SlideShare a Scribd company logo
© 2017 WIND RIVER. ALL RIGHTS RESERVED.
Autonomous Driving
End-to-End Security
Architecture
Andrei Kholodnyi
Wind River, Technology Office
2 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
The Choice for Systems That Cannot Fail
Powering 2 billion+ devices
Safety-certified devices running in
aviation, rail, auto, medical, robotic,
industrial, utility
300+ customers, 500+ projects, 90
aircraft in avionics market
Trusted by 9,000+ companies
Used by 40,000+ developers
3 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
COMMON ELEMENTS ON THE PATH TO AUTONOMY
Optimized performance
Safety focus
Health monitoring
Fail-safe
Partitioned systems
Reliability
Code reuse
Standardized interfaces
4 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
IVI and Cluster
Wind River Helix Cockpit
with Yocto Project IVI
Secure Linux
Media stack
Android containers
ADAS & Autonomous
Wind River Helix Drive
• 26262/ASIL-D Kernel
• Safety architecture
• Multi-Sensor fusion
• Motion planning framewrk
• Deterministic Actuation
• Advanced security
Gateways
Wind River Pulsar Linux
TCU
Smart antenna
WIND RIVER HELIX CHASSIS
Third-Party
Cloud Solutions
Wearables
Consumer Devices
Smart Homes
Infrastructure
Cloud Services
Wind River Helix App Cloud
cloud-based development
Wind River Helix Device
Cloud for device deployment
and management
SWLC Management
Wind River Helix CarSync
SOTA
FOTA
Diagnostics
Cloud Security
CSP with secure
connection
of IVN to EVN (IoT)
Sensors
Wind River Rocket
OS for MCUs
Security
Hyperscan
McAfee
Security Profile for
Wind River Linux
DPI
5 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
Hackathons in San Diego and Barcelona
INDUSTRY IS COMING TOGETHER
TO ADDRESS SECURITY...
BUT A LOT MORE IS NEEDED
6 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
THE EVOLUTION OF MALWARE
1980 1985 1990 1995 2000 2005
Source: escrypt
Increasing Digitalization and
Digital Integration
Security Escalation:
Hypothetical Vulnerabilities
Identified
Security Threats Become
Relevant in Practice
Regular Security Breaches
with Severe Damages
Auto
ICS
Mobile Phones
PC
Servers
ICS-CERT
(2008)
20152010 2020
???
CAESS
(2010)
GSM Interface
Exploit (2015)
Stuxnet and Duqu
(2010/11)
German Steel Plant
(2014)
AS/1 Card Cracking
(2009)
IMSI Catcher, NSA
iBanking (2014)
Cabir, Premium
SMS Fraud (2008)
DOS via SMS
DoCaMo (2008)
I Love You
(2010)
Heart Bleed
(2014)
Sasser
(2004)
Melissa
(1999)
Michelangelo
(1992)
Leandro
(1993)
Brain
(1986)
F. Cohen
(1981)
Confliker
(2008)
NSA, PRISM Reign
(2014)
SQL Slammer
(2003)
Code Red
(2001)
Morris Worm
(1988)
Tribe Flood DDOS
(1998)
CCC BTX Hack
(1984)
Creeper
(1971)
7 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
Source: http://www.informationisbeautiful.net/visualizations/million-lines-of-code/
Source: http://scan.coverity.com
INCREASING VEHICLE CODE COMPLEXITY
0.65 Defect Density per 1 KLOC
High-End Car Contains 100M LOC
Results in 65K Possible Defects
8 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
HACKING A CAR IS EASIER THAN EVER
Metasploit Framework Supports
CAN Bus Hacking
9 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
CONNECTED ARCHITECTURE
V2V
Radio Data
System (RDS)
Mobile
Devices
Electric
Chargers
External systems and
networks support new
services and interactions …
and increase risk.
