SlideShare uma empresa Scribd logo
1 de 12
Baixar para ler offline
5/26/2012




     Security for Automotive with Multi-
      core-based Embedded Systems


                                     Claudia Eckert
                                     TU München &
                                     Fraunhofer AISEC
                                 1

                                     DATE 2012, 16. March 2012
                                     Dresden

              C. Eckert, AISEC




Outline



1.         Introduction
2.         Security Issues 
3.         Multi‐core architectures: Risks
4.         Multi‐core architectures: Opportunities
5.
5          Research Challenges
           Research Challenges
6.         Take Home Message


©C. Eckert, AISEC,




                                                                        1
5/26/2012




1. Introduction
   Automotive : Today

• > 80 ECUs, security/safety sensitive services
• Tailored ECUs for additional functions
• High energy consumption
• Expensive 




©C. Eckert, AISEC,

                                                                                                3




1. Introduction Tomorrow: more services
                more computational power required
                                        Intelligent Car
                                        Routing and                     Traffic info and
                       Road Billing
                                        Navigation
                                        N i ti                          web cams



                                                                                (Location based)
                     Fleet Management                                           web information



            GPS Street                                                          Inter Car
            Parking                                                             Communication



                      Parking Slots
                      Reservation                         Contactless Gas        Mobile TV
                                                          Station


   High demand for few highly integrated multi-core systems

©C. Eckert, AISEC,




                                                                                                           2
5/26/2012




Outline



1.         Introduction
2.         Security Issues 
3.         Multi‐core architectures: Risks
4.         Multi‐core architectures: Opportunities
5.
5          Research Challenges
           Research Challenges
6.         Take Home Message


©C. Eckert, AISEC,




2. Security Issues
   Automotive Security: Today

Security level today: 
Security level today:
Do modern cars already provide 
• Secure execution environment?
• Hardened ECUs or security modules to reduce 
  vulnerabilities? 
• Security services like intrusion detection, access 
  controls, self‐monitoring?


©C. Eckert, AISEC,

                                                        6




                                                                   3
5/26/2012




    2. Security Issues
       Automotive: Security Risks

       Vulnerabilities: e.g.
       • ECUs which are not hardened:
         Code injection, data manipulation
       • Software updates via CAN/Ethernet
         insufficient access control (or even missing)
       • External interfaces enable :
         remote access/attacks: NFC, C2C



    ©C. Eckert, AISEC,




    2. Security Issues
       Automotive: Security Risks

    M2M interfaces (GSM) 
    • Communication with backend of OEM 
    • Internet access, added‐value services
    Vulnerabilities: 
    • Car logs into every GSM BTS
    • Attacks  with malformed  
      messages from GSM network 
    • Possible damages: 
      manipulation, DoS, malware
    ©C. Eckert, AISEC,

8                                                        8




                                                                    4
5/26/2012




2. Security Issues
   Automotive: Security Risks




©C. Eckert, AISEC,




 Lessons Learned so far


 Multi‐cores 
 • Multi‐core architectures are required to meet
       l         h                     d
    Increasing demands for computational power
    Demands to reduce power consumption
 • Cars are already  exposed to severe security risks
 Questions
 Q    i
 • Multi‐core: a security enhancing technology ?
 • Multi‐core: even more security/safety risks ?
©C. Eckert, AISEC,

                                                        10




                                                                    5
5/26/2012




Outline



1.         Introduction
2.         Security Issues
3.         Multi‐core architectures: Risks
4.         Multi‐core architectures: Opportunities
5.
5          Research Challenges
           Research Challenges
6.         Take Home Message


©C. Eckert, AISEC,




3. Multi-cores
   Even more risks …
Shared resources: memory, caches, network
 • Data leakages: confidentiality, integrity
        l k             fd     l
 • Covert channels, e.g. cache 
   replacement strategy
 • Denial‐of‐service: e.g. occupying 
   shared memory regions: starving 
   safety‐critical tasks
Vulnerable system software, missing separation
• e.g. BO attacks: malware intrusion, manipulation, …
©C. Eckert, AISEC,

