SlideShare una empresa de Scribd logo
1 de 20
Descargar para leer sin conexión
Automotive communication systems :
     from dependability to security

                      Nicolas NAVET
    Real-Time and Interoperability (TRIO) Group at INRIA Nancy




1st Seminar on Vehicular Communications and Applications (VCA 2011)
NetLab / SnT, Luxembourg - 30/05/2011
Dependability vs Security [from Laprie et al, ref.3]
                                                                  “absence of unauthorized access to,
                                                                     or handling of, system state”
                       “ability to
                        deliver a
                      service that               Dependability                         Security
                     can justifiably
                      be trusted ”




       Availability               Reliability   Safety   Confidentiality   Integrity     Maintenability
  Readiness for Continuity of Absence of    Absence of                     Absence of         Ability to
      usage       service    catastrophic unauthorized                      improper          undergo
                            consequences disclosure of                       system         repairs and
 for authorized                            information                     alterations       evolutions
     users only
                                                                        “unauthorized”
                                                                       system alteration

© 2011 INRIA / RealTime-at-Work - 2
Outline
         1.         Trends in automotive embedded systems: increasing
                    safety requirements and complexity

         2.         The (numerous) impediments/threats to dependability:
                    with a focus on timing constraints verification

         3.         Security against malicious attacks : physical access to the
                    vehicle or wireless access

                           Focus on the verification issues at the development phase
                     of the communication systems - highlight issues, not about solutions



© 2011 INRIA / RealTime-at-Work - 3
Electronics is the driving force of innovation
     Many new functions are safety
  critical: brake assist, cruise control,
   lane keeping, dynamic lights, etc

                                                                                   Picture from [10]

                                  –    90% of new functions use software
                                  –    Electronics: 40% of total costs
                                  –    Huge complexity: 70 ECUs, 2500 signals,
                                      >6 comm. protocols, multi-layered run-time
                                      environment (AUTOSAR), multi-source
                                      software, multi-core CPUs, number of
                                      variants, etc



                              Strong costs and time-to-market constraints !

© 2011 INRIA / RealTime-at-Work - 4
BMW 7 Series networking architecture [10]

                                                          ZGW = central
                                                         gateway
                                                          4 CAN buses
                                                          1 FlexRay Bus
                                                          1 MOST bus
                                                           Several LIN Buses
                                                         (not shown here)
                                                          1 Ethernet bus
                                                          Wireless



                                      Picture from [4]

© 2011 INRIA / RealTime-at-Work - 5
Impediments to safety: complexity!
    Technologies: numerous, complex and not
       explicit. conceived for critical systems
    – e.g.: more than 150 specification documents
       (textual) for Autosar, no two implementations
       can behave identically!
    Size of the system!
    – Number of functional domains, buses, gateways,           Autosar Basic Software
       ECUs, size of code, tasks, wiring, number of
       variants, etc
    Design process
    – Most developments are not done in-house :
       less control on externalized developments
    – Carry-over / Vehicle Family Management : need to
       share/re-use architecture and sub-systems between
       several brands/models with different requirements [2]
    – Optimized solutions for each component / function
       does not lead to a global optimal! [2]                          Wiring harness
                                                               Picture from [4]


© 2011 INRIA / RealTime-at-Work - 6
impediments to safety: cultural/regulatory
              Eg: Automotive embedded systems have not been designed
              with the same standards as airplanes - different tradeoff costs
              / safety :
                     little (no?) fault-tolerance using hardware redundancy
                     Technical parameters are regarded as less important than cost for
                     supplier / components selection [2]
                     ISO2626-2 upcoming standard: no safety quantification, in-house
                     certification accepted
                     Lack well-accepted design process, decision on experience, “gut-
                     feeling”, poor tool support [2]
                     Verification / validation does not ensure 100% coverage


                                      Formal verification is gaining acceptance:
                                         code analysis, timing analysis, etc

© 2011 INRIA / RealTime-at-Work - 7
Threats to safety :
                                  the case of timing constraints




© 2011 INRIA / RealTime-at-Work - 8
Several hundreds of timing constraints:
                  responsiveness, data refresh rate


                                          Constraint :
                                      brake light on < 50ms




   Stimulus                                                       Response




                                               Figure from [12]