Ad hoc
Network
Trusted Network
(e.g., Repair Shop)
Internet
Backbone
Automotive
Company
Application
Center
Local ServiceAP
Untrusted
Network
Local
Service
Open AP
Roadside
Unit (RSU)
3rd-Party
Application
Center
ISP
BS
BS
ISP
ISP
Unidirectional Communication
Bidirectional Communication
Access Point (AP)
GPS
EXTERNAL VEHICLE CONNECTIONS
10 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
RESPONSE FROM THE INDUSTRY
1. SAE J3101 – Hardware-Protected Security for Ground
Vehicle Applications
a) Secure boot
b) Secure storage
c) Secure execution environment
d) Other hardware capabilities …
e) OTA, authentication, detection, recovery
mechanisms …
2. SAE J3061 – Cybersecurity Guidebook for Cyber-Physical
Vehicle Systems
a) Enumerate all attack surfaces and conduct threat analysis
b) Reduce attack surface
c) Harden hardware and software
d) Perform security testing (penetration, fuzzing, etc.)
3. ISO 26262 2nd Edition
a) Potential interaction between safety and security
b) Cybersecurity threats to be analyzed as hazards
c) Monitoring activities for cybersecurity, including
incident response tracking
d) Refer also to SAE J3061, ISO/IEC 27001, and
ISO/IEC 15480
11 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
AUTOMATION LEVELS The industry is here
12 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
KEY DISTINCTIONS TRANSFORMING A CONNECTED CAR
INTO AN AUTOMATED DRIVING CAR
Level 3 – HMI notification will be provided to the driver to take over within
several seconds
More sensors – Cameras, LIDARs, RADARs, interior cameras
Communication with environment (other cars, structures, pedestrians,
etc.)
HD maps
Machine learning
Safety and security
13 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
• Finding but not
exploiting
vulnerabilities
• Start a trade war (e.g.,
attack an OEM)
• Infrastructure
disruption
• Misuse the system
(e.g., enable AD
feature)
• Retrieve activity
history
• Get access to OEM
data
WHO ARE THE THREAT AGENTS?
SECURITY RESEARCHERS • Political
• Financial
• Steal IP (algorithms)
• Damage OEM brand
value
• Control a vehicle for
personal harm
• Plant a backdoor
(revenge)
• Get firmware images
TERRORISTS
CYBER ESPIONAGE
CYBER HACKTIVISTS
INSIDERSNATION STATES
LAW ENFORCEMENT
CAR OWNERS
AN END-TO-END AD STACK PERSPECTIVE
IN-VEHICLE HIGH-PERFORMANCE DATA CENTER
Training Data
Set
Validation Data Set
High-Performance HW
Optimized Machine
Learning Model
OTA Update Infrastructure
AD ECU HW
Automated Driving
Middleware
AutonomousDriving
“Applications”
AutonomousDriving
“Applications”
AutonomousDriving
“Applications”
Operating System
Training
Optimization / Validation
Real-Time
Telemetry
and
Analytics
Secure,
Reliable,
Compressed
Model
Training Data Annotation
DL Model Optimizer
Real-World Simulator
Optimizer Tool
HW Optimized ML
Framework
Automated Driving
Middleware
Operating System
OTA Update Infrastructure
HD Maps
Optimized Machine
Learning Model
15 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
TECHNOLOGY AND TRENDS FOR HARDWARE
Computing Units
Comparator
16 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
END-TO-END DATA PATH SECURITY THREATS
Actuators
Control
Computing Unit 1
Environment
Model
Strategy
Trajectory
Planning
Sensors
HMI
External input
Interface
Processing
Internal processing
Processing
Communication
External output
Interface
Processing
Intergrity
Timing
Availability
Correlation
False positive notification
False negative notification
Delayed actuation
Missing actuation
Failure in enabling control
Failure in disabling control
User mistrust
User discomfort
Main Attack Surfaces Manipulation on Data-in-Motion Major Consequences
V2X
Communication
Cloud
Computing Unit 2
Environment
Model
Strategy
Trajectory
Planning
Comparator
Trajectory
Compare
Actuators
17 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
SDL ECU Physical Security
HW Security
DEFENSE IN DEPTH – ECU LEVEL
SW Platform Security
CPU Security
HSM
Intrusion Prevention
SW hardening
Perimeter Hardening
Compartmentalization
Access Protection
Security Management
Secure Boot, Key Storage, etc.