                                                     12




                                                                 6
5/26/2012




Outline



1.         Introduction
2.         Security Issues
3.         Multi‐core architectures: Risks
4.         Multi‐core architectures: Opportunities
5.
5          Research Challenges
           Research Challenges
6.         Take Home Message


©C. Eckert, AISEC,




4. Multi-cores
   Opportunities
Attack tolerance
                                                                  FA
e.g. Fault injections with laser
                                                                       not auth


• Inject jump to bypass security checks
                                  FA
                                           0x00            0x80
• Modify register content         00000000             10000000
• Modify alarm signals             alarm
                                          OK

Multi‐core:
  • Redundant cores to tolerate fault‐attacks:  e.g. SLE 78 
    redundant computation, majority voting, monitoring
©C. Eckert, AISEC,
                                                  14
                                                             14




                                                                                         7
5/26/2012




4. Multi-cores
   Opportunities

 Attack tolerance
 Attack tolerance
 e.g. side‐channel attacks
• Timing (execution time of cryptographic operations) and 
  power (power consumption)  attacks  to crack keys   
Multi‐Core
 • Increased resistance against side‐channel attacks:
    e.g. using multi‐cores for randomized  execution of 
    cryptographic algorithms
©C. Eckert, AISEC,

                                                     15




4. Multi-cores
   Opportunities

Attack tolerance
Attack tolerance
e.g. resistance against software‐based modifications 




   • Redundant computation in different cores to detect 
     abnormal behavior (e.g. manipulated code) 
©C. Eckert, AISEC,

                                                     16




                                                                    8
5/26/2012




4. Multi-cores
   Opportunities
Take advantage of multi‐cores
   • Assign security/safety critical  tasks to dedicated 
     security cores (e.g. hardened cores):
        • secure execution environment
        • strict access controls
   • Distribute sensitive functions 
     between different cores to 
     enhance resistance against  
     reverse engineering attacks
©C. Eckert, AISEC,

                                                            17




4. Multi-cores
   Opportunities

Self‐monitoring
 • Separate a security core from data processing cores :
   • Trusted OSs in monitoring system 
   • Collect data in userland OS (e.g. syscall traces)
   • Securely analyze data to detect malbehavior
   • Dynamic health monitoring
 • Extend  VMI to enhance 
   malware detection on 
   multi‐cores
©C. Eckert, AISEC,

                                                            18




                                                                        9
5/26/2012




Outline



1.         Introduction
2.         Security Issues
3.         Multi‐core architectures: Opportunities
4.         Multi‐core architectures: Risks
5.         Research Challenges
           Research Challenges
6.         Take Home Message


©C. Eckert, AISEC,




5. Research Challenges
   Secure Architectures
                                          other System on Chip
                                M2M
                                    SIM
                                                                 ID        ID
                                   GSM                      Actuator    Sensor


                              Trust
                     Core      OS Core     IO-interfaces         Peripherals
                      1             2


                     Core i      Core n   RAM       Flash           Hardware
                                                                    Security
          System on Chip                                             Module

©C. Eckert, AISEC,




                                                                                       10
5/26/2012




   5. Research Challenges
      Secure Elements

 Scalable hardware trust anchors: 
 • Secure storage: 
   keys, credentials, access tokens
 • Integrity measurement: 
   static (TPM‐like)  as well as dynamic attestations
 • Support for virtualized execution environments:
   attaching a virtual Secure Element to individual 
   environments: Secure Boot, secure Updates , … 
 • PUF technology for secure identification
 ©C. Eckert, AISEC,

                                                                21




   5. Research Challenges
      Secure Software
Software Hardening
• Compile‐time Hardening                             Rich OS
• Operating System Extensions                  3rd Party Application
• Process Virtualization / Sandboxing
                                                      Android
• System Virtualization         Secure OS       including Dalvik VM

Secure Monitoring
Secure Monitoring               Trustworthy           L4Linux
                                component      with Android patches
• VMI for malware detection
                                       VMM (L4 Microkernel)
• Attack tolerance
                                             Multi-core (SoC)

 ©C. Eckert, AISEC,

                                                                22




                                                                             11
5/26/2012




6. Take Home Message

Automotive domain: High demand for
•    openess, value-added services, cost and energy efficiency
•    Security is already a big issue (e.g. impact on safety)
Multi-core architectures: security enhancing technology
•    Attack tolerance, self-monitoring
•    Partitioning: critical, non-critical
Research issues: security architectures & controls & crypto

    Secure multi-cores: key enabling technology for CPS!

