SlideShare a Scribd company logo
1 of 20
Download to read offline
IoT C ybersecurit y C hallenges
I n C o n n e c t e d C a r s t o wa r d s A u t o n o m o u s D r i v i n g
Telecom Valley, Security Camp. October 9th 2018
Cédric VAMOUR Cybersecurity Architect
Remote Hacking of Connected Cars
2
IoT Cybersecurity Challenges In Connected Cars
towards Autonomous Driving
REMOTE HACKING OF THE JEEP CHEROKEE3
4
REMOTE HACKING OF THE JEEP CHEROKEE
5
REMOTE HACKING OF THE JEEP CHEROKEE
6
REMOTE HACKING OF THE JEEP CHEROKEE
7
REMOTE HACKING OF THE JEEP CHEROKEE
8
REMOTE HACKING OF THE JEEP CHEROKEE
9
REMOTE HACKING OF THE JEEP CHEROKEE
10
REMOTE HACKING OF THE JEEP CHEROKEE
11
REMOTE HACKING OF THE JEEP CHEROKEE
Hackers Remotely Kill a Jeep on a Highway | WIRED (Video 5 min)
DEF CON 23 - Charlie Miller & Chris Valasek - Remote Exploitation of an Unaltered Passenger Vehicle
(Video 46 min)
Remote Exploitation of an Unaltered Passenger Vehicle (pdf 90p)
Remote Car Hacking - Jeep Cherokee (Video 9 min)
REMOTE HACKING OF THE JEEP CHEROKEE12
REMOTE HACKING OF THE JEEP CHEROKEE13
Attack Steps Vulnerabilities Responsibility
Get Remote Access No IP Filtering inside Sprint Network
Any IP can access any IP inside NW
Sprint: Cellular Operator
Get Service Internal IPC D-BUS Services bound to port
6667
Harman: U-Connect
Integrator
Get Privilege Execute Shell with root Access Harman: U-Connect
Integrator
Get CAN Vehicle Access Flashing interface through D-BUS with
unsigned Firmware
Harman: U-Connect
Integrator
Get Safety Access No Secure Gateway Jeep: Car Maker
Autopsy: What went wrong?
No significant « Crafted Exploit » was required.
Connected,
Autonomous Driving Cars are IoT Devices
IoT Cybersecurity Challenges In Connected Cars
towards Autonomous Driving
14
IoT Cybersecurity Challenges In Connected Cars
towards Autonomous Driving
15
MIL-STD-882E DoD
STRIDE Microsoft
Renault
Frameworks for
RISK ANALYSIS Methodology
Evaluate the risk level for each attack scenario
The risk is the combination of the impact with the likelihood
IoT Cybersecurity Challenges In Connected Cars
towards Autonomous Driving
Before:
✓Car theft
✓ Brand image
In the near Future:
✓Autonomous Driving
✓ Car sharing
✓ Robot TaxiPresently:
✓X by wire: Breaking or Steering
✓ Park assist
✓ Remote Start
✓ ADAS
✓ Personal Data
16
Evolution of the
IMPACT LEVEL in Automotive
IoT Cybersecurity Challenges In Connected Cars
towards Autonomous Driving
Before:
✓Physical Attack
✓ Remote Unlock
Next future:
✓Application Stores
Google Android Services, Alibaba…
✓ V2X, Internet Access
✓ Ethernet
✓ ADAS/AD
Presently:
✓Connected Car
✓ Cellular Network, WIFI, BT, Electric charger …
✓ FOTA, Remote Diagnostics
Remote Car Hacking - Jeep Cherokee
17
Evolution of the
LIKELIHOOD LEVEL
IoT Cybersecurity Challenges In Connected Cars
towards Autonomous Driving
18
In all systems, there are always vulnerabilities and exploits. By using multiple layers
to mitigate damage, even if one (or multiple) layers fails, the system is still protected.
Minimize Risks: A Multi-Layer
Vehicle Security Framework
IoT Cybersecurity Challenges In Connected Cars
towards Autonomous Driving
▪ Security must be an integral part of the system design
(not an afterthough)
▪ Security must follow Multi-layer approach, going
beyond only prevention: Prevent, Detect,
Reduce, and Fix
▪ with enough motivation and resources attackers will
find a way to circumvent intrussion prevention, we
need to detect attacks (runtime integrity protection,
IDS), reduce impact (process isolation, firewall), and
fix vulnerabilities (secure OTA updates), hence not rely
on a single countermeasure.
IoT Car
Provable
Security
(Authentification)
Physical
protection
Hardened
software
Secure Boot
Runtime
integrity
protection
Intrusion
Detection
System
Inter-
process
isolation
Firewall
OTA
updates
19
Minimize Risks: A Multi-Layer
Vehicle Security Framework
Questions?
IoT Cybersecurity Challenges In Connected Cars
towards Autonomous Driving
20

