SlideShare ist ein Scribd-Unternehmen logo
1 von 17
©2017 Trusted Computing Group
Software and Supply
Chain Assurance Forum
TPM for Automotive
1
©2017 Trusted Computing Group
SAE J3101 defines HW Security
• Hardware Protected Security Environment
– Offers at least one mechanism of security
implemented by hardware support
– Offers resilience against arbitrary execution
of software within a system
• Secure Keystore
• Authenticated Boot
• Authenticated Software Flashing
• Authenticate messages in the vehicle
• Broadcast/Multicast Authentication
• Secure Storage
• Access to Private Data
• etc…
• Root of Trust for Measurement (RTM)
• Root of Trust for Reporting (RTR)
• Root of Trust for Storage (RTS)
• Establish a basis of trust – belief that a device
will behave in an expected way
• TCG uses cryptographic methods to attest
identity of the device and its expected
behavior, both of HW and SW
• The TCG’s method for attestation is to use a
key associated with the hardware to sign one
or more values that represent the software
SAE J3101 TPM as a HW RoT
2
©2017 Trusted Computing Group
Defense in Depth
Fast cryptographic performance
Device identification
Isolated execution
(Message) Authentication
Virtualization
Hardware security services that can be used by applications
Platform boot integrity and Chain of Trust
Secure Storage (keys and data)
Secure Communication
Secure Debug
Tamper detection and protection from side channel attacks
Hardware security building blocks
Over-the Air Updates
IDPS / Anomaly Detection
Network enforcement
Certificate Management Services
Antimalware and remote monitoring
Biometrics
Software and Services
Security features in the silicon, for example Memory Scrambling,
Execution Prevention, etc.
Defense in Depth
HardwareRootofTrust(TPM)
Analog security monitoring under the CPU
Components associated with physical
control of the vehicle
Components associated with safety
Components associated with
entertainment and convenience
The Interconnected Car
Image credit: Mercedes-Benz
Museum (as cited in Computer History
Museum, 2011)
3
©2017 Trusted Computing Group
Vehicle Assets (by ENISA)
4
©2017 Trusted Computing Group
Vehicle Threats (by ENISA)
5
©2017 Trusted Computing Group
Why do you need HW Security?
Basic Cryptography Key Management Miscellaneous
Secure Hash (SHA2, SHA3) Key Derivation Function (KDF) Compression/Decompression
Message Authentication Code (CMAC, HMAC, GMAC)
 Generation
 Verification
Secure Key and Certificate Storage
 Access Management
 Import/Export Services
 Generation
 Update
Checksum
Signatures
 Generation
 Verification
Key exchange protocols
Random Number Generation
Encryption/Decryption
 Symmetric (CBC, CTR)
 Asymmetric
 ECC (P-256, NIST, SEC2, Brainpool)
Secure Clock
 Time stamping
 Validity check for key data
6
©2017 Trusted Computing Group
SDC Example
TSS
Dedicated
Security Core
TPM
Example from Mentor Graphics
with HW Security Core and TPM overlay
AUTOSAR CSM
Translation Stack
7
©2017 Trusted Computing Group
Automotive E/E Trends
8
©2017 Trusted Computing Group
TPM Practical Applications
• A Trusted Platform Module (TPM) is a microchip designed to provide basic security-related functions,
primarily involving encryption keys.
• An ECU that incorporates a TPM can create cryptographic keys and encrypt them so that they can
only be decrypted by the TPM (binding a key).
• Certificates can be installed or created; the RSA private key for a certificate is bound to the TPM and
cannot be exported.
• Running software can use the boot measurements of the operating system start state to prove the
integrity of an ECU.
• The TPM has several Group Policy settings that might be useful in certain scenarios such as
authorization.
• Because the TPM uses its own internal firmware and logic circuits to process instructions, it does not
rely on the operating system, and it is not exposed to vulnerabilities that might exist in the operating
system or application software.
9
©2017 Trusted Computing Group
TPM 2.0 Software Stack (TSS)
AUTOSAR CSM Translation
TPM is a dedicated hardware that:
• Protects a unique platform identity (TPM)
• Verifies software integrity before software is
loaded (TPM)
• Protects network integrity (TNC or Trusted
Network Connect)
• Protects data integrity and confidentiality (SED
or Self-Encrypting Drive)
10
©2017 Trusted Computing Group
TPM Main Functions
11
©2017 Trusted Computing Group
Why TPM?
• Trusted computing is cyber defense technology that can be used to protect data, platforms and
networks
• Trusted computing technologies are actively evolving, with new standards and new products
regularly entering the market
• Major hardware manufacturers and software vendors support trusted computing off-the-shelf
• Trusted computing products can offer a cost-effective path to improved compliance and security
TCG has the TPM Automotive Thin Profile specification and is working on the TPM
Automotive Rich Profile specification which will satisfy underlying SAE J3101
requirements and provide security foundation for protecting vehicles.
12
©2017 Trusted Computing Group
Backup
backup
©2017 Trusted Computing Group 14
©2017 Trusted Computing Group
©2017 Trusted Computing Group
©2017 Trusted Computing Group 17