        ©C. Eckert, AISEC,




                         Thank you for your Attention




                                   Claudia Eckert
                                   Fraunhofer AISEC, Munich
                                   TU Munich, Chair for IT Security
                                   E-Mail: claudia.eckert@aisec.fraunhofer.de
                                   http://www.aisec.fraunhofer.de
                                   http://www aisec fraunhofer de




        ©C. Eckert, AISEC,




                                                                                      12

Mais conteúdo relacionado

Semelhante a Security for Automotive with Multicore-based Embedded Systems

IoT workshop - Is 1kV Also Enough for IoT ESD Protection – Do Current Test Me...
IoT workshop - Is 1kV Also Enough for IoT ESD Protection – Do Current Test Me...IoT workshop - Is 1kV Also Enough for IoT ESD Protection – Do Current Test Me...
IoT workshop - Is 1kV Also Enough for IoT ESD Protection – Do Current Test Me...Sofics
 
Review of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxReview of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxssusere142fe
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptxSuprithC2
 
40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg40 Jahre Informatik Hamburg
40 Jahre Informatik HamburgFraunhofer AISEC
 
Cyber security and Industry.pptx
Cyber security and Industry.pptxCyber security and Industry.pptx
Cyber security and Industry.pptxSabahat Waheed
 
Developing functional safety systems with arm architecture solutions stroud
Developing functional safety systems with arm architecture solutions   stroudDeveloping functional safety systems with arm architecture solutions   stroud
Developing functional safety systems with arm architecture solutions stroudArm
 
Bryan Singer S4 Presentation
Bryan Singer   S4 PresentationBryan Singer   S4 Presentation
Bryan Singer S4 Presentationbsinger74
 
Fundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cipFundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cipRoutecoMarketing
 
ECI Communication Challenges for Power Utilities EUW2017
ECI Communication Challenges for Power Utilities EUW2017ECI Communication Challenges for Power Utilities EUW2017
ECI Communication Challenges for Power Utilities EUW2017ECI – THE ELASTIC NETWORK™
 
HiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentationHiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentationVEDLIoT Project
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetIvan Carmona
 
Eliptic Curve cryptography based on image
Eliptic Curve cryptography based on imageEliptic Curve cryptography based on image
Eliptic Curve cryptography based on image4HG20EC020MouneshGow
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksYokogawa1
 
Presentation reliable NoC
Presentation reliable NoCPresentation reliable NoC
Presentation reliable NoCshahanianmol
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT GatewayLF Events
 
Enabling utility protocols in Edge gateways
Enabling utility protocols in Edge gatewaysEnabling utility protocols in Edge gateways
Enabling utility protocols in Edge gatewaysNirmal Thaliyil
 

Semelhante a Security for Automotive with Multicore-based Embedded Systems (20)

IoT workshop - Is 1kV Also Enough for IoT ESD Protection – Do Current Test Me...
IoT workshop - Is 1kV Also Enough for IoT ESD Protection – Do Current Test Me...IoT workshop - Is 1kV Also Enough for IoT ESD Protection – Do Current Test Me...
IoT workshop - Is 1kV Also Enough for IoT ESD Protection – Do Current Test Me...
 