Application Security
Data-in-motion Security
App Management
SW Management
Secure Extensions (SGX, TrustZone)
Hypervisors, Containers, etc.
OS Hardening, Compiler Setting, etc.
Firewalls, Debug Ports, etc.
IDPS, Virus Scans, etc.
OTA, Patch Management
SCAP, SIEM, etc.
Secure Communication (e.g., SSL, TLS)
RBAC, Trustworthiness, etc.
Security Testing
Network-Based Penetration
Testing
Dynamic Binary Analysis
Static Code Analysis
FuzzingAFL, Trinity
E.g., Kali Linux
Static Code Analysis
Tools
angr, etc.
Security Tools
Threat Analysis
Threat Modeling
Tool
Automated frameworkmechaphish
18 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
ActuatorsSensors Main AD ECU
Hardware Security
DEFENSE IN DEPTH – INTRA-ECU LEVEL
Hardware Identity
Software Platform Security
ECU Authentication
ECU Authorization
ECU Topology Trustworthy
Application Security
Data-in-motion Trustworthy
Application RBAC
19 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
ESSENTIAL DEVELOPMENT PRACTICES
Threat Analysis
and Risk
Assessment
(TARA)
Security
Requirements
Implementation Security Testing Release
Define applicable
surface attacks
Define identified
threats
Assign severity
Threat analysis
Establish security
requirements
Create quality
gates
Security and
privacy risk
assessment
Use approve
tools
Develop security
measures
Deprecate unsafe
functions
Static analysis
Dynamic analysis
Fuzz testing
Attack surface
review
Verify security
measures
Incident response
plan
Final security
review
Documentation
Response
Execute incident
response plan
20 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
ROAD TO SELF-ADAPTIVE SECURITY
Good: Baseline
Security core features (HW)
Security core features (SW)
Standard compliance
Better:More Security
Services
Secure OTA
Hardware Identity
IDPS
Security management
Best: Self-Optimizing
Multi-agent systems with
the aim of self-healing and
self-recovery
Security analytics
PSIRT automation
Self-Adaptive
Systems that can evaluate
and modify their own
behavior to improve
efficiency
21 © 2017 WIND RIVER. ALL RIGHTS RESERVED.
SUMMARY
New security threats arise on the way to automated driving (machine
learning, AD system - driver interaction, V2X etc.)
Automotive industry works on new security standards
Defense in depth on ECU and intra-ECU levels
No safety without security (intersection of both)
Security best practicies are important (SDL, PSIRT)
Road to self-healing vehicles
™
22 © 2017 WIND RIVER. ALL RIGHTS RESERVED.

More Related Content

PPTX
Automotive infotainment system
PPTX
ISO/PAS 21448 (SOTIF) in the Development of ADAS and Autonomous Vehicles
PDF
Android Programming Basics
PPTX
Autosar fundamental
PDF
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
PPTX
Embedded system in automobile
PDF
Autosar basics by ARCCORE
PPTX
Cyber Security for the Connected Car
Automotive infotainment system
ISO/PAS 21448 (SOTIF) in the Development of ADAS and Autonomous Vehicles
Android Programming Basics
Autosar fundamental
Cybersecurity in Automotive Connected Vehicles and Growing Security Vulnerabi...
Embedded system in automobile
Autosar basics by ARCCORE
Cyber Security for the Connected Car

What's hot (20)

PPTX
Automotive Cybersecurity: The Gap Still Exists
PPTX
ISO Automotive,SAE 21434 Training, Road Vehicles Cybersecurity Engineering
PDF
Connected Car Security
PDF
테스터도 알아야 할 웹 개발(테스트 교육 3장 1절 부분발췌)
PDF
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
PDF
Android Threading
PPTX
Raspberry Pi (Introduction)
PPTX
Autonomous cars
PDF
[SiriusCon 2020] Realization of Model-Based Safety Analysis and Integration w...
PPTX
Advanced driver assistance systems
PPTX
Software defined vehicles,automotive standards (safety, security), agile cont...
PDF
Machine Learning for Self-Driving Cars
PPT
Native, Web or Hybrid Mobile App Development?