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

eSIMとは何か
eSIMとは何かeSIMとは何か
eSIMとは何か
 
システム間連携を担うSpring Integrationのエンタープライズ開発での活用
システム間連携を担うSpring Integrationのエンタープライズ開発での活用システム間連携を担うSpring Integrationのエンタープライズ開発での活用
システム間連携を担うSpring Integrationのエンタープライズ開発での活用
 
オートモーティブ領域における 位置情報関連アルゴリズムあれこれ
オートモーティブ領域における 位置情報関連アルゴリズムあれこれオートモーティブ領域における 位置情報関連アルゴリズムあれこれ
オートモーティブ領域における 位置情報関連アルゴリズムあれこれ
 
動画配信の基礎知識
動画配信の基礎知識動画配信の基礎知識
動画配信の基礎知識
 
CloudNativeな決済サービスの開発と2年間の歩み #sf_A4
CloudNativeな決済サービスの開発と2年間の歩み #sf_A4CloudNativeな決済サービスの開発と2年間の歩み #sf_A4
CloudNativeな決済サービスの開発と2年間の歩み #sf_A4
 
Datadog による Container の監視について
Datadog による Container の監視についてDatadog による Container の監視について
Datadog による Container の監視について
 
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
3種類のTEE比較(Intel SGX, ARM TrustZone, RISC-V Keystone)
 
Bilgi ve iletisim guvenligi rehberi temmuz 2020
Bilgi ve iletisim guvenligi rehberi temmuz 2020Bilgi ve iletisim guvenligi rehberi temmuz 2020
Bilgi ve iletisim guvenligi rehberi temmuz 2020
 
大規模データ処理の定番OSS Hadoop / Spark 最新動向 - 2021秋 -(db tech showcase 2021 / ONLINE 発...
大規模データ処理の定番OSS Hadoop / Spark 最新動向 - 2021秋 -(db tech showcase 2021 / ONLINE 発...大規模データ処理の定番OSS Hadoop / Spark 最新動向 - 2021秋 -(db tech showcase 2021 / ONLINE 発...
大規模データ処理の定番OSS Hadoop / Spark 最新動向 - 2021秋 -(db tech showcase 2021 / ONLINE 発...
 
認証の標準的な方法は分かった。では認可はどう管理するんだい? #cmdevio
認証の標準的な方法は分かった。では認可はどう管理するんだい? #cmdevio認証の標準的な方法は分かった。では認可はどう管理するんだい? #cmdevio
認証の標準的な方法は分かった。では認可はどう管理するんだい? #cmdevio
 
20180508 AWS Black Belt Online Seminar AWS Greengrassで実現するエッジコンピューティング
20180508 AWS Black Belt Online Seminar AWS Greengrassで実現するエッジコンピューティング20180508 AWS Black Belt Online Seminar AWS Greengrassで実現するエッジコンピューティング
20180508 AWS Black Belt Online Seminar AWS Greengrassで実現するエッジコンピューティング
 
20180425 AWS Black Belt Online Seminar Amazon Relational Database Service (Am...
20180425 AWS Black Belt Online Seminar Amazon Relational Database Service (Am...20180425 AWS Black Belt Online Seminar Amazon Relational Database Service (Am...
20180425 AWS Black Belt Online Seminar Amazon Relational Database Service (Am...
 