© 2011 INRIA / RealTime-at-Work - 9
Why timing constraints may not be respected
                            occasionally?
                                                                                           Middleware
  Lack of precise specification : hard to identify                                              Frame-packing task
                                                                                      5ms
     the right timing requirements for each function
  Lack of traceability : from the architects to the suppliers
  Flaws in the verification:
  – Knowledge of the system and its environment is incomplete:                                      Waiting queue:
          •      What is done by the suppliers?
                                                                                                    - FIFO
          •      Implementation choices really matter and standards do
                 not say everything                                                         2       - Highest Priority
          •      Environmental issues: EMI, α-particles, heat, etc                                    First
          •      Traffic is not always well characterized and/or well modeled               1       - OEM specific
                 e.g. aperiodic traffic ?! see [5]
  –     Testing /simulation alone is not enough                                       CAN Controller
  –     Analysis is not enough too:
          •      Analytic models, especially complex ones, can be wrong                9        6       8
                 (remember “ CAN analysis refuted, revisited, etc” [6] ?!)
          •      They are often much simplified abstraction of reality                                buffer Tx
                 and might become optimistic: neglect FIFOs, hardware limitations
                                                                                    CAN Bus

© 2011 INRIA / RealTime-at-Work - 10
Illustration: Worst-Case Response Times on a CAN bus
                Frame waiting queues are HPF, except ECU1 where queue is FIFO
               the OEM does not know or verification software cannot handle it …


  Analysis Setup:
  -     Typical body network with 15 ECUs
        generated by NETCARbench (freely available)
  -     WCRT computed with NETCAR-Analyzer
        (freely available)




                                         Many high-priority frames are delayed here because
                                            a single ECU (out of 15) has a FIFO queue …


© 2011 INRIA / RealTime-at-Work - 11
Threats to dependability:
                         Faults → errors → service failures [3]
     When faults are introduced in the development phase ?
     –     Requirements capture + Specification + SW development: 99% (infineon [10])
     –     HW development : ε


     Why ? The factors :
     – Technologies: not conceived with dependability as a priority
     – Complexity / size of the system
     – Developments are mainly externalized
     – Strong cost / time-to-market pressure
     – Limited regulatory constraints
     – Limited used of formal methods for verification
     – Human factors
     – etc



© 2011 INRIA / RealTime-at-Work - 12
Security : some identified risks and
                                     scenarios




© 2011 INRIA / RealTime-at-Work - 13
Security : two scenarios
         Case 1 : attackers have physical access to the vehicle
                  −         Easy to get access to internal networks through the On-Board
                            Diagnostic (OBDII) port
                  −         AFAIK, automotive systems are not protected at all
                  −         Open question: should we go beyond basic protection measures?
                            Can we afford it?

        Case 2 : remote access through wireless networks
                −          Strong protection needed against remote attacks because of
                           Internet access, manufacturer telematics services, Car-to-Car &
                           Car-to-infrastructure communication, , etc
                −          Open question: is it the case today ?


© 2011 INRIA / RealTime-at-Work - 14
Physical access to the vehicle:
                                  experiments in [11]
                                       Connection to the OBD-II port

                                        Attacks performed :
       Picture from [11]
                                        – Manipulate speedometer
                                        – Injection of malicious code by re-flashing ECUs
                                           (while driving!)
                                        – Disable communications on the CAN buses
                                        – Disable all lights
                                        – Stop the engine
                                        – Disable / lock (specific) brakes
                                        – Were able to manipulate all ECUs!



© 2011 INRIA / RealTime-at-Work - 15
Attacks through the wireless interfaces
                        Issue: there are a number of ECUs that have access to both the
                           internal networks and wireless networks, e.g. radio player,
                            bluetooth transmitters, wireless tire pressure sensors, etc


                                                                      Code injection in other ECUs,
                          Code injection                              Denial-of-service by flooding,
                          external attack                                   Falsification, etc



                                    Telematics &                     Networks for
                                 Multimedia networks               real-time control
                                  (wired / wireless )               (CAN, FlexRay, Lin)




                                       An “infected” vehicle may contaminate others.


© 2011 INRIA / RealTime-at-Work - 16
Virtualization as a means to enforce security
          Example: Radio-player or Body Control Module with both an infotainment
          (eg., Linux, Android) and an Autosar Virtual Machine (VM)


         Communication between VMs through
         the hypervisor “secure” mechanisms



     Benefits
     –     Security despite open systems                               Hypervisor

     –     Preserve segregation in “vehicle domains”
     –     Best of both worlds in terms of know-how,
                                                          Telematics &                Networks for
           time-to-market
                                                       Multimedia networks          real-time control
     –     etc                                          (wired / wireless )         (CAN, FlexRay, Lin)


           A likely use-case of virtualization – open questions: which technical solutions?
                   role/business model among actors? change wrt aftermarket? etc