More Related Content

What's hot

Iot Line Fair 2015 /New Things About IoT
Iot Line Fair 2015 /New Things About IoTIot Line Fair 2015 /New Things About IoT
Iot Line Fair 2015 /New Things About IoTCeylan Parlakay
 
啟動物聯網新關鍵,未來由你「喚」醒
啟動物聯網新關鍵,未來由你「喚」醒啟動物聯網新關鍵,未來由你「喚」醒
啟動物聯網新關鍵,未來由你「喚」醒出門問問 | SEFF 雪夫
 
DWS15 - Digital Channels Plenary Session - Vertical industries race to digiti...
DWS15 - Digital Channels Plenary Session - Vertical industries race to digiti...DWS15 - Digital Channels Plenary Session - Vertical industries race to digiti...
DWS15 - Digital Channels Plenary Session - Vertical industries race to digiti...IDATE DigiWorld
 
A Look To The Future
A Look To The FutureA Look To The Future
A Look To The FutureJoanna Lovo
 
Smarter journeys start here - Francesco Violante
Smarter journeys start here - Francesco ViolanteSmarter journeys start here - Francesco Violante
Smarter journeys start here - Francesco ViolanteSITA
 
CommsMEA cover
CommsMEA coverCommsMEA cover
CommsMEA coverwhitear
 
Car talk - The Conversational Future of Automobiles
Car talk  - The  Conversational Future of AutomobilesCar talk  - The  Conversational Future of Automobiles
Car talk - The Conversational Future of AutomobilesSudha Jamthe
 
DWS15 - Future Networks Forum - The tale of two networks - Frederic Geraud De...
DWS15 - Future Networks Forum - The tale of two networks - Frederic Geraud De...DWS15 - Future Networks Forum - The tale of two networks - Frederic Geraud De...
DWS15 - Future Networks Forum - The tale of two networks - Frederic Geraud De...IDATE DigiWorld
 
New tools and resources for io t development from prototype to production
New tools and resources for io t development from prototype to productionNew tools and resources for io t development from prototype to production
New tools and resources for io t development from prototype to productionIntel® Software
 
Public policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesPublic policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesBill Harpley
 
Enabling the NDC age for the airline retail industry - Jorge diaz
Enabling the NDC age for the airline retail industry - Jorge diazEnabling the NDC age for the airline retail industry - Jorge diaz
Enabling the NDC age for the airline retail industry - Jorge diazSITA
 
Danny Shapiro at AI Frontiers : Accelerating the Race to AI Self-Driving Cars
Danny Shapiro at AI Frontiers : Accelerating the Race to AI Self-Driving Cars Danny Shapiro at AI Frontiers : Accelerating the Race to AI Self-Driving Cars
Danny Shapiro at AI Frontiers : Accelerating the Race to AI Self-Driving Cars AI Frontiers
 
Groupe ADP Digital Transformation - Gilles Leveque
Groupe ADP Digital Transformation - Gilles LevequeGroupe ADP Digital Transformation - Gilles Leveque
Groupe ADP Digital Transformation - Gilles LevequeSITA
 
Archive News & Video for Wednesday, 11 Jan 2012
Archive News & Video for Wednesday, 11 Jan 2012Archive News & Video for Wednesday, 11 Jan 2012
Archive News & Video for Wednesday, 11 Jan 2012worrieddeity9820
 
Competitive intelligence for an Autonomous World Sudha Jamthe's keynote
Competitive intelligence for an Autonomous World Sudha Jamthe's keynoteCompetitive intelligence for an Autonomous World Sudha Jamthe's keynote
Competitive intelligence for an Autonomous World Sudha Jamthe's keynoteSudha Jamthe
 
Assessing the prospects for telecoms operators in the ICT services markets - ...
Assessing the prospects for telecoms operators in the ICT services markets - ...Assessing the prospects for telecoms operators in the ICT services markets - ...
Assessing the prospects for telecoms operators in the ICT services markets - ...Ovum
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsSymantec
 

What's hot (20)

5 killer features in Market Networks
5 killer features in Market Networks 5 killer features in Market Networks
5 killer features in Market Networks
 