脆弱性スキャナVulsで始めるセキュリティ対策
脆弱性スキャナVulsで始めるセキュリティ対策脆弱性スキャナVulsで始めるセキュリティ対策
脆弱性スキャナVulsで始めるセキュリティ対策
 
AWS Black Belt Online Seminar 2018 Amazon DynamoDB Advanced Design Pattern
AWS Black Belt Online Seminar 2018 Amazon DynamoDB Advanced Design PatternAWS Black Belt Online Seminar 2018 Amazon DynamoDB Advanced Design Pattern
AWS Black Belt Online Seminar 2018 Amazon DynamoDB Advanced Design Pattern
 
AWS Black Belt Techシリーズ Amazon EMR
AWS Black Belt Techシリーズ  Amazon EMRAWS Black Belt Techシリーズ  Amazon EMR
AWS Black Belt Techシリーズ Amazon EMR
 
[Cloud OnAir] 【Google Kubernetes Engine 演習】解説を聞きながら GKE を体験しよう 2020年10月29日 放送
[Cloud OnAir] 【Google Kubernetes Engine 演習】解説を聞きながら GKE を体験しよう 2020年10月29日 放送[Cloud OnAir] 【Google Kubernetes Engine 演習】解説を聞きながら GKE を体験しよう 2020年10月29日 放送
[Cloud OnAir] 【Google Kubernetes Engine 演習】解説を聞きながら GKE を体験しよう 2020年10月29日 放送
 
Amazon ElastiCacheのはじめ方
Amazon ElastiCacheのはじめ方Amazon ElastiCacheのはじめ方
Amazon ElastiCacheのはじめ方
 
起業家的?!エンジニアのススメ | Developer Summit 2020
起業家的?!エンジニアのススメ | Developer Summit 2020起業家的?!エンジニアのススメ | Developer Summit 2020
起業家的?!エンジニアのススメ | Developer Summit 2020
 
VolgaCTF 2018 - Neatly bypassing CSP
VolgaCTF 2018 - Neatly bypassing CSPVolgaCTF 2018 - Neatly bypassing CSP
VolgaCTF 2018 - Neatly bypassing CSP
 
[CEDEC 2021] 運用中タイトルでも怖くない! 『メルクストーリア』におけるハイパフォーマンス・ローコストなリアルタイム通信技術の導入事例
[CEDEC 2021] 運用中タイトルでも怖くない! 『メルクストーリア』におけるハイパフォーマンス・ローコストなリアルタイム通信技術の導入事例[CEDEC 2021] 運用中タイトルでも怖くない! 『メルクストーリア』におけるハイパフォーマンス・ローコストなリアルタイム通信技術の導入事例
[CEDEC 2021] 運用中タイトルでも怖くない! 『メルクストーリア』におけるハイパフォーマンス・ローコストなリアルタイム通信技術の導入事例
 

Andere mochten auch

Agustin Barrios Mangore, o homem e o artista
Agustin Barrios Mangore, o homem e o artistaAgustin Barrios Mangore, o homem e o artista
Agustin Barrios Mangore, o homem e o artista
alfeuRIO
 
Unidad educativa municipal san francisco de quito
Unidad educativa municipal san francisco de quitoUnidad educativa municipal san francisco de quito
Unidad educativa municipal san francisco de quito
victor27081998
 

Andere mochten auch (20)

Automotive security (cvta)
Automotive security (cvta)Automotive security (cvta)
Automotive security (cvta)
 
Plan de imagen institucional 2013-2015
Plan  de imagen institucional 2013-2015Plan  de imagen institucional 2013-2015
Plan de imagen institucional 2013-2015
 
1110458853 8
1110458853 81110458853 8
1110458853 8
 
93200002 8
93200002 893200002 8
93200002 8
 
1071302232 8
1071302232  81071302232  8
1071302232 8
 
93370499 8
93370499 893370499 8
93370499 8
 
Curso de powerpoint
Curso de powerpointCurso de powerpoint
Curso de powerpoint
 
LIS 704: Ready Reference Instruction for Emily Post's Etiquette
LIS 704: Ready Reference Instruction for Emily Post's EtiquetteLIS 704: Ready Reference Instruction for Emily Post's Etiquette
LIS 704: Ready Reference Instruction for Emily Post's Etiquette
 
Agustin Barrios Mangore, o homem e o artista
Agustin Barrios Mangore, o homem e o artistaAgustin Barrios Mangore, o homem e o artista
Agustin Barrios Mangore, o homem e o artista
 