© 2011 INRIA / RealTime-at-Work - 17
References




© 2011 INRIA / RealTime-at-Work - 18
References                           [1] N. Navet, F. Simonot-Lion, editors, The Automotive Embedded Systems
                                           Handbook, Industrial Information Technology series, CRC Press / Taylor and
                                           Francis, ISBN 978-0849380266, December 2008.
                                       [2] RealTime-at-Work (RTaW), RTaW-Sim: a Fine-Grained Simulator of Controller
                                           Area Network with Fault-Injection Capabilities, freely available on RTaW web
                                           site: http://www.realtimeatwork.com, 2010.
                                       [3] A. Avizienis, J.C. Laprie, B. Randell, “Dependability and its threat: a
                                           taxonomy", IFIP Congress Topical Sessions 2004.
                                       [4] D. Khan, R. Bril, N. Navet, “Integrating Hardware Limitations in CAN
                                           Schedulability Analysis“, WiP at the 8th IEEE International Workshop on
                                           Factory Communication Systems (WFCS 2010), Nancy, France, May 2010.
                                       [5] D. Khan, N. Navet, B. Bavoux, J. Migge, “Aperiodic Traffic in Response Time
                                           Analyses with Adjustable Safety Level“, IEEE ETFA2009, Mallorca, Spain,
                                           September 22-26, 2009.
                                       [6] R. Davis, A. Burn, R. Bril, and J. Lukkien, “Controller Area Network (CAN)
                                           schedulability analysis: Refuted, revisited and revised”, Real-Time Systems,
                                           vol. 35, pp. 239–272, 2007.
                                       [7] M. D. Natale, “Evaluating message transmission times in Controller Area
                                           Networks without buffer preemption”, in 8th Brazilian Workshop on Real-Time
                                           Systems, 2006.
                                       [8] C. Braun, L. Havet, N. Navet, "NETCARBENCH: a benchmark for techniques
                                           and tools used in the design of automotive communication systems", Proc IFAC
                                           FeT 2007, Toulouse, France, November 7-9, 2007.
                                       [9] R. Kaiser, D. Zöbel, “Quantitative Analysis and Systematic Parametrization of a
                                           Two-Level Real-Time Scheduler”, paper and slides at IEEE ETFA’2009.
                                       [10] P. Leteinturier, “Next Generation Powertrain Microcontrollers”, International
                                           Automotive Electronics Congress, November 2007.
                                       [11] K. Koscher et al, “Experimental Security Analysis of a Modern Automobile”,
                                           IEEE Symposium on Security and Privacy, 2010.
                                       [12] AUTOSAR, “Specification of Timing Extensions”, Release 4.0 Rev 2, 2010.


© 2011 INRIA / RealTime-at-Work - 19
Questions / feedback ?




                                        Please get in touch at :
                                         nicolas.navet@inria.fr



© 2011 INRIA / RealTime-at-Work - 20

Más contenido relacionado

La actualidad más candente

HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...InSync Conference
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareMike Rizzo
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesHyTrust
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Digicomp Academy AG
 
Computacenter success story
Computacenter success storyComputacenter success story
Computacenter success storyMartin Rutkowski
 
Lee Technologies Corporate Brochure
Lee Technologies Corporate BrochureLee Technologies Corporate Brochure
Lee Technologies Corporate Brochurecwoodson
 
Administrators guide for avaya communication manager
Administrators guide for avaya communication managerAdministrators guide for avaya communication manager
Administrators guide for avaya communication manageraptivajhc
 
Air defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAir defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAdvantec Distribution
 
Cs2 ah0405 softwarerequirements
Cs2 ah0405 softwarerequirementsCs2 ah0405 softwarerequirements
Cs2 ah0405 softwarerequirementsjayyu123
 
Managing application performance for cloud apps bmc
Managing application performance for cloud apps bmcManaging application performance for cloud apps bmc
Managing application performance for cloud apps bmcKhazret Sapenov
 
Belden Industrial Ethernet White Paper
Belden Industrial Ethernet White PaperBelden Industrial Ethernet White Paper
Belden Industrial Ethernet White Paperadventive1
 
Xen summit 2010 extending xen into embedded
Xen summit 2010 extending xen into embeddedXen summit 2010 extending xen into embedded
Xen summit 2010 extending xen into embeddedThe Linux Foundation
 
Ugif 04 2011 informix fug-paris
Ugif 04 2011   informix fug-parisUgif 04 2011   informix fug-paris
Ugif 04 2011 informix fug-parisUGIF
 
2010 app only access
2010 app only access2010 app only access
2010 app only accessWayne Evans
 
Air defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAir defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAdvantec Distribution
 
IT FUTURE 2011 - Le future du poste de travail
IT FUTURE 2011 - Le future du poste de travailIT FUTURE 2011 - Le future du poste de travail
IT FUTURE 2011 - Le future du poste de travailFujitsu France
 

La actualidad más candente (20)

HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...More effective and more flexible security to lower your total cost of ownersh...
More effective and more flexible security to lower your total cost of ownersh...
 
BMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/MalwareBMC - Response to the SolarWinds Breach/Malware
BMC - Response to the SolarWinds Breach/Malware
 
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance MandatesSecure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
Secure and Scale Your Virtual Infrastructure While Meeting Compliance Mandates
 
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
Security Challenges in the Virtualized World IBM Virtual Server Protection fo...
 
Computacenter success story
Computacenter success storyComputacenter success story
Computacenter success story
 
E Vm Virtualization
E Vm VirtualizationE Vm Virtualization
E Vm Virtualization
 
Lee Technologies Corporate Brochure
Lee Technologies Corporate BrochureLee Technologies Corporate Brochure
Lee Technologies Corporate Brochure
 
Webdiagnostic
WebdiagnosticWebdiagnostic
Webdiagnostic
 
Administrators guide for avaya communication manager
Administrators guide for avaya communication managerAdministrators guide for avaya communication manager
Administrators guide for avaya communication manager
 
Air defense services_platform_spec_sheet
Air defense services_platform_spec_sheetAir defense services_platform_spec_sheet
Air defense services_platform_spec_sheet
 
Cs2 ah0405 softwarerequirements
Cs2 ah0405 softwarerequirementsCs2 ah0405 softwarerequirements
Cs2 ah0405 softwarerequirements
 
Managing application performance for cloud apps bmc
Managing application performance for cloud apps bmcManaging application performance for cloud apps bmc
Managing application performance for cloud apps bmc
 
Belden Industrial Ethernet White Paper
Belden Industrial Ethernet White PaperBelden Industrial Ethernet White Paper
Belden Industrial Ethernet White Paper
 
Xen summit 2010 extending xen into embedded
Xen summit 2010 extending xen into embeddedXen summit 2010 extending xen into embedded
Xen summit 2010 extending xen into embedded
 
Ugif 04 2011 informix fug-paris
Ugif 04 2011   informix fug-parisUgif 04 2011   informix fug-paris
Ugif 04 2011 informix fug-paris
 
2010 app only access
2010 app only access2010 app only access
2010 app only access
 
Security on z/OS
Security on z/OSSecurity on z/OS
Security on z/OS
 
Air defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheetAir defense advanced forensics module spec sheet
Air defense advanced forensics module spec sheet
 
IT FUTURE 2011 - Le future du poste de travail
IT FUTURE 2011 - Le future du poste de travailIT FUTURE 2011 - Le future du poste de travail
IT FUTURE 2011 - Le future du poste de travail
 

Destacado

Pushing the limits of CAN - Scheduling frames with offsets provides a major p...
Pushing the limits of CAN - Scheduling frames with offsets provides a major p...Pushing the limits of CAN - Scheduling frames with offsets provides a major p...
Pushing the limits of CAN - Scheduling frames with offsets provides a major p...Nicolas Navet
 
Automating the Configuration of the FlexRay Communication Cycle
Automating the Configuration of the FlexRay Communication CycleAutomating the Configuration of the FlexRay Communication Cycle
Automating the Configuration of the FlexRay Communication CycleNicolas Navet
 
Mécanismes de protection dans AUTOSAR OS
Mécanismes de protection dans AUTOSAR OSMécanismes de protection dans AUTOSAR OS
Mécanismes de protection dans AUTOSAR OSNicolas Navet
 
In-Vehicle Networking : a Survey and Look Forward
In-Vehicle Networking : a Survey and Look ForwardIn-Vehicle Networking : a Survey and Look Forward
In-Vehicle Networking : a Survey and Look ForwardNicolas Navet
 
Battery Aware Dynamic Scheduling for Periodic Task Graphs
Battery Aware Dynamic Scheduling for Periodic Task GraphsBattery Aware Dynamic Scheduling for Periodic Task Graphs
Battery Aware Dynamic Scheduling for Periodic Task GraphsNicolas Navet
 

Destacado (8)

Isi2007 nn shc_2007
Isi2007 nn shc_2007Isi2007 nn shc_2007
Isi2007 nn shc_2007
 
New policies
New policiesNew policies
New policies
 
Pushing the limits of CAN - Scheduling frames with offsets provides a major p...
Pushing the limits of CAN - Scheduling frames with offsets provides a major p...Pushing the limits of CAN - Scheduling frames with offsets provides a major p...
Pushing the limits of CAN - Scheduling frames with offsets provides a major p...
 