Iot Line Fair 2015 /New Things About IoT
Iot Line Fair 2015 /New Things About IoTIot Line Fair 2015 /New Things About IoT
Iot Line Fair 2015 /New Things About IoT
 
啟動物聯網新關鍵,未來由你「喚」醒
啟動物聯網新關鍵,未來由你「喚」醒啟動物聯網新關鍵,未來由你「喚」醒
啟動物聯網新關鍵,未來由你「喚」醒
 
DWS15 - Digital Channels Plenary Session - Vertical industries race to digiti...
DWS15 - Digital Channels Plenary Session - Vertical industries race to digiti...DWS15 - Digital Channels Plenary Session - Vertical industries race to digiti...
DWS15 - Digital Channels Plenary Session - Vertical industries race to digiti...
 
A Look To The Future
A Look To The FutureA Look To The Future
A Look To The Future
 
Smarter journeys start here - Francesco Violante
Smarter journeys start here - Francesco ViolanteSmarter journeys start here - Francesco Violante
Smarter journeys start here - Francesco Violante
 
CommsMEA cover
CommsMEA coverCommsMEA cover
CommsMEA cover
 
Car talk - The Conversational Future of Automobiles
Car talk  - The  Conversational Future of AutomobilesCar talk  - The  Conversational Future of Automobiles
Car talk - The Conversational Future of Automobiles
 
DWS15 - Future Networks Forum - The tale of two networks - Frederic Geraud De...
DWS15 - Future Networks Forum - The tale of two networks - Frederic Geraud De...DWS15 - Future Networks Forum - The tale of two networks - Frederic Geraud De...
DWS15 - Future Networks Forum - The tale of two networks - Frederic Geraud De...
 
New tools and resources for io t development from prototype to production
New tools and resources for io t development from prototype to productionNew tools and resources for io t development from prototype to production
New tools and resources for io t development from prototype to production
 
Aviat slides
Aviat slidesAviat slides
Aviat slides
 
Public policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous VehiclesPublic policy aspects of Connected and Autonomous Vehicles
Public policy aspects of Connected and Autonomous Vehicles
 
4 elit week 32
4 elit week 324 elit week 32
4 elit week 32
 
Enabling the NDC age for the airline retail industry - Jorge diaz
Enabling the NDC age for the airline retail industry - Jorge diazEnabling the NDC age for the airline retail industry - Jorge diaz
Enabling the NDC age for the airline retail industry - Jorge diaz
 
Danny Shapiro at AI Frontiers : Accelerating the Race to AI Self-Driving Cars
Danny Shapiro at AI Frontiers : Accelerating the Race to AI Self-Driving Cars Danny Shapiro at AI Frontiers : Accelerating the Race to AI Self-Driving Cars
Danny Shapiro at AI Frontiers : Accelerating the Race to AI Self-Driving Cars
 
Groupe ADP Digital Transformation - Gilles Leveque
Groupe ADP Digital Transformation - Gilles LevequeGroupe ADP Digital Transformation - Gilles Leveque
Groupe ADP Digital Transformation - Gilles Leveque
 
Archive News & Video for Wednesday, 11 Jan 2012
Archive News & Video for Wednesday, 11 Jan 2012Archive News & Video for Wednesday, 11 Jan 2012
Archive News & Video for Wednesday, 11 Jan 2012
 
Competitive intelligence for an Autonomous World Sudha Jamthe's keynote
Competitive intelligence for an Autonomous World Sudha Jamthe's keynoteCompetitive intelligence for an Autonomous World Sudha Jamthe's keynote
Competitive intelligence for an Autonomous World Sudha Jamthe's keynote
 
Assessing the prospects for telecoms operators in the ICT services markets - ...
Assessing the prospects for telecoms operators in the ICT services markets - ...Assessing the prospects for telecoms operators in the ICT services markets - ...
Assessing the prospects for telecoms operators in the ICT services markets - ...
 
WHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into CarsWHITE PAPER▶ Building Comprehensive Security Into Cars
WHITE PAPER▶ Building Comprehensive Security Into Cars
 

Similar to LES PROBLÉMATIQUES DE SÉCURITÉ POUR LES IOT – APPLICATION AU VÉHICULE AUTONOME

A 2008 perspective on the i-Car
A 2008 perspective on the i-CarA 2008 perspective on the i-Car
A 2008 perspective on the i-CarMarc Girardot
 
From Driver Distraction to Driver Augmentation: Open Source in Cars
From Driver Distraction to Driver Augmentation: Open Source in CarsFrom Driver Distraction to Driver Augmentation: Open Source in Cars
From Driver Distraction to Driver Augmentation: Open Source in CarsAlison Chaiken
 