Scanning the landscape by Ryan Rosauro
Scanning the landscape by Ryan RosauroScanning the landscape by Ryan Rosauro
Scanning the landscape by Ryan Rosauro
 
Universidad fermin toro medicina legal
Universidad fermin toro medicina legalUniversidad fermin toro medicina legal
Universidad fermin toro medicina legal
 
Auto cad 2000
Auto cad 2000Auto cad 2000
Auto cad 2000
 
Setemi News
Setemi NewsSetemi News
Setemi News
 
Рекомендованные Cisco архитектуры для различных вертикалей
Рекомендованные Cisco архитектуры для различных вертикалейРекомендованные Cisco архитектуры для различных вертикалей
Рекомендованные Cisco архитектуры для различных вертикалей
 
Excel 2000
Excel 2000Excel 2000
Excel 2000
 
Unidad educativa municipal san francisco de quito
Unidad educativa municipal san francisco de quitoUnidad educativa municipal san francisco de quito
Unidad educativa municipal san francisco de quito
 
Energia nuclear
Energia nuclearEnergia nuclear
Energia nuclear
 
Análisis critico libro adolescentes
Análisis critico libro adolescentesAnálisis critico libro adolescentes
Análisis critico libro adolescentes
 
Diez
DiezDiez
Diez
 
EDRM Australia 2017: (Electronic Document and Records Management)
EDRM Australia 2017: (Electronic Document and Records Management)EDRM Australia 2017: (Electronic Document and Records Management)
EDRM Australia 2017: (Electronic Document and Records Management)
 

Ähnlich wie Why TPM in Automotive?

Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Linaro
 

Ähnlich wie Why TPM in Automotive? (20)

Abbie Barbir Tcg Final
Abbie Barbir Tcg FinalAbbie Barbir Tcg Final
Abbie Barbir Tcg Final
 
Trusted computing introduction and technical overview
Trusted computing introduction and technical overviewTrusted computing introduction and technical overview
Trusted computing introduction and technical overview
 
Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.ppt
 
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
LAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devices
 
DYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGESDYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGES
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 
Trusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .pptTrusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .ppt
 
Introduction to Trusted Computing
Introduction to Trusted ComputingIntroduction to Trusted Computing
Introduction to Trusted Computing
 
trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
 
50120140502015
5012014050201550120140502015
50120140502015
 
Security Consideration for Set-top box SoC
Security Consideration for Set-top box SoCSecurity Consideration for Set-top box SoC
Security Consideration for Set-top box SoC
 
Knorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudyKnorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case Study
 
Trusted Computing Base
Trusted Computing BaseTrusted Computing Base
Trusted Computing Base
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiu
 
Trusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.pptTrusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.ppt
 
Proving the Security of Low-Level Software Components & TEEs
Proving the Security of Low-Level Software Components & TEEsProving the Security of Low-Level Software Components & TEEs
Proving the Security of Low-Level Software Components & TEEs
 

Mehr von Alan Tatourian

Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?
Alan Tatourian
 

Mehr von Alan Tatourian (9)

Systems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasisSystems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasis
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
 
Securing future connected vehicles and infrastructure
Securing future connected vehicles and infrastructureSecuring future connected vehicles and infrastructure
Securing future connected vehicles and infrastructure
 
Functional Safety and Security process alignment
Functional Safety and Security process alignmentFunctional Safety and Security process alignment
Functional Safety and Security process alignment
 
High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systems
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?
 

Kürzlich hochgeladen

CELLULAR RESPIRATION. Helpful slides for
CELLULAR RESPIRATION. Helpful slides forCELLULAR RESPIRATION. Helpful slides for
CELLULAR RESPIRATION. Helpful slides for
euphemism22
 
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
ezgenuh
 
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
Health
 
如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一
如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一
如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一
fhjlokjhi
 
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
62qaf0hi
 
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
ezgenuh
 
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一
如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一
如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一
opyff
 
如何办理伦敦商学院毕业证(LBS毕业证)毕业证成绩单原版一比一
如何办理伦敦商学院毕业证(LBS毕业证)毕业证成绩单原版一比一如何办理伦敦商学院毕业证(LBS毕业证)毕业证成绩单原版一比一
如何办理伦敦商学院毕业证(LBS毕业证)毕业证成绩单原版一比一
avy6anjnd
 