Automating the Configuration of the FlexRay Communication Cycle
Automating the Configuration of the FlexRay Communication CycleAutomating the Configuration of the FlexRay Communication Cycle
Automating the Configuration of the FlexRay Communication Cycle
 
Mécanismes de protection dans AUTOSAR OS
Mécanismes de protection dans AUTOSAR OSMécanismes de protection dans AUTOSAR OS
Mécanismes de protection dans AUTOSAR OS
 
In-Vehicle Networking : a Survey and Look Forward
In-Vehicle Networking : a Survey and Look ForwardIn-Vehicle Networking : a Survey and Look Forward
In-Vehicle Networking : a Survey and Look Forward
 
Battery Aware Dynamic Scheduling for Periodic Task Graphs
Battery Aware Dynamic Scheduling for Periodic Task GraphsBattery Aware Dynamic Scheduling for Periodic Task Graphs
Battery Aware Dynamic Scheduling for Periodic Task Graphs
 
FlexRay Product Days RTaW
FlexRay Product Days RTaWFlexRay Product Days RTaW
FlexRay Product Days RTaW
 

Similar a Automotive communication systems: from dependability to security

CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...TI Safe
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420Steve Goeringer
 
Andy huckridge
Andy huckridgeAndy huckridge
Andy huckridgeCarl Ford
 
Adaptive fault tolerance_in_real_time_cloud_computing
Adaptive fault tolerance_in_real_time_cloud_computingAdaptive fault tolerance_in_real_time_cloud_computing
Adaptive fault tolerance_in_real_time_cloud_computingwww.pixelsolutionbd.com
 
Security testing in critical systems
Security testing in critical systemsSecurity testing in critical systems
Security testing in critical systemsPeter Wood
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMScscpconf
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET Journal
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
Seize the Cloud - Proven Tactics From a Successful Service Provider
Seize the Cloud - Proven Tactics From a Successful Service ProviderSeize the Cloud - Proven Tactics From a Successful Service Provider
Seize the Cloud - Proven Tactics From a Successful Service ProviderCA Nimsoft
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content StorageIRJET Journal
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing SuiteIRJET Journal
 
Bryan Singer S4 Presentation
Bryan Singer   S4 PresentationBryan Singer   S4 Presentation
Bryan Singer S4 Presentationbsinger74
 
Case Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCase Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCA Technologies
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2fadielmoussa
 
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET Journal
 
WSTA Breakfast Seminar
WSTA Breakfast SeminarWSTA Breakfast Seminar
WSTA Breakfast SeminarJoshua McKenty
 
Wall-Street Technology Association (WSTA) Feb-2012
Wall-Street Technology Association (WSTA) Feb-2012Wall-Street Technology Association (WSTA) Feb-2012
Wall-Street Technology Association (WSTA) Feb-2012Joshua McKenty
 
DO-254 for dummies 7
DO-254 for dummies 7DO-254 for dummies 7
DO-254 for dummies 7DMAP
 

Similar a Automotive communication systems: from dependability to security (20)

CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
CLASS 2018 - Palestra de Julio Oliveira (Gerente de Tecnologia, Power Grids G...
 
Cyber Resiliency 20120420
Cyber Resiliency 20120420Cyber Resiliency 20120420
Cyber Resiliency 20120420
 
Andy huckridge
Andy huckridgeAndy huckridge
Andy huckridge
 
Adaptive fault tolerance_in_real_time_cloud_computing
Adaptive fault tolerance_in_real_time_cloud_computingAdaptive fault tolerance_in_real_time_cloud_computing
Adaptive fault tolerance_in_real_time_cloud_computing
 
Security testing in critical systems
Security testing in critical systemsSecurity testing in critical systems
Security testing in critical systems
 
WIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMSWIRELESS COMPUTING AND IT ECOSYSTEMS
WIRELESS COMPUTING AND IT ECOSYSTEMS
 
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
IRJET- An Efficient Hardware-Oriented Runtime Approach for Stack-Based Softwa...
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
Seize the Cloud - Proven Tactics From a Successful Service Provider
Seize the Cloud - Proven Tactics From a Successful Service ProviderSeize the Cloud - Proven Tactics From a Successful Service Provider
Seize the Cloud - Proven Tactics From a Successful Service Provider
 
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET-  	  Secure Scheme For Cloud-Based Multimedia Content StorageIRJET-  	  Secure Scheme For Cloud-Based Multimedia Content Storage
IRJET- Secure Scheme For Cloud-Based Multimedia Content Storage
 
IRJET- Cross Platform Penetration Testing Suite
IRJET-  	  Cross Platform Penetration Testing SuiteIRJET-  	  Cross Platform Penetration Testing Suite
IRJET- Cross Platform Penetration Testing Suite
 
Airheads vail 2011 air wave overview
Airheads vail 2011   air wave overviewAirheads vail 2011   air wave overview
Airheads vail 2011 air wave overview
 
Bryan Singer S4 Presentation
Bryan Singer   S4 PresentationBryan Singer   S4 Presentation
Bryan Singer S4 Presentation
 
Case Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP wayCase Study: Datalink—Manage IT monitoring the MSP way
Case Study: Datalink—Manage IT monitoring the MSP way
 
Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2Fadi El Moussa Secure Cloud 2012 V2
Fadi El Moussa Secure Cloud 2012 V2
 
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...IRJET-  	  Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
IRJET- Analysis of Micro Inversion to Improve Fault Tolerance in High Spe...
 