20181116.smart can cable_v2
20181116.smart can cable_v220181116.smart can cable_v2
20181116.smart can cable_v2Mocke Tech
 
IRJET- The Smart in-Car Technology
IRJET-  	  The Smart in-Car TechnologyIRJET-  	  The Smart in-Car Technology
IRJET- The Smart in-Car TechnologyIRJET Journal
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)ParthaS
 
"Automakers at a Crossroads: How Embedded Vision and Autonomy Will Reshape th...
"Automakers at a Crossroads: How Embedded Vision and Autonomy Will Reshape th..."Automakers at a Crossroads: How Embedded Vision and Autonomy Will Reshape th...
"Automakers at a Crossroads: How Embedded Vision and Autonomy Will Reshape th...Edge AI and Vision Alliance
 
The Autonomous Revolution of Vehicles and Transportation
The Autonomous Revolution  of Vehicles and TransportationThe Autonomous Revolution  of Vehicles and Transportation
The Autonomous Revolution of Vehicles and TransportationMark Goldstein
 
Automotive Linux, Cybersecurity and Transparency
Automotive Linux, Cybersecurity and TransparencyAutomotive Linux, Cybersecurity and Transparency
Automotive Linux, Cybersecurity and TransparencyAlison Chaiken
 
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...apidays
 
Connectivity levels of autonomy by Jeff Hannah
Connectivity levels of autonomy by Jeff HannahConnectivity levels of autonomy by Jeff Hannah
Connectivity levels of autonomy by Jeff HannahHARMAN Connected Services
 
Connected Car Investment Thesis
Connected Car Investment ThesisConnected Car Investment Thesis
Connected Car Investment ThesisJames Harris
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
Future mobile networks connected and autonomous cars
Future mobile networks  connected and autonomous carsFuture mobile networks  connected and autonomous cars
Future mobile networks connected and autonomous carslammya aa
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...IJCI JOURNAL
 
Emocon 2015 - 웹 앱 개발자가 모르는 임베디드세상(오토모티브 월드)
Emocon 2015 - 웹 앱 개발자가 모르는 임베디드세상(오토모티브 월드)Emocon 2015 - 웹 앱 개발자가 모르는 임베디드세상(오토모티브 월드)
Emocon 2015 - 웹 앱 개발자가 모르는 임베디드세상(오토모티브 월드)이상한모임
 
Connected & Driverless vehicles: the road to Safe & Secure mobility?
Connected & Driverless vehicles: the road to Safe & Secure mobility?Connected & Driverless vehicles: the road to Safe & Secure mobility?
Connected & Driverless vehicles: the road to Safe & Secure mobility?Bill Harpley
 
ご紹介資料0929
ご紹介資料0929ご紹介資料0929
ご紹介資料0929Yuka Yano
 
Connected Cars Are the Next Must Have Consumer Electronics Device
Connected Cars Are the Next Must Have Consumer Electronics DeviceConnected Cars Are the Next Must Have Consumer Electronics Device
Connected Cars Are the Next Must Have Consumer Electronics DeviceCisco Jasper
 

Similar to LES PROBLÉMATIQUES DE SÉCURITÉ POUR LES IOT – APPLICATION AU VÉHICULE AUTONOME (20)

A 2008 perspective on the i-Car
A 2008 perspective on the i-CarA 2008 perspective on the i-Car
A 2008 perspective on the i-Car
 
From Driver Distraction to Driver Augmentation: Open Source in Cars
From Driver Distraction to Driver Augmentation: Open Source in CarsFrom Driver Distraction to Driver Augmentation: Open Source in Cars
From Driver Distraction to Driver Augmentation: Open Source in Cars
 
20181116.smart can cable_v2
20181116.smart can cable_v220181116.smart can cable_v2
20181116.smart can cable_v2
 
IRJET- The Smart in-Car Technology
IRJET-  	  The Smart in-Car TechnologyIRJET-  	  The Smart in-Car Technology
IRJET- The Smart in-Car Technology
 
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
Connected Cars Quickly Becoming Part of the Internet of Things (IoT)
 
"Automakers at a Crossroads: How Embedded Vision and Autonomy Will Reshape th...
"Automakers at a Crossroads: How Embedded Vision and Autonomy Will Reshape th..."Automakers at a Crossroads: How Embedded Vision and Autonomy Will Reshape th...
"Automakers at a Crossroads: How Embedded Vision and Autonomy Will Reshape th...
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
The Autonomous Revolution of Vehicles and Transportation
The Autonomous Revolution  of Vehicles and TransportationThe Autonomous Revolution  of Vehicles and Transportation
The Autonomous Revolution of Vehicles and Transportation
 
Automotive Linux, Cybersecurity and Transparency
Automotive Linux, Cybersecurity and TransparencyAutomotive Linux, Cybersecurity and Transparency
Automotive Linux, Cybersecurity and Transparency
 
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
INTERFACE by apidays 2023 - Fast & Furious: Hacking Cars with APIs, Shira Sar...
 