PDF
Introduction to Raspberrypi
PPTX
Internet of vehicles
PPTX
Infotainment system of car
PPTX
Automotive electronics
PPTX
Vehicle tracking system using gps and gsm
PPTX
PPTX
Over-the-air (OTA) updates and the Connected car
Automotive Cybersecurity: The Gap Still Exists
ISO Automotive,SAE 21434 Training, Road Vehicles Cybersecurity Engineering
Connected Car Security
테스터도 알아야 할 웹 개발(테스트 교육 3장 1절 부분발췌)
Connected & Autonomous vehicles: cybersecurity on a grand scale v1
Android Threading
Raspberry Pi (Introduction)
Autonomous cars
[SiriusCon 2020] Realization of Model-Based Safety Analysis and Integration w...
Advanced driver assistance systems
Software defined vehicles,automotive standards (safety, security), agile cont...
Machine Learning for Self-Driving Cars
Native, Web or Hybrid Mobile App Development?
Introduction to Raspberrypi
Internet of vehicles
Infotainment system of car
Automotive electronics
Vehicle tracking system using gps and gsm
Over-the-air (OTA) updates and the Connected car
Ad

Viewers also liked (20)

PDF
How to Become a Thought Leader in Your Niche
PDF
Enterprise Security Architecture
PDF
Basketball Analytics Using Motion Tracking Data
PDF
Amateur Hour: Why APTs Are The Least Of Your Worries
PDF
Security as Code: DOES15
PPTX
Security as Code
PPTX
Top 10 it security architect interview questions and answers
PPTX
음성인식 기술
PDF
Roadmap to the autonomous car
PDF
How to Become a Chief Data Officer - The 5 Golden Rules to Achieve Success
PDF
Introduction to International Standardization
PDF
The marriage between Cloud and ITSM
PDF
frog IoT Big Design IoT World Congress 2015
PDF
Senzations’15: Secure Internet of Things
PDF
IoT and BD Introduction
PDF
The reliability of IoT solutions in the healthcare sector
PDF
음성인식 기반 홈IoT 제품서비스 동향 및 시사점 스마트홈산업협회 (순천향대학교 김학용 교수)
PPTX
Operational Best Practices in the Cloud
PDF
음성인식 기술 및 활용 트렌드 (2013년)
PPTX
Keynote Session : Using Behavioral Psychology and Science of Habit to Change ...
How to Become a Thought Leader in Your Niche
Enterprise Security Architecture
Basketball Analytics Using Motion Tracking Data
Amateur Hour: Why APTs Are The Least Of Your Worries
Security as Code: DOES15
Security as Code
Top 10 it security architect interview questions and answers
음성인식 기술
Roadmap to the autonomous car
How to Become a Chief Data Officer - The 5 Golden Rules to Achieve Success
Introduction to International Standardization
The marriage between Cloud and ITSM
frog IoT Big Design IoT World Congress 2015
Senzations’15: Secure Internet of Things
IoT and BD Introduction
The reliability of IoT solutions in the healthcare sector
음성인식 기반 홈IoT 제품서비스 동향 및 시사점 스마트홈산업협회 (순천향대학교 김학용 교수)
Operational Best Practices in the Cloud
음성인식 기술 및 활용 트렌드 (2013년)
Keynote Session : Using Behavioral Psychology and Science of Habit to Change ...
Ad

Similar to Autonomous driving end-to-end security architecture (20)

PPTX
Automotive security (cvta)
PPTX
Connected Cars - Poster Child for the IoT Reality Check
PPTX
Advancing Active Safety for Next-Gen Automotive
PDF
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
PDF
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
PDF
Generación V de ciberataques
PDF
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
PPTX
Key Elements of a Security Delivery Platform
PDF
CSFI_ATC_Cyber_Security_Project
PDF
Mixed-critical adaptive AUTOSAR stack based on VxWorks, Linux, and virtualiza...
PDF
The Low-Risk Path to Building Autonomous Car Architectures
PDF
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
PPTX
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
PPTX
Removing Security Roadblocks to IoT Deployment Success
PDF
Creating Scalable IoT Strategies for Manufacturing, Transportation, Utilities...