WSTA Breakfast Seminar
WSTA Breakfast SeminarWSTA Breakfast Seminar
WSTA Breakfast Seminar
 
Wall-Street Technology Association (WSTA) Feb-2012
Wall-Street Technology Association (WSTA) Feb-2012Wall-Street Technology Association (WSTA) Feb-2012
Wall-Street Technology Association (WSTA) Feb-2012
 
www.ijerd.com
www.ijerd.comwww.ijerd.com
www.ijerd.com
 
DO-254 for dummies 7
DO-254 for dummies 7DO-254 for dummies 7
DO-254 for dummies 7
 

Más de Nicolas Navet

Configuring the communication on FlexRay: the case of the static segment
Configuring the communication on FlexRay: the case of the static segmentConfiguring the communication on FlexRay: the case of the static segment
Configuring the communication on FlexRay: the case of the static segmentNicolas Navet
 
Aperiodic Traffic in Response Time Analyses with Adjustable Safety Level
Aperiodic Traffic in Response Time Analyses with Adjustable Safety LevelAperiodic Traffic in Response Time Analyses with Adjustable Safety Level
Aperiodic Traffic in Response Time Analyses with Adjustable Safety LevelNicolas Navet
 
Ertss2010 multicore scheduling
Ertss2010 multicore schedulingErtss2010 multicore scheduling
Ertss2010 multicore schedulingNicolas Navet
 
Optimizing the Robustness of X-by-Wire using Word Combinatorics
Optimizing the Robustness of X-by-Wire using Word CombinatoricsOptimizing the Robustness of X-by-Wire using Word Combinatorics
Optimizing the Robustness of X-by-Wire using Word CombinatoricsNicolas Navet
 
Cief2007 nn shc_slides
Cief2007 nn shc_slidesCief2007 nn shc_slides
Cief2007 nn shc_slidesNicolas Navet
 
Virtualization in Automotive Embedded Systems : an Outlook
Virtualization in Automotive Embedded Systems : an OutlookVirtualization in Automotive Embedded Systems : an Outlook
Virtualization in Automotive Embedded Systems : an OutlookNicolas Navet
 

Más de Nicolas Navet (6)

Configuring the communication on FlexRay: the case of the static segment
Configuring the communication on FlexRay: the case of the static segmentConfiguring the communication on FlexRay: the case of the static segment
Configuring the communication on FlexRay: the case of the static segment
 
Aperiodic Traffic in Response Time Analyses with Adjustable Safety Level
Aperiodic Traffic in Response Time Analyses with Adjustable Safety LevelAperiodic Traffic in Response Time Analyses with Adjustable Safety Level
Aperiodic Traffic in Response Time Analyses with Adjustable Safety Level
 
Ertss2010 multicore scheduling
Ertss2010 multicore schedulingErtss2010 multicore scheduling
Ertss2010 multicore scheduling
 
Optimizing the Robustness of X-by-Wire using Word Combinatorics
Optimizing the Robustness of X-by-Wire using Word CombinatoricsOptimizing the Robustness of X-by-Wire using Word Combinatorics
Optimizing the Robustness of X-by-Wire using Word Combinatorics
 
Cief2007 nn shc_slides
Cief2007 nn shc_slidesCief2007 nn shc_slides
Cief2007 nn shc_slides
 
Virtualization in Automotive Embedded Systems : an Outlook
Virtualization in Automotive Embedded Systems : an OutlookVirtualization in Automotive Embedded Systems : an Outlook
Virtualization in Automotive Embedded Systems : an Outlook
 

Último

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 

Último (20)