Connectivity levels of autonomy by Jeff Hannah
Connectivity levels of autonomy by Jeff HannahConnectivity levels of autonomy by Jeff Hannah
Connectivity levels of autonomy by Jeff Hannah
 
Automotive Hacking
Automotive Hacking Automotive Hacking
Automotive Hacking
 
Connected Car Investment Thesis
Connected Car Investment ThesisConnected Car Investment Thesis
Connected Car Investment Thesis
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
Future mobile networks connected and autonomous cars
Future mobile networks  connected and autonomous carsFuture mobile networks  connected and autonomous cars
Future mobile networks connected and autonomous cars
 
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
Advancements and Hurdles in the Evolution of Automotive Wireless Interfaces: ...
 
Emocon 2015 - 웹 앱 개발자가 모르는 임베디드세상(오토모티브 월드)
Emocon 2015 - 웹 앱 개발자가 모르는 임베디드세상(오토모티브 월드)Emocon 2015 - 웹 앱 개발자가 모르는 임베디드세상(오토모티브 월드)
Emocon 2015 - 웹 앱 개발자가 모르는 임베디드세상(오토모티브 월드)
 
Connected & Driverless vehicles: the road to Safe & Secure mobility?
Connected & Driverless vehicles: the road to Safe & Secure mobility?Connected & Driverless vehicles: the road to Safe & Secure mobility?
Connected & Driverless vehicles: the road to Safe & Secure mobility?
 
ご紹介資料0929
ご紹介資料0929ご紹介資料0929
ご紹介資料0929
 
Connected Cars Are the Next Must Have Consumer Electronics Device
Connected Cars Are the Next Must Have Consumer Electronics DeviceConnected Cars Are the Next Must Have Consumer Electronics Device
Connected Cars Are the Next Must Have Consumer Electronics Device
 

More from TelecomValley

Rapport d'activité SoFAB 2022
Rapport d'activité SoFAB 2022Rapport d'activité SoFAB 2022
Rapport d'activité SoFAB 2022TelecomValley
 
Rapport d'activité 2022
Rapport d'activité 2022Rapport d'activité 2022
Rapport d'activité 2022TelecomValley
 
Rapport d'activité 2021 - Telecom Valley
Rapport d'activité 2021 - Telecom ValleyRapport d'activité 2021 - Telecom Valley
Rapport d'activité 2021 - Telecom ValleyTelecomValley
 
Livre blanc "Les métamorphoses de l'entreprise face à l'imprévu - Tome 1 : la...
Livre blanc "Les métamorphoses de l'entreprise face à l'imprévu - Tome 1 : la...Livre blanc "Les métamorphoses de l'entreprise face à l'imprévu - Tome 1 : la...
Livre blanc "Les métamorphoses de l'entreprise face à l'imprévu - Tome 1 : la...TelecomValley
 
Rapport d'activité SoFAB 2020
Rapport d'activité SoFAB 2020Rapport d'activité SoFAB 2020
Rapport d'activité SoFAB 2020TelecomValley
 
Rapport d'activité Telecom Valley 2020
Rapport d'activité Telecom Valley 2020Rapport d'activité Telecom Valley 2020
Rapport d'activité Telecom Valley 2020TelecomValley
 
Rapport d'activité SoFAB 2019
Rapport d'activité SoFAB 2019Rapport d'activité SoFAB 2019
Rapport d'activité SoFAB 2019TelecomValley
 
Rapport d'activité Telecom Valley 2019
Rapport d'activité Telecom Valley 2019Rapport d'activité Telecom Valley 2019
Rapport d'activité Telecom Valley 2019TelecomValley
 
Revue de presse Telecom Valley - Février 2020
Revue de presse Telecom Valley - Février 2020Revue de presse Telecom Valley - Février 2020
Revue de presse Telecom Valley - Février 2020TelecomValley
 
Revue de presse Telecom Valley - Janvier 2020
Revue de presse Telecom Valley - Janvier 2020Revue de presse Telecom Valley - Janvier 2020
Revue de presse Telecom Valley - Janvier 2020TelecomValley
 