Review of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxReview of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptx
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
 
ROUGH DOC.437
ROUGH DOC.437ROUGH DOC.437
ROUGH DOC.437
 
40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg
 
IJCSE Paper
IJCSE PaperIJCSE Paper
IJCSE Paper
 
Cyber security and Industry.pptx
Cyber security and Industry.pptxCyber security and Industry.pptx
Cyber security and Industry.pptx
 
Developing functional safety systems with arm architecture solutions stroud
Developing functional safety systems with arm architecture solutions   stroudDeveloping functional safety systems with arm architecture solutions   stroud
Developing functional safety systems with arm architecture solutions stroud
 
Challenges of the io t v1
Challenges of the io t v1Challenges of the io t v1
Challenges of the io t v1
 
Bryan Singer S4 Presentation
Bryan Singer   S4 PresentationBryan Singer   S4 Presentation
Bryan Singer S4 Presentation
 
Fundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cipFundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cip
 
ECI Communication Challenges for Power Utilities EUW2017
ECI Communication Challenges for Power Utilities EUW2017ECI Communication Challenges for Power Utilities EUW2017
ECI Communication Challenges for Power Utilities EUW2017
 
Sgcp12 england-sentec
Sgcp12 england-sentecSgcp12 england-sentec
Sgcp12 england-sentec
 
HiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentationHiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentation
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
Eliptic Curve cryptography based on image
Eliptic Curve cryptography based on imageEliptic Curve cryptography based on image
Eliptic Curve cryptography based on image
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
Presentation reliable NoC
Presentation reliable NoCPresentation reliable NoC
Presentation reliable NoC
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Enabling utility protocols in Edge gateways
Enabling utility protocols in Edge gatewaysEnabling utility protocols in Edge gateways
Enabling utility protocols in Edge gateways
 

Mais de Fraunhofer AISEC

Fraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vornFraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vornFraunhofer AISEC
 
Produktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische GeräteProduktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische GeräteFraunhofer AISEC
 
Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013Fraunhofer AISEC
 
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidNative Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidFraunhofer AISEC
 
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition Fraunhofer AISEC
 
Marktchancen mit IT-Sicherheit
Marktchancen mit IT-SicherheitMarktchancen mit IT-Sicherheit
Marktchancen mit IT-SicherheitFraunhofer AISEC
 
Cybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for SecurityCybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for SecurityFraunhofer AISEC
 
Sicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der ITSicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der ITFraunhofer AISEC
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidFraunhofer AISEC
 
PEP - Protecting Electronic Products
PEP - Protecting Electronic ProductsPEP - Protecting Electronic Products
PEP - Protecting Electronic ProductsFraunhofer AISEC
 
Firmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote UpdateFirmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote UpdateFraunhofer AISEC
 
Cyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der WissenschaftCyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der WissenschaftFraunhofer AISEC
 
IKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealthIKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealthFraunhofer AISEC
 
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht ForschungInnovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht ForschungFraunhofer AISEC
 

Mais de Fraunhofer AISEC (20)

Fraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vornFraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vorn
 
Internet of (Every)Thing
Internet of (Every)ThingInternet of (Every)Thing
Internet of (Every)Thing
 
App Ray: 10000 Apps
App Ray: 10000 AppsApp Ray: 10000 Apps
App Ray: 10000 Apps
 
Produktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische GeräteProduktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische Geräte
 
Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013
 
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidNative Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on Android
 
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition
 
Marktchancen mit IT-Sicherheit
Marktchancen mit IT-SicherheitMarktchancen mit IT-Sicherheit
Marktchancen mit IT-Sicherheit
 
Cybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for SecurityCybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for Security
 
Sicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der ITSicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der IT
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
 
PEP - Protecting Electronic Products
PEP - Protecting Electronic ProductsPEP - Protecting Electronic Products
PEP - Protecting Electronic Products
 
Firmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote UpdateFirmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote Update
 
Infografik Produktschutz
Infografik ProduktschutzInfografik Produktschutz
Infografik Produktschutz
 
Cyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der WissenschaftCyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der Wissenschaft
 
Produktschutz Infografik
Produktschutz InfografikProduktschutz Infografik
Produktschutz Infografik
 
IKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealthIKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealth
 
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht ForschungInnovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht Forschung
 
Alan Turing
Alan Turing Alan Turing
Alan Turing
 
Sicherheit im Smart Grid
Sicherheit im Smart GridSicherheit im Smart Grid
Sicherheit im Smart Grid
 

