “standard” thus are interchangeable between numerous makes and models. This implies that a vulnerability detected on a specific ECU can be exploited across many vehicle types across the industry!
  • 15. 15 15 Layer 2 – J1939-91 Part “C” In-Vehicle network security J1939-91C defines recommendations for: • Secure on-board communications between ECUs • Update General Vehicle Network Gateway recommendations and network topology reference related to J1939-31
  • 16. 16 16 Layer 3 – J1939-91 Part “A” Foundation layer security J1939-91A Defines THE RECOMMENDATIONS FOR SECURITY OF THE VEHICLE SIDE OF THE J1939-13 connector • Recommendations for vehicle communications functions with a device which is connected to J1939-13 interface - diagnostics interface security. [Similar to SAE J3138 diagnostics link security and SAE J3005-2 “dongle” device security] • General requirements for “Imposter Reporting” for devices that may spoof J1939 Source Addresses.
  • 17. 17 17 Layer 4 – SAE J1939-91 Part “B” Connected vehicle security Scope of SAE J1939-91B: Bi-Directional secure Over The Air (OTA) communications via a telematics interface to the vehicle • Extended Vehicle (ExVe) Systems and Intelligent Transportation Systems (ITS) • ISO 20077, ISO 20078, ISO 20080, etc. • UN R156 • ISO 24089 • ISO TC204 work items (ITS)
  • 18. 18 Future trends  SAE J1939-91 network security parts A, B and C are still WIP (Work in Progress)  SecOC and message authentication  UN R155 and GB/T certification for vehicle type approval  ISO/SAE 21434 “cookbook” including the V-model, SecSDLC (Secured Software Development Life Cycle), A-SPICE (Automotive Software Performance Improvement and Capability dEtermination)  V-XDR (Vehicle eXtended Detection and Response) systems a.k.a. IDPS (Intrusion Detection and Prevention System) connected to a SIEM (Security Information and Event Management) system at the V-SOC (Vehicle Security Operations Center)  CSMS and continuous vulnerabilities management automated tools  V2X including message plausibility and misbehavior detection  Automotive Ethernet  Connected and Automated Driving – platooning, etc.  Cooperative Intelligent Transportation System
  • 19. 19 About A global footprint Israel, North America, Europe & Asia Industry certifications A growing workforce ~220 employees 85% cyber experts A full lifecycle smart mobility platform ISO 9001, ISO/IEC 90003, TISAX Following A-SPICE Level 2 Founded in 2016 by leaders of Israel’s National Security Services — Selected cyber partner of the Volkswagen Group — Financially Strong & Profitable

Editor's Notes

  1. Conclusion: When performing TARA (Threat Analysis and Risk Assessment) the risks emerging from commercial vehicles is considerable higher than passenger vehicles, making them prime targets for attackers. The security solution evidently need to be different that the ones used for passenger vehicles.
  2. Heavy-duty vehicles such as trucks are part of the commercial vehicle group transporting daily tens of billions of US dollars of goods between various locations. The tremendous value of their goods can provide huge commercial motivation for hackers to attack these vehicles, disrupt their service which will untimely result in considerable financial and legal damages. Damage to mission-critical or military equipment transported by trucks can put a country at risk when affected by an attack by politically motivated individuals or organizations. Today’s focus will be on the heavy-duty commercial vehicles such a trucks and agriculture equipment. Vans, light commercial vehicles and similar are of less interest for this session.