Revue de presse Telecom Valley - Décembre 2019
Revue de presse Telecom Valley - Décembre 2019Revue de presse Telecom Valley - Décembre 2019
Revue de presse Telecom Valley - Décembre 2019TelecomValley
 
Revue de presse Telecom Valley - Novembre 2019
Revue de presse Telecom Valley - Novembre 2019Revue de presse Telecom Valley - Novembre 2019
Revue de presse Telecom Valley - Novembre 2019TelecomValley
 
Revue de presse Telecom Valley - Octobre 2019
Revue de presse Telecom Valley - Octobre 2019Revue de presse Telecom Valley - Octobre 2019
Revue de presse Telecom Valley - Octobre 2019TelecomValley
 
Revue de presse Telecom Valley - Septembre 2019
Revue de presse Telecom Valley - Septembre 2019Revue de presse Telecom Valley - Septembre 2019
Revue de presse Telecom Valley - Septembre 2019TelecomValley
 
Présentation Team France Export régionale - 29/11/19
Présentation Team France Export régionale - 29/11/19Présentation Team France Export régionale - 29/11/19
Présentation Team France Export régionale - 29/11/19TelecomValley
 
2019 - NOURI - ALL4TEST- Le BDD pour decouvrir et specifier les besoins metie...
2019 - NOURI - ALL4TEST- Le BDD pour decouvrir et specifier les besoins metie...2019 - NOURI - ALL4TEST- Le BDD pour decouvrir et specifier les besoins metie...
2019 - NOURI - ALL4TEST- Le BDD pour decouvrir et specifier les besoins metie...TelecomValley
 
Tester c'est bien, monitorer c'est mieux - 2019 - KISSI - Soirée du Test Logi...
Tester c'est bien, monitorer c'est mieux - 2019 - KISSI - Soirée du Test Logi...Tester c'est bien, monitorer c'est mieux - 2019 - KISSI - Soirée du Test Logi...
Tester c'est bien, monitorer c'est mieux - 2019 - KISSI - Soirée du Test Logi...TelecomValley
 
Et si mon test était la spécification de mon application ? - JACOB - iWE - So...
Et si mon test était la spécification de mon application ? - JACOB - iWE - So...Et si mon test était la spécification de mon application ? - JACOB - iWE - So...
Et si mon test était la spécification de mon application ? - JACOB - iWE - So...TelecomValley
 
A la poursuite du bug perdu - 2019 - THEAULT - DI GIORGIO - ACPQUALIFE
A la poursuite du bug perdu - 2019 - THEAULT - DI GIORGIO - ACPQUALIFEA la poursuite du bug perdu - 2019 - THEAULT - DI GIORGIO - ACPQUALIFE
A la poursuite du bug perdu - 2019 - THEAULT - DI GIORGIO - ACPQUALIFETelecomValley
 
2019 - HAGE CHAHINE - ALTRAN - Presentation-DecouverteMondeAgile_V1.1
2019 - HAGE CHAHINE - ALTRAN - Presentation-DecouverteMondeAgile_V1.12019 - HAGE CHAHINE - ALTRAN - Presentation-DecouverteMondeAgile_V1.1
2019 - HAGE CHAHINE - ALTRAN - Presentation-DecouverteMondeAgile_V1.1TelecomValley
 

More from TelecomValley (20)

Rapport d'activité SoFAB 2022
Rapport d'activité SoFAB 2022Rapport d'activité SoFAB 2022
Rapport d'activité SoFAB 2022
 
Rapport d'activité 2022
Rapport d'activité 2022Rapport d'activité 2022
Rapport d'activité 2022
 
Rapport d'activité 2021 - Telecom Valley
Rapport d'activité 2021 - Telecom ValleyRapport d'activité 2021 - Telecom Valley
Rapport d'activité 2021 - Telecom Valley
 
Livre blanc "Les métamorphoses de l'entreprise face à l'imprévu - Tome 1 : la...
Livre blanc "Les métamorphoses de l'entreprise face à l'imprévu - Tome 1 : la...Livre blanc "Les métamorphoses de l'entreprise face à l'imprévu - Tome 1 : la...
Livre blanc "Les métamorphoses de l'entreprise face à l'imprévu - Tome 1 : la...
 