PDF
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
PDF
The Four Horsemen of Mobile Security
PDF
Evolución de la Ciber Seguridad
PDF
Connected Cars: What Could Possibly Go Wrong
PDF
eMAS Multifactor Authentication
Automotive security (cvta)
Connected Cars - Poster Child for the IoT Reality Check
Advancing Active Safety for Next-Gen Automotive
Applying MBSE to the Industrial IoT: Using SysML with Connext DDS and Simulink
The Inside Story: Leveraging the IIC's Industrial Internet Security Framework
Generación V de ciberataques
Evolutionary ATM & Cyber Security - Selex ES - Angeloluca Barba
Key Elements of a Security Delivery Platform
CSFI_ATC_Cyber_Security_Project
Mixed-critical adaptive AUTOSAR stack based on VxWorks, Linux, and virtualiza...
The Low-Risk Path to Building Autonomous Car Architectures
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Criminal IP ASM | Threat Intelligence-based Automated Attack Surface Managem...
Removing Security Roadblocks to IoT Deployment Success
Creating Scalable IoT Strategies for Manufacturing, Transportation, Utilities...
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
The Four Horsemen of Mobile Security
Evolución de la Ciber Seguridad
Connected Cars: What Could Possibly Go Wrong
eMAS Multifactor Authentication

More from Andrei Kholodnyi (6)

PDF
TSN apps running on VxWorks RTOS as a KVM guest at the intelligent edge
PPTX
How to cross compile ROS2 distro by taken VxWorks RTOS as an example
PPTX
Turtlebot3: VxWorks running ROS2 as a real-time guest OS on Hypervisor
PDF
ROS2 on VxWorks - one project on Wind River Labs
PDF
ROS2 on VxWorks - Challenges in porting a modern, software framework to RTOS
PDF
Developing safety autonomous driving solutions based on the adaptive AUTOSAR ...
TSN apps running on VxWorks RTOS as a KVM guest at the intelligent edge
How to cross compile ROS2 distro by taken VxWorks RTOS as an example
Turtlebot3: VxWorks running ROS2 as a real-time guest OS on Hypervisor
ROS2 on VxWorks - one project on Wind River Labs
ROS2 on VxWorks - Challenges in porting a modern, software framework to RTOS
Developing safety autonomous driving solutions based on the adaptive AUTOSAR ...

Recently uploaded (20)

PPTX
Robot_ppt_YRG[1] [Read-Only]bestppt.pptx
PDF
Volvo EC20C Excavator Step-by-step Maintenance Instructions pdf
PDF
Volvo EC300D L EC300DL excavator weight Manuals.pdf
PPTX
Zeem: Transition Your Fleet, Seamlessly by Margaret Boelter
PDF
book-slidefsdljflsk fdslkfjslf sflgs.pdf
DOCX
lp of food hygiene.docxvvvvvvvvvvvvvvvvvvvvvvv
PPTX
Understanding Machine Learning with artificial intelligence.pptx
PDF
Volvo EC290C NL EC290CNL engine Manual.pdf
PDF
Volvo EC290C NL EC290CNL Hydraulic Excavator Specs Manual.pdf
PPTX
Culture by Design.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
PPTX
Intro to ISO 9001 2015.pptx for awareness
PPTX
capstoneoooooooooooooooooooooooooooooooooo
PDF
Presentation.pdf ...............gjtn....tdubsr..........
PDF
EC290C NL EC290CNL Volvo excavator specs.pdf
PDF
EC300D LR EC300DLR - Volvo Service Repair Manual.pdf
PPTX
UNIT-2(B) Organisavtional Appraisal.pptx
PDF
Caterpillar Cat 315C Excavator (Prefix CJC) Service Repair Manual Instant Dow...