The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

Automotive communication systems: from dependability to security

  • 1. Automotive communication systems : from dependability to security Nicolas NAVET Real-Time and Interoperability (TRIO) Group at INRIA Nancy 1st Seminar on Vehicular Communications and Applications (VCA 2011) NetLab / SnT, Luxembourg - 30/05/2011
  • 2. Dependability vs Security [from Laprie et al, ref.3] “absence of unauthorized access to, or handling of, system state” “ability to deliver a service that Dependability Security can justifiably be trusted ” Availability Reliability Safety Confidentiality Integrity Maintenability Readiness for Continuity of Absence of Absence of Absence of Ability to usage service catastrophic unauthorized improper undergo consequences disclosure of system repairs and for authorized information alterations evolutions users only “unauthorized” system alteration © 2011 INRIA / RealTime-at-Work - 2
  • 3. Outline 1. Trends in automotive embedded systems: increasing safety requirements and complexity 2. The (numerous) impediments/threats to dependability: with a focus on timing constraints verification 3. Security against malicious attacks : physical access to the vehicle or wireless access Focus on the verification issues at the development phase of the communication systems - highlight issues, not about solutions © 2011 INRIA / RealTime-at-Work - 3
  • 4. Electronics is the driving force of innovation Many new functions are safety critical: brake assist, cruise control, lane keeping, dynamic lights, etc Picture from [10] – 90% of new functions use software – Electronics: 40% of total costs – Huge complexity: 70 ECUs, 2500 signals, >6 comm. protocols, multi-layered run-time environment (AUTOSAR), multi-source software, multi-core CPUs, number of variants, etc Strong costs and time-to-market constraints ! © 2011 INRIA / RealTime-at-Work - 4
  • 5. BMW 7 Series networking architecture [10] ZGW = central gateway 4 CAN buses 1 FlexRay Bus 1 MOST bus Several LIN Buses (not shown here) 1 Ethernet bus Wireless Picture from [4] © 2011 INRIA / RealTime-at-Work - 5
  • 6. Impediments to safety: complexity! Technologies: numerous, complex and not explicit. conceived for critical systems – e.g.: more than 150 specification documents (textual) for Autosar, no two implementations can behave identically! Size of the system! – Number of functional domains, buses, gateways, Autosar Basic Software ECUs, size of code, tasks, wiring, number of variants, etc Design process – Most developments are not done in-house : less control on externalized developments – Carry-over / Vehicle Family Management : need to share/re-use architecture and sub-systems between several brands/models with different requirements [2] – Optimized solutions for each component / function does not lead to a global optimal! [2] Wiring harness Picture from [4] © 2011 INRIA / RealTime-at-Work - 6
  • 7. impediments to safety: cultural/regulatory Eg: Automotive embedded systems have not been designed with the same standards as airplanes - different tradeoff costs / safety : little (no?) fault-tolerance using hardware redundancy Technical parameters are regarded as less important than cost for supplier / components selection [2] ISO2626-2 upcoming standard: no safety quantification, in-house certification accepted Lack well-accepted design process, decision on experience, “gut- feeling”, poor tool support [2] Verification / validation does not ensure 100% coverage Formal verification is gaining acceptance: code analysis, timing analysis, etc © 2011 INRIA / RealTime-at-Work - 7
  • 8. Threats to safety : the case of timing constraints © 2011 INRIA / RealTime-at-Work - 8
  • 9. Several hundreds of timing constraints: responsiveness, data refresh rate Constraint : brake light on < 50ms Stimulus Response Figure from [12] © 2011 INRIA / RealTime-at-Work - 9
  • 10. Why timing constraints may not be respected occasionally? Middleware Lack of precise specification : hard to identify Frame-packing task 5ms the right timing requirements for each function Lack of traceability : from the architects to the suppliers Flaws in the verification: – Knowledge of the system and its environment is incomplete: Waiting queue: • What is done by the suppliers? - FIFO • Implementation choices really matter and standards do not say everything 2 - Highest Priority • Environmental issues: EMI, α-particles, heat, etc First • Traffic is not always well characterized and/or well modeled 1 - OEM specific e.g. aperiodic traffic ?! see [5] – Testing /simulation alone is not enough CAN Controller – Analysis is not enough too: • Analytic models, especially complex ones, can be wrong 9 6 8 (remember “ CAN analysis refuted, revisited, etc” [6] ?!) • They are often much simplified abstraction of reality buffer Tx and might become optimistic: neglect FIFOs, hardware limitations CAN Bus © 2011 INRIA / RealTime-at-Work - 10
  • 11. Illustration: Worst-Case Response Times on a CAN bus Frame waiting queues are HPF, except ECU1 where queue is FIFO the OEM does not know or verification software cannot handle it … Analysis Setup: - Typical body network with 15 ECUs generated by NETCARbench (freely available) - WCRT computed with NETCAR-Analyzer (freely available) Many high-priority frames are delayed here because a single ECU (out of 15) has a FIFO queue … © 2011 INRIA / RealTime-at-Work - 11