Último

一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样wsppdmt
 
Is Your BMW PDC Malfunctioning Discover How to Easily Reset It
Is Your BMW PDC Malfunctioning Discover How to Easily Reset ItIs Your BMW PDC Malfunctioning Discover How to Easily Reset It
Is Your BMW PDC Malfunctioning Discover How to Easily Reset ItEuroService Automotive
 
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best ServiceMuslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best Servicemeghakumariji156
 
West Bengal Factories Rules, 1958.bfpptx
West Bengal Factories Rules, 1958.bfpptxWest Bengal Factories Rules, 1958.bfpptx
West Bengal Factories Rules, 1958.bfpptxPankajBhagat45
 
01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc
01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc
01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.docazrfdstgdgdfh
 
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...nirzagarg
 
9352852248 Call Girls Gota Escort Service Available 24×7 In Gota
9352852248 Call Girls  Gota Escort Service Available 24×7 In Gota9352852248 Call Girls  Gota Escort Service Available 24×7 In Gota
9352852248 Call Girls Gota Escort Service Available 24×7 In Gotagargpaaro
 
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In DubaiStacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubaikojalkojal131
 
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一avy6anjnd
 
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理ezgenuh
 
Why Does My Porsche Cayenne's Exhaust Sound So Loud
Why Does My Porsche Cayenne's Exhaust Sound So LoudWhy Does My Porsche Cayenne's Exhaust Sound So Loud
Why Does My Porsche Cayenne's Exhaust Sound So LoudRoyalty Auto Service
 
Nangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi Jat
Nangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi JatNangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi Jat
Nangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi Jatmeghakumariji156
 
John deere 7200r 7230R 7260R Problems Repair Manual
John deere 7200r 7230R 7260R Problems Repair ManualJohn deere 7200r 7230R 7260R Problems Repair Manual
John deere 7200r 7230R 7260R Problems Repair ManualExcavator
 
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5Bavarian Workshop
 
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证62qaf0hi
 
JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...
JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...
JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...Excavator
 
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一qh1ao5mm
 
Electronic Stability Program. (ESP).pptx
Electronic Stability Program. (ESP).pptxElectronic Stability Program. (ESP).pptx
Electronic Stability Program. (ESP).pptxmohamedAabdeltwab
 
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...gajnagarg
 
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...gajnagarg
 

Último (20)

一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
一比一原版西安大略大学毕业证(UWO毕业证)成绩单原件一模一样
 
Is Your BMW PDC Malfunctioning Discover How to Easily Reset It
Is Your BMW PDC Malfunctioning Discover How to Easily Reset ItIs Your BMW PDC Malfunctioning Discover How to Easily Reset It
Is Your BMW PDC Malfunctioning Discover How to Easily Reset It
 
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best ServiceMuslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
Muslim Call Girls Churchgate WhatsApp +91-9930687706, Best Service
 
West Bengal Factories Rules, 1958.bfpptx
West Bengal Factories Rules, 1958.bfpptxWest Bengal Factories Rules, 1958.bfpptx
West Bengal Factories Rules, 1958.bfpptx
 
01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc
01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc
01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc
 
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
Top profile Call Girls In Thrissur [ 7014168258 ] Call Me For Genuine Models ...
 
9352852248 Call Girls Gota Escort Service Available 24×7 In Gota
9352852248 Call Girls  Gota Escort Service Available 24×7 In Gota9352852248 Call Girls  Gota Escort Service Available 24×7 In Gota
9352852248 Call Girls Gota Escort Service Available 24×7 In Gota
 
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In DubaiStacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
 
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
 
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
 
Why Does My Porsche Cayenne's Exhaust Sound So Loud
Why Does My Porsche Cayenne's Exhaust Sound So LoudWhy Does My Porsche Cayenne's Exhaust Sound So Loud
Why Does My Porsche Cayenne's Exhaust Sound So Loud
 
Nangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi Jat
Nangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi JatNangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi Jat
Nangloi Jat Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nangloi Jat
 
John deere 7200r 7230R 7260R Problems Repair Manual
John deere 7200r 7230R 7260R Problems Repair ManualJohn deere 7200r 7230R 7260R Problems Repair Manual
John deere 7200r 7230R 7260R Problems Repair Manual
 
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
What Does The Engine Malfunction Reduced Power Message Mean For Your BMW X5
 
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
 
JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...
JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...
JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...
 