PDF
3-REasdfghjkl;[poiunvnvncncn-Process.pdf
PPT
ACCOMPLISHMENT REPOERTS AND FILE OF GRADE 12 2021.ppt
PDF
Renesas R-Car_Cockpit_overview210214-Gen4.pdf
Robot_ppt_YRG[1] [Read-Only]bestppt.pptx
Volvo EC20C Excavator Step-by-step Maintenance Instructions pdf
Volvo EC300D L EC300DL excavator weight Manuals.pdf
Zeem: Transition Your Fleet, Seamlessly by Margaret Boelter
book-slidefsdljflsk fdslkfjslf sflgs.pdf
lp of food hygiene.docxvvvvvvvvvvvvvvvvvvvvvvv
Understanding Machine Learning with artificial intelligence.pptx
Volvo EC290C NL EC290CNL engine Manual.pdf
Volvo EC290C NL EC290CNL Hydraulic Excavator Specs Manual.pdf
Culture by Design.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Intro to ISO 9001 2015.pptx for awareness
capstoneoooooooooooooooooooooooooooooooooo
Presentation.pdf ...............gjtn....tdubsr..........
EC290C NL EC290CNL Volvo excavator specs.pdf
EC300D LR EC300DLR - Volvo Service Repair Manual.pdf
UNIT-2(B) Organisavtional Appraisal.pptx
Caterpillar Cat 315C Excavator (Prefix CJC) Service Repair Manual Instant Dow...
3-REasdfghjkl;[poiunvnvncncn-Process.pdf
ACCOMPLISHMENT REPOERTS AND FILE OF GRADE 12 2021.ppt
Renesas R-Car_Cockpit_overview210214-Gen4.pdf

Autonomous driving end-to-end security architecture

  • 1. © 2017 WIND RIVER. ALL RIGHTS RESERVED. Autonomous Driving End-to-End Security Architecture Andrei Kholodnyi Wind River, Technology Office
  • 2. 2 © 2017 WIND RIVER. ALL RIGHTS RESERVED. The Choice for Systems That Cannot Fail Powering 2 billion+ devices Safety-certified devices running in aviation, rail, auto, medical, robotic, industrial, utility 300+ customers, 500+ projects, 90 aircraft in avionics market Trusted by 9,000+ companies Used by 40,000+ developers
  • 3. 3 © 2017 WIND RIVER. ALL RIGHTS RESERVED. COMMON ELEMENTS ON THE PATH TO AUTONOMY Optimized performance Safety focus Health monitoring Fail-safe Partitioned systems Reliability Code reuse Standardized interfaces
  • 4. 4 © 2017 WIND RIVER. ALL RIGHTS RESERVED. IVI and Cluster Wind River Helix Cockpit with Yocto Project IVI Secure Linux Media stack Android containers ADAS & Autonomous Wind River Helix Drive • 26262/ASIL-D Kernel • Safety architecture • Multi-Sensor fusion • Motion planning framewrk • Deterministic Actuation • Advanced security Gateways Wind River Pulsar Linux TCU Smart antenna WIND RIVER HELIX CHASSIS Third-Party Cloud Solutions Wearables Consumer Devices Smart Homes Infrastructure Cloud Services Wind River Helix App Cloud cloud-based development Wind River Helix Device Cloud for device deployment and management SWLC Management Wind River Helix CarSync SOTA FOTA Diagnostics Cloud Security CSP with secure connection of IVN to EVN (IoT) Sensors Wind River Rocket OS for MCUs Security Hyperscan McAfee Security Profile for Wind River Linux DPI
  • 5. 5 © 2017 WIND RIVER. ALL RIGHTS RESERVED. Hackathons in San Diego and Barcelona INDUSTRY IS COMING TOGETHER TO ADDRESS SECURITY... BUT A LOT MORE IS NEEDED
  • 6. 6 © 2017 WIND RIVER. ALL RIGHTS RESERVED. THE EVOLUTION OF MALWARE 1980 1985 1990 1995 2000 2005 Source: escrypt Increasing Digitalization and Digital Integration Security Escalation: Hypothetical Vulnerabilities Identified Security Threats Become Relevant in Practice Regular Security Breaches with Severe Damages Auto ICS Mobile Phones PC Servers ICS-CERT (2008) 20152010 2020 ??? CAESS (2010) GSM Interface Exploit (2015) Stuxnet and Duqu (2010/11) German Steel Plant (2014) AS/1 Card Cracking (2009) IMSI Catcher, NSA iBanking (2014) Cabir, Premium SMS Fraud (2008) DOS via SMS DoCaMo (2008) I Love You (2010) Heart Bleed (2014) Sasser (2004) Melissa (1999) Michelangelo (1992) Leandro (1993) Brain (1986) F. Cohen (1981) Confliker (2008) NSA, PRISM Reign (2014) SQL Slammer (2003) Code Red (2001) Morris Worm (1988) Tribe Flood DDOS (1998) CCC BTX Hack (1984) Creeper (1971)