一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国
一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国
一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国
ezgenuh
 
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
avy6anjnd
 

Kürzlich hochgeladen (20)

CELLULAR RESPIRATION. Helpful slides for
CELLULAR RESPIRATION. Helpful slides forCELLULAR RESPIRATION. Helpful slides for
CELLULAR RESPIRATION. Helpful slides for
 
Is Your Mercedes Benz Trunk Refusing To Close Here's What Might Be Wrong
Is Your Mercedes Benz Trunk Refusing To Close Here's What Might Be WrongIs Your Mercedes Benz Trunk Refusing To Close Here's What Might Be Wrong
Is Your Mercedes Benz Trunk Refusing To Close Here's What Might Be Wrong
 
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
 
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
+97470301568>>buy vape oil,thc oil weed,hash and cannabis oil in qatar doha}}
 
如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一
如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一
如何办理田纳西大学毕业证(UTK毕业证)成绩单原版一比一
 
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
一比一原版(Deakin毕业证书)迪肯大学毕业证成绩单留信学历认证
 
JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...
JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...
JOHN DEERE 7200R 7215R 7230R 7260R 7280R TECHNICAL SERVICE PDF MANUAL 2680PGS...
 
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
 
Housewife Call Girl in Faridabad ₹7.5k Pick Up & Drop With Cash Payment #8168...
Housewife Call Girl in Faridabad ₹7.5k Pick Up & Drop With Cash Payment #8168...Housewife Call Girl in Faridabad ₹7.5k Pick Up & Drop With Cash Payment #8168...
Housewife Call Girl in Faridabad ₹7.5k Pick Up & Drop With Cash Payment #8168...
 
Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...
Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...
Washim Call Girls 📞9332606886 Call Girls in Washim Escorts service book now C...
 
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
 
Faridabad Call Girls ₹7.5k Pick Up & Drop With Cash Payment 8168257667 Call G...
Faridabad Call Girls ₹7.5k Pick Up & Drop With Cash Payment 8168257667 Call G...Faridabad Call Girls ₹7.5k Pick Up & Drop With Cash Payment 8168257667 Call G...
Faridabad Call Girls ₹7.5k Pick Up & Drop With Cash Payment 8168257667 Call G...
 
Is Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's Why
Is Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's WhyIs Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's Why
Is Your Volvo XC90 Displaying Anti-Skid Service Required Alert Here's Why
 
Why Does My Porsche Cayenne's Exhaust Sound So Loud
Why Does My Porsche Cayenne's Exhaust Sound So LoudWhy Does My Porsche Cayenne's Exhaust Sound So Loud
Why Does My Porsche Cayenne's Exhaust Sound So Loud
 
如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一
如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一
如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一
 
T.L.E 5S's (Seiri, Seiton, Seiso, Seiketsu, Shitsuke).pptx
T.L.E 5S's (Seiri, Seiton, Seiso, Seiketsu, Shitsuke).pptxT.L.E 5S's (Seiri, Seiton, Seiso, Seiketsu, Shitsuke).pptx
T.L.E 5S's (Seiri, Seiton, Seiso, Seiketsu, Shitsuke).pptx
 
如何办理伦敦商学院毕业证(LBS毕业证)毕业证成绩单原版一比一
如何办理伦敦商学院毕业证(LBS毕业证)毕业证成绩单原版一比一如何办理伦敦商学院毕业证(LBS毕业证)毕业证成绩单原版一比一
如何办理伦敦商学院毕业证(LBS毕业证)毕业证成绩单原版一比一
 
Seamless Driving Experience Premier Mini Cooper Clutch Solutions
Seamless Driving Experience Premier Mini Cooper Clutch SolutionsSeamless Driving Experience Premier Mini Cooper Clutch Solutions
Seamless Driving Experience Premier Mini Cooper Clutch Solutions
 
一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国
一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国
一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国
 
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
如何办理(NCL毕业证书)纽卡斯尔大学毕业证毕业证成绩单原版一比一
 

Why TPM in Automotive?