Rapport d'activité SoFAB 2020
Rapport d'activité SoFAB 2020Rapport d'activité SoFAB 2020
Rapport d'activité SoFAB 2020
 
Rapport d'activité Telecom Valley 2020
Rapport d'activité Telecom Valley 2020Rapport d'activité Telecom Valley 2020
Rapport d'activité Telecom Valley 2020
 
Rapport d'activité SoFAB 2019
Rapport d'activité SoFAB 2019Rapport d'activité SoFAB 2019
Rapport d'activité SoFAB 2019
 
Rapport d'activité Telecom Valley 2019
Rapport d'activité Telecom Valley 2019Rapport d'activité Telecom Valley 2019
Rapport d'activité Telecom Valley 2019
 
Revue de presse Telecom Valley - Février 2020
Revue de presse Telecom Valley - Février 2020Revue de presse Telecom Valley - Février 2020
Revue de presse Telecom Valley - Février 2020
 
Revue de presse Telecom Valley - Janvier 2020
Revue de presse Telecom Valley - Janvier 2020Revue de presse Telecom Valley - Janvier 2020
Revue de presse Telecom Valley - Janvier 2020
 
Revue de presse Telecom Valley - Décembre 2019
Revue de presse Telecom Valley - Décembre 2019Revue de presse Telecom Valley - Décembre 2019
Revue de presse Telecom Valley - Décembre 2019
 
Revue de presse Telecom Valley - Novembre 2019
Revue de presse Telecom Valley - Novembre 2019Revue de presse Telecom Valley - Novembre 2019
Revue de presse Telecom Valley - Novembre 2019
 
Revue de presse Telecom Valley - Octobre 2019
Revue de presse Telecom Valley - Octobre 2019Revue de presse Telecom Valley - Octobre 2019
Revue de presse Telecom Valley - Octobre 2019
 
Revue de presse Telecom Valley - Septembre 2019
Revue de presse Telecom Valley - Septembre 2019Revue de presse Telecom Valley - Septembre 2019
Revue de presse Telecom Valley - Septembre 2019
 
Présentation Team France Export régionale - 29/11/19
Présentation Team France Export régionale - 29/11/19Présentation Team France Export régionale - 29/11/19
Présentation Team France Export régionale - 29/11/19
 
2019 - NOURI - ALL4TEST- Le BDD pour decouvrir et specifier les besoins metie...
2019 - NOURI - ALL4TEST- Le BDD pour decouvrir et specifier les besoins metie...2019 - NOURI - ALL4TEST- Le BDD pour decouvrir et specifier les besoins metie...
2019 - NOURI - ALL4TEST- Le BDD pour decouvrir et specifier les besoins metie...
 
Tester c'est bien, monitorer c'est mieux - 2019 - KISSI - Soirée du Test Logi...
Tester c'est bien, monitorer c'est mieux - 2019 - KISSI - Soirée du Test Logi...Tester c'est bien, monitorer c'est mieux - 2019 - KISSI - Soirée du Test Logi...
Tester c'est bien, monitorer c'est mieux - 2019 - KISSI - Soirée du Test Logi...
 
Et si mon test était la spécification de mon application ? - JACOB - iWE - So...
Et si mon test était la spécification de mon application ? - JACOB - iWE - So...Et si mon test était la spécification de mon application ? - JACOB - iWE - So...
Et si mon test était la spécification de mon application ? - JACOB - iWE - So...
 
A la poursuite du bug perdu - 2019 - THEAULT - DI GIORGIO - ACPQUALIFE
A la poursuite du bug perdu - 2019 - THEAULT - DI GIORGIO - ACPQUALIFEA la poursuite du bug perdu - 2019 - THEAULT - DI GIORGIO - ACPQUALIFE
A la poursuite du bug perdu - 2019 - THEAULT - DI GIORGIO - ACPQUALIFE
 
2019 - HAGE CHAHINE - ALTRAN - Presentation-DecouverteMondeAgile_V1.1
2019 - HAGE CHAHINE - ALTRAN - Presentation-DecouverteMondeAgile_V1.12019 - HAGE CHAHINE - ALTRAN - Presentation-DecouverteMondeAgile_V1.1
2019 - HAGE CHAHINE - ALTRAN - Presentation-DecouverteMondeAgile_V1.1
 