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
在线定制(UBC毕业证书)英属哥伦比亚大学毕业证成绩单留信学历认证原版一比一
 
Electronic Stability Program. (ESP).pptx
Electronic Stability Program. (ESP).pptxElectronic Stability Program. (ESP).pptx
Electronic Stability Program. (ESP).pptx
 
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
Top profile Call Girls In dharamshala [ 7014168258 ] Call Me For Genuine Mode...
 
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
 

Security for Automotive with Multicore-based Embedded Systems

  • 1. 5/26/2012 Security for Automotive with Multi- core-based Embedded Systems Claudia Eckert TU München & Fraunhofer AISEC 1 DATE 2012, 16. March 2012 Dresden C. Eckert, AISEC Outline 1. Introduction 2. Security Issues  3. Multi‐core architectures: Risks 4. Multi‐core architectures: Opportunities 5. 5 Research Challenges Research Challenges 6. Take Home Message ©C. Eckert, AISEC, 1
  • 2. 5/26/2012 1. Introduction Automotive : Today • > 80 ECUs, security/safety sensitive services • Tailored ECUs for additional functions • High energy consumption • Expensive  ©C. Eckert, AISEC, 3 1. Introduction Tomorrow: more services more computational power required Intelligent Car Routing and Traffic info and Road Billing Navigation N i ti web cams (Location based) Fleet Management web information GPS Street Inter Car Parking Communication Parking Slots Reservation Contactless Gas Mobile TV Station High demand for few highly integrated multi-core systems ©C. Eckert, AISEC, 2
  • 3. 5/26/2012 Outline 1. Introduction 2. Security Issues  3. Multi‐core architectures: Risks 4. Multi‐core architectures: Opportunities 5. 5 Research Challenges Research Challenges 6. Take Home Message ©C. Eckert, AISEC, 2. Security Issues Automotive Security: Today Security level today:  Security level today: Do modern cars already provide  • Secure execution environment? • Hardened ECUs or security modules to reduce  vulnerabilities?  • Security services like intrusion detection, access  controls, self‐monitoring? ©C. Eckert, AISEC, 6 3
  • 4. 5/26/2012 2. Security Issues Automotive: Security Risks Vulnerabilities: e.g. • ECUs which are not hardened: Code injection, data manipulation • Software updates via CAN/Ethernet insufficient access control (or even missing) • External interfaces enable : remote access/attacks: NFC, C2C ©C. Eckert, AISEC, 2. Security Issues Automotive: Security Risks M2M interfaces (GSM)  • Communication with backend of OEM  • Internet access, added‐value services Vulnerabilities:  • Car logs into every GSM BTS • Attacks  with malformed   messages from GSM network  • Possible damages:  manipulation, DoS, malware ©C. Eckert, AISEC, 8 8 4
  • 5. 5/26/2012 2. Security Issues Automotive: Security Risks ©C. Eckert, AISEC, Lessons Learned so far Multi‐cores  • Multi‐core architectures are required to meet l h d  Increasing demands for computational power  Demands to reduce power consumption • Cars are already  exposed to severe security risks Questions Q i • Multi‐core: a security enhancing technology ? • Multi‐core: even more security/safety risks ? ©C. Eckert, AISEC, 10 5
  • 6. 5/26/2012 Outline 1. Introduction 2. Security Issues 3. Multi‐core architectures: Risks 4. Multi‐core architectures: Opportunities 5. 5 Research Challenges Research Challenges 6. Take Home Message ©C. Eckert, AISEC, 3. Multi-cores Even more risks … Shared resources: memory, caches, network • Data leakages: confidentiality, integrity l k fd l • Covert channels, e.g. cache  replacement strategy • Denial‐of‐service: e.g. occupying  shared memory regions: starving  safety‐critical tasks Vulnerable system software, missing separation • e.g. BO attacks: malware intrusion, manipulation, … ©C. Eckert, AISEC, 12 6