  • 7. 7 © 2017 WIND RIVER. ALL RIGHTS RESERVED. Source: http://www.informationisbeautiful.net/visualizations/million-lines-of-code/ Source: http://scan.coverity.com INCREASING VEHICLE CODE COMPLEXITY 0.65 Defect Density per 1 KLOC High-End Car Contains 100M LOC Results in 65K Possible Defects
  • 8. 8 © 2017 WIND RIVER. ALL RIGHTS RESERVED. HACKING A CAR IS EASIER THAN EVER Metasploit Framework Supports CAN Bus Hacking
  • 9. 9 © 2017 WIND RIVER. ALL RIGHTS RESERVED. CONNECTED ARCHITECTURE V2V Radio Data System (RDS) Mobile Devices Electric Chargers External systems and networks support new services and interactions … and increase risk. Ad hoc Network Trusted Network (e.g., Repair Shop) Internet Backbone Automotive Company Application Center Local ServiceAP Untrusted Network Local Service Open AP Roadside Unit (RSU) 3rd-Party Application Center ISP BS BS ISP ISP Unidirectional Communication Bidirectional Communication Access Point (AP) GPS EXTERNAL VEHICLE CONNECTIONS
  • 10. 10 © 2017 WIND RIVER. ALL RIGHTS RESERVED. RESPONSE FROM THE INDUSTRY 1. SAE J3101 – Hardware-Protected Security for Ground Vehicle Applications a) Secure boot b) Secure storage c) Secure execution environment d) Other hardware capabilities … e) OTA, authentication, detection, recovery mechanisms … 2. SAE J3061 – Cybersecurity Guidebook for Cyber-Physical Vehicle Systems a) Enumerate all attack surfaces and conduct threat analysis b) Reduce attack surface c) Harden hardware and software d) Perform security testing (penetration, fuzzing, etc.) 3. ISO 26262 2nd Edition a) Potential interaction between safety and security b) Cybersecurity threats to be analyzed as hazards c) Monitoring activities for cybersecurity, including incident response tracking d) Refer also to SAE J3061, ISO/IEC 27001, and ISO/IEC 15480
  • 11. 11 © 2017 WIND RIVER. ALL RIGHTS RESERVED. AUTOMATION LEVELS The industry is here
  • 12. 12 © 2017 WIND RIVER. ALL RIGHTS RESERVED. KEY DISTINCTIONS TRANSFORMING A CONNECTED CAR INTO AN AUTOMATED DRIVING CAR Level 3 – HMI notification will be provided to the driver to take over within several seconds More sensors – Cameras, LIDARs, RADARs, interior cameras Communication with environment (other cars, structures, pedestrians, etc.) HD maps Machine learning Safety and security
  • 13. 13 © 2017 WIND RIVER. ALL RIGHTS RESERVED. • Finding but not exploiting vulnerabilities • Start a trade war (e.g., attack an OEM) • Infrastructure disruption • Misuse the system (e.g., enable AD feature) • Retrieve activity history • Get access to OEM data WHO ARE THE THREAT AGENTS? SECURITY RESEARCHERS • Political • Financial • Steal IP (algorithms) • Damage OEM brand value • Control a vehicle for personal harm • Plant a backdoor (revenge) • Get firmware images TERRORISTS CYBER ESPIONAGE CYBER HACKTIVISTS INSIDERSNATION STATES LAW ENFORCEMENT CAR OWNERS
  • 14. AN END-TO-END AD STACK PERSPECTIVE IN-VEHICLE HIGH-PERFORMANCE DATA CENTER Training Data Set Validation Data Set High-Performance HW Optimized Machine Learning Model OTA Update Infrastructure AD ECU HW Automated Driving Middleware AutonomousDriving “Applications” AutonomousDriving “Applications” AutonomousDriving “Applications” Operating System Training Optimization / Validation Real-Time Telemetry and Analytics Secure, Reliable, Compressed Model Training Data Annotation DL Model Optimizer Real-World Simulator Optimizer Tool HW Optimized ML Framework Automated Driving Middleware Operating System OTA Update Infrastructure HD Maps Optimized Machine Learning Model