Recently uploaded

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 

LES PROBLÉMATIQUES DE SÉCURITÉ POUR LES IOT – APPLICATION AU VÉHICULE AUTONOME

  • 1. IoT C ybersecurit y C hallenges I n C o n n e c t e d C a r s t o wa r d s A u t o n o m o u s D r i v i n g Telecom Valley, Security Camp. October 9th 2018 Cédric VAMOUR Cybersecurity Architect
  • 2. Remote Hacking of Connected Cars 2 IoT Cybersecurity Challenges In Connected Cars towards Autonomous Driving
  • 3. REMOTE HACKING OF THE JEEP CHEROKEE3
  • 4. 4 REMOTE HACKING OF THE JEEP CHEROKEE
  • 5. 5 REMOTE HACKING OF THE JEEP CHEROKEE
  • 6. 6 REMOTE HACKING OF THE JEEP CHEROKEE
  • 7. 7 REMOTE HACKING OF THE JEEP CHEROKEE
  • 8. 8 REMOTE HACKING OF THE JEEP CHEROKEE
  • 9. 9 REMOTE HACKING OF THE JEEP CHEROKEE
  • 10. 10 REMOTE HACKING OF THE JEEP CHEROKEE
  • 11. 11 REMOTE HACKING OF THE JEEP CHEROKEE
  • 12. Hackers Remotely Kill a Jeep on a Highway | WIRED (Video 5 min) DEF CON 23 - Charlie Miller & Chris Valasek - Remote Exploitation of an Unaltered Passenger Vehicle (Video 46 min) Remote Exploitation of an Unaltered Passenger Vehicle (pdf 90p) Remote Car Hacking - Jeep Cherokee (Video 9 min) REMOTE HACKING OF THE JEEP CHEROKEE12
  • 13. REMOTE HACKING OF THE JEEP CHEROKEE13 Attack Steps Vulnerabilities Responsibility Get Remote Access No IP Filtering inside Sprint Network Any IP can access any IP inside NW Sprint: Cellular Operator Get Service Internal IPC D-BUS Services bound to port 6667 Harman: U-Connect Integrator Get Privilege Execute Shell with root Access Harman: U-Connect Integrator Get CAN Vehicle Access Flashing interface through D-BUS with unsigned Firmware Harman: U-Connect Integrator Get Safety Access No Secure Gateway Jeep: Car Maker Autopsy: What went wrong? No significant « Crafted Exploit » was required.
  • 14. Connected, Autonomous Driving Cars are IoT Devices IoT Cybersecurity Challenges In Connected Cars towards Autonomous Driving 14
  • 15. IoT Cybersecurity Challenges In Connected Cars towards Autonomous Driving 15 MIL-STD-882E DoD STRIDE Microsoft Renault Frameworks for RISK ANALYSIS Methodology Evaluate the risk level for each attack scenario The risk is the combination of the impact with the likelihood
  • 16. IoT Cybersecurity Challenges In Connected Cars towards Autonomous Driving Before: ✓Car theft ✓ Brand image In the near Future: ✓Autonomous Driving ✓ Car sharing ✓ Robot TaxiPresently: ✓X by wire: Breaking or Steering ✓ Park assist ✓ Remote Start ✓ ADAS ✓ Personal Data 16 Evolution of the IMPACT LEVEL in Automotive
  • 17. IoT Cybersecurity Challenges In Connected Cars towards Autonomous Driving Before: ✓Physical Attack ✓ Remote Unlock Next future: ✓Application Stores Google Android Services, Alibaba… ✓ V2X, Internet Access ✓ Ethernet ✓ ADAS/AD Presently: ✓Connected Car ✓ Cellular Network, WIFI, BT, Electric charger … ✓ FOTA, Remote Diagnostics Remote Car Hacking - Jeep Cherokee 17 Evolution of the LIKELIHOOD LEVEL
  • 18. IoT Cybersecurity Challenges In Connected Cars towards Autonomous Driving 18 In all systems, there are always vulnerabilities and exploits. By using multiple layers to mitigate damage, even if one (or multiple) layers fails, the system is still protected. Minimize Risks: A Multi-Layer Vehicle Security Framework
  • 19. IoT Cybersecurity Challenges In Connected Cars towards Autonomous Driving ▪ Security must be an integral part of the system design (not an afterthough) ▪ Security must follow Multi-layer approach, going beyond only prevention: Prevent, Detect, Reduce, and Fix ▪ with enough motivation and resources attackers will find a way to circumvent intrussion prevention, we need to detect attacks (runtime integrity protection, IDS), reduce impact (process isolation, firewall), and fix vulnerabilities (secure OTA updates), hence not rely on a single countermeasure. IoT Car Provable Security (Authentification) Physical protection Hardened software Secure Boot Runtime integrity protection Intrusion Detection System Inter- process isolation Firewall OTA updates 19 Minimize Risks: A Multi-Layer Vehicle Security Framework
  • 20. Questions? IoT Cybersecurity Challenges In Connected Cars towards Autonomous Driving 20