  • 7. 5/26/2012 Outline 1. Introduction 2. Security Issues 3. Multi‐core architectures: Risks 4. Multi‐core architectures: Opportunities 5. 5 Research Challenges Research Challenges 6. Take Home Message ©C. Eckert, AISEC, 4. Multi-cores Opportunities Attack tolerance FA e.g. Fault injections with laser not auth • Inject jump to bypass security checks FA 0x00 0x80 • Modify register content 00000000 10000000 • Modify alarm signals alarm OK Multi‐core: • Redundant cores to tolerate fault‐attacks:  e.g. SLE 78  redundant computation, majority voting, monitoring ©C. Eckert, AISEC, 14 14 7
  • 8. 5/26/2012 4. Multi-cores Opportunities Attack tolerance Attack tolerance e.g. side‐channel attacks • Timing (execution time of cryptographic operations) and  power (power consumption)  attacks  to crack keys    Multi‐Core • Increased resistance against side‐channel attacks: e.g. using multi‐cores for randomized  execution of  cryptographic algorithms ©C. Eckert, AISEC, 15 4. Multi-cores Opportunities Attack tolerance Attack tolerance e.g. resistance against software‐based modifications  • Redundant computation in different cores to detect  abnormal behavior (e.g. manipulated code)  ©C. Eckert, AISEC, 16 8
  • 9. 5/26/2012 4. Multi-cores Opportunities Take advantage of multi‐cores • Assign security/safety critical  tasks to dedicated  security cores (e.g. hardened cores): • secure execution environment • strict access controls • Distribute sensitive functions  between different cores to  enhance resistance against   reverse engineering attacks ©C. Eckert, AISEC, 17 4. Multi-cores Opportunities Self‐monitoring • Separate a security core from data processing cores : • Trusted OSs in monitoring system  • Collect data in userland OS (e.g. syscall traces) • Securely analyze data to detect malbehavior • Dynamic health monitoring • Extend  VMI to enhance  malware detection on  multi‐cores ©C. Eckert, AISEC, 18 9
  • 10. 5/26/2012 Outline 1. Introduction 2. Security Issues 3. Multi‐core architectures: Opportunities 4. Multi‐core architectures: Risks 5. Research Challenges Research Challenges 6. Take Home Message ©C. Eckert, AISEC, 5. Research Challenges Secure Architectures other System on Chip M2M SIM ID ID GSM Actuator Sensor Trust Core OS Core IO-interfaces Peripherals 1 2 Core i Core n RAM Flash Hardware Security System on Chip Module ©C. Eckert, AISEC, 10
  • 11. 5/26/2012 5. Research Challenges Secure Elements Scalable hardware trust anchors:  • Secure storage:  keys, credentials, access tokens • Integrity measurement:  static (TPM‐like)  as well as dynamic attestations • Support for virtualized execution environments: attaching a virtual Secure Element to individual  environments: Secure Boot, secure Updates , …  • PUF technology for secure identification ©C. Eckert, AISEC, 21 5. Research Challenges Secure Software Software Hardening • Compile‐time Hardening Rich OS • Operating System Extensions 3rd Party Application • Process Virtualization / Sandboxing Android • System Virtualization Secure OS including Dalvik VM Secure Monitoring Secure Monitoring Trustworthy L4Linux component with Android patches • VMI for malware detection VMM (L4 Microkernel) • Attack tolerance Multi-core (SoC) ©C. Eckert, AISEC, 22 11
  • 12. 5/26/2012 6. Take Home Message Automotive domain: High demand for • openess, value-added services, cost and energy efficiency • Security is already a big issue (e.g. impact on safety) Multi-core architectures: security enhancing technology • Attack tolerance, self-monitoring • Partitioning: critical, non-critical Research issues: security architectures & controls & crypto Secure multi-cores: key enabling technology for CPS! ©C. Eckert, AISEC, Thank you for your Attention Claudia Eckert Fraunhofer AISEC, Munich TU Munich, Chair for IT Security E-Mail: claudia.eckert@aisec.fraunhofer.de http://www.aisec.fraunhofer.de http://www aisec fraunhofer de ©C. Eckert, AISEC, 12