  • 15. 15 © 2017 WIND RIVER. ALL RIGHTS RESERVED. TECHNOLOGY AND TRENDS FOR HARDWARE Computing Units Comparator
  • 16. 16 © 2017 WIND RIVER. ALL RIGHTS RESERVED. END-TO-END DATA PATH SECURITY THREATS Actuators Control Computing Unit 1 Environment Model Strategy Trajectory Planning Sensors HMI External input Interface Processing Internal processing Processing Communication External output Interface Processing Intergrity Timing Availability Correlation False positive notification False negative notification Delayed actuation Missing actuation Failure in enabling control Failure in disabling control User mistrust User discomfort Main Attack Surfaces Manipulation on Data-in-Motion Major Consequences V2X Communication Cloud Computing Unit 2 Environment Model Strategy Trajectory Planning Comparator Trajectory Compare Actuators
  • 17. 17 © 2017 WIND RIVER. ALL RIGHTS RESERVED. SDL ECU Physical Security HW Security DEFENSE IN DEPTH – ECU LEVEL SW Platform Security CPU Security HSM Intrusion Prevention SW hardening Perimeter Hardening Compartmentalization Access Protection Security Management Secure Boot, Key Storage, etc. Application Security Data-in-motion Security App Management SW Management Secure Extensions (SGX, TrustZone) Hypervisors, Containers, etc. OS Hardening, Compiler Setting, etc. Firewalls, Debug Ports, etc. IDPS, Virus Scans, etc. OTA, Patch Management SCAP, SIEM, etc. Secure Communication (e.g., SSL, TLS) RBAC, Trustworthiness, etc. Security Testing Network-Based Penetration Testing Dynamic Binary Analysis Static Code Analysis FuzzingAFL, Trinity E.g., Kali Linux Static Code Analysis Tools angr, etc. Security Tools Threat Analysis Threat Modeling Tool Automated frameworkmechaphish
  • 18. 18 © 2017 WIND RIVER. ALL RIGHTS RESERVED. ActuatorsSensors Main AD ECU Hardware Security DEFENSE IN DEPTH – INTRA-ECU LEVEL Hardware Identity Software Platform Security ECU Authentication ECU Authorization ECU Topology Trustworthy Application Security Data-in-motion Trustworthy Application RBAC
  • 19. 19 © 2017 WIND RIVER. ALL RIGHTS RESERVED. ESSENTIAL DEVELOPMENT PRACTICES Threat Analysis and Risk Assessment (TARA) Security Requirements Implementation Security Testing Release Define applicable surface attacks Define identified threats Assign severity Threat analysis Establish security requirements Create quality gates Security and privacy risk assessment Use approve tools Develop security measures Deprecate unsafe functions Static analysis Dynamic analysis Fuzz testing Attack surface review Verify security measures Incident response plan Final security review Documentation Response Execute incident response plan
  • 20. 20 © 2017 WIND RIVER. ALL RIGHTS RESERVED. ROAD TO SELF-ADAPTIVE SECURITY Good: Baseline Security core features (HW) Security core features (SW) Standard compliance Better:More Security Services Secure OTA Hardware Identity IDPS Security management Best: Self-Optimizing Multi-agent systems with the aim of self-healing and self-recovery Security analytics PSIRT automation Self-Adaptive Systems that can evaluate and modify their own behavior to improve efficiency
  • 21. 21 © 2017 WIND RIVER. ALL RIGHTS RESERVED. SUMMARY New security threats arise on the way to automated driving (machine learning, AD system - driver interaction, V2X etc.) Automotive industry works on new security standards Defense in depth on ECU and intra-ECU levels No safety without security (intersection of both) Security best practicies are important (SDL, PSIRT) Road to self-healing vehicles
  • 22. ™ 22 © 2017 WIND RIVER. ALL RIGHTS RESERVED.