  • 12. Threats to dependability: Faults → errors → service failures [3] When faults are introduced in the development phase ? – Requirements capture + Specification + SW development: 99% (infineon [10]) – HW development : ε Why ? The factors : – Technologies: not conceived with dependability as a priority – Complexity / size of the system – Developments are mainly externalized – Strong cost / time-to-market pressure – Limited regulatory constraints – Limited used of formal methods for verification – Human factors – etc © 2011 INRIA / RealTime-at-Work - 12
  • 13. Security : some identified risks and scenarios © 2011 INRIA / RealTime-at-Work - 13
  • 14. Security : two scenarios Case 1 : attackers have physical access to the vehicle − Easy to get access to internal networks through the On-Board Diagnostic (OBDII) port − AFAIK, automotive systems are not protected at all − Open question: should we go beyond basic protection measures? Can we afford it? Case 2 : remote access through wireless networks − Strong protection needed against remote attacks because of Internet access, manufacturer telematics services, Car-to-Car & Car-to-infrastructure communication, , etc − Open question: is it the case today ? © 2011 INRIA / RealTime-at-Work - 14
  • 15. Physical access to the vehicle: experiments in [11] Connection to the OBD-II port Attacks performed : Picture from [11] – Manipulate speedometer – Injection of malicious code by re-flashing ECUs (while driving!) – Disable communications on the CAN buses – Disable all lights – Stop the engine – Disable / lock (specific) brakes – Were able to manipulate all ECUs! © 2011 INRIA / RealTime-at-Work - 15
  • 16. Attacks through the wireless interfaces Issue: there are a number of ECUs that have access to both the internal networks and wireless networks, e.g. radio player, bluetooth transmitters, wireless tire pressure sensors, etc Code injection in other ECUs, Code injection Denial-of-service by flooding, external attack Falsification, etc Telematics & Networks for Multimedia networks real-time control (wired / wireless ) (CAN, FlexRay, Lin) An “infected” vehicle may contaminate others. © 2011 INRIA / RealTime-at-Work - 16
  • 17. Virtualization as a means to enforce security Example: Radio-player or Body Control Module with both an infotainment (eg., Linux, Android) and an Autosar Virtual Machine (VM) Communication between VMs through the hypervisor “secure” mechanisms Benefits – Security despite open systems Hypervisor – Preserve segregation in “vehicle domains” – Best of both worlds in terms of know-how, Telematics & Networks for time-to-market Multimedia networks real-time control – etc (wired / wireless ) (CAN, FlexRay, Lin) A likely use-case of virtualization – open questions: which technical solutions? role/business model among actors? change wrt aftermarket? etc © 2011 INRIA / RealTime-at-Work - 17
  • 18. References © 2011 INRIA / RealTime-at-Work - 18
  • 19. References [1] N. Navet, F. Simonot-Lion, editors, The Automotive Embedded Systems Handbook, Industrial Information Technology series, CRC Press / Taylor and Francis, ISBN 978-0849380266, December 2008. [2] RealTime-at-Work (RTaW), RTaW-Sim: a Fine-Grained Simulator of Controller Area Network with Fault-Injection Capabilities, freely available on RTaW web site: http://www.realtimeatwork.com, 2010. [3] A. Avizienis, J.C. Laprie, B. Randell, “Dependability and its threat: a taxonomy", IFIP Congress Topical Sessions 2004. [4] D. Khan, R. Bril, N. Navet, “Integrating Hardware Limitations in CAN Schedulability Analysis“, WiP at the 8th IEEE International Workshop on Factory Communication Systems (WFCS 2010), Nancy, France, May 2010. [5] D. Khan, N. Navet, B. Bavoux, J. Migge, “Aperiodic Traffic in Response Time Analyses with Adjustable Safety Level“, IEEE ETFA2009, Mallorca, Spain, September 22-26, 2009. [6] R. Davis, A. Burn, R. Bril, and J. Lukkien, “Controller Area Network (CAN) schedulability analysis: Refuted, revisited and revised”, Real-Time Systems, vol. 35, pp. 239–272, 2007. [7] M. D. Natale, “Evaluating message transmission times in Controller Area Networks without buffer preemption”, in 8th Brazilian Workshop on Real-Time Systems, 2006. [8] C. Braun, L. Havet, N. Navet, "NETCARBENCH: a benchmark for techniques and tools used in the design of automotive communication systems", Proc IFAC FeT 2007, Toulouse, France, November 7-9, 2007. [9] R. Kaiser, D. Zöbel, “Quantitative Analysis and Systematic Parametrization of a Two-Level Real-Time Scheduler”, paper and slides at IEEE ETFA’2009. [10] P. Leteinturier, “Next Generation Powertrain Microcontrollers”, International Automotive Electronics Congress, November 2007. [11] K. Koscher et al, “Experimental Security Analysis of a Modern Automobile”, IEEE Symposium on Security and Privacy, 2010. [12] AUTOSAR, “Specification of Timing Extensions”, Release 4.0 Rev 2, 2010. © 2011 INRIA / RealTime-at-Work - 19
  • 20. Questions / feedback ? Please get in touch at : nicolas.navet@inria.fr © 2011 INRIA / RealTime-at-Work - 20