  • 1. ©2017 Trusted Computing Group Software and Supply Chain Assurance Forum TPM for Automotive 1
  • 2. ©2017 Trusted Computing Group SAE J3101 defines HW Security • Hardware Protected Security Environment – Offers at least one mechanism of security implemented by hardware support – Offers resilience against arbitrary execution of software within a system • Secure Keystore • Authenticated Boot • Authenticated Software Flashing • Authenticate messages in the vehicle • Broadcast/Multicast Authentication • Secure Storage • Access to Private Data • etc… • Root of Trust for Measurement (RTM) • Root of Trust for Reporting (RTR) • Root of Trust for Storage (RTS) • Establish a basis of trust – belief that a device will behave in an expected way • TCG uses cryptographic methods to attest identity of the device and its expected behavior, both of HW and SW • The TCG’s method for attestation is to use a key associated with the hardware to sign one or more values that represent the software SAE J3101 TPM as a HW RoT 2
  • 3. ©2017 Trusted Computing Group Defense in Depth Fast cryptographic performance Device identification Isolated execution (Message) Authentication Virtualization Hardware security services that can be used by applications Platform boot integrity and Chain of Trust Secure Storage (keys and data) Secure Communication Secure Debug Tamper detection and protection from side channel attacks Hardware security building blocks Over-the Air Updates IDPS / Anomaly Detection Network enforcement Certificate Management Services Antimalware and remote monitoring Biometrics Software and Services Security features in the silicon, for example Memory Scrambling, Execution Prevention, etc. Defense in Depth HardwareRootofTrust(TPM) Analog security monitoring under the CPU Components associated with physical control of the vehicle Components associated with safety Components associated with entertainment and convenience The Interconnected Car Image credit: Mercedes-Benz Museum (as cited in Computer History Museum, 2011) 3
  • 4. ©2017 Trusted Computing Group Vehicle Assets (by ENISA) 4
  • 5. ©2017 Trusted Computing Group Vehicle Threats (by ENISA) 5
  • 6. ©2017 Trusted Computing Group Why do you need HW Security? Basic Cryptography Key Management Miscellaneous Secure Hash (SHA2, SHA3) Key Derivation Function (KDF) Compression/Decompression Message Authentication Code (CMAC, HMAC, GMAC)  Generation  Verification Secure Key and Certificate Storage  Access Management  Import/Export Services  Generation  Update Checksum Signatures  Generation  Verification Key exchange protocols Random Number Generation Encryption/Decryption  Symmetric (CBC, CTR)  Asymmetric  ECC (P-256, NIST, SEC2, Brainpool) Secure Clock  Time stamping  Validity check for key data 6
  • 7. ©2017 Trusted Computing Group SDC Example TSS Dedicated Security Core TPM Example from Mentor Graphics with HW Security Core and TPM overlay AUTOSAR CSM Translation Stack 7
  • 8. ©2017 Trusted Computing Group Automotive E/E Trends 8
  • 9. ©2017 Trusted Computing Group TPM Practical Applications • A Trusted Platform Module (TPM) is a microchip designed to provide basic security-related functions, primarily involving encryption keys. • An ECU that incorporates a TPM can create cryptographic keys and encrypt them so that they can only be decrypted by the TPM (binding a key). • Certificates can be installed or created; the RSA private key for a certificate is bound to the TPM and cannot be exported. • Running software can use the boot measurements of the operating system start state to prove the integrity of an ECU. • The TPM has several Group Policy settings that might be useful in certain scenarios such as authorization. • Because the TPM uses its own internal firmware and logic circuits to process instructions, it does not rely on the operating system, and it is not exposed to vulnerabilities that might exist in the operating system or application software. 9
  • 10. ©2017 Trusted Computing Group TPM 2.0 Software Stack (TSS) AUTOSAR CSM Translation TPM is a dedicated hardware that: • Protects a unique platform identity (TPM) • Verifies software integrity before software is loaded (TPM) • Protects network integrity (TNC or Trusted Network Connect) • Protects data integrity and confidentiality (SED or Self-Encrypting Drive) 10
  • 11. ©2017 Trusted Computing Group TPM Main Functions 11
  • 12. ©2017 Trusted Computing Group Why TPM? • Trusted computing is cyber defense technology that can be used to protect data, platforms and networks • Trusted computing technologies are actively evolving, with new standards and new products regularly entering the market • Major hardware manufacturers and software vendors support trusted computing off-the-shelf • Trusted computing products can offer a cost-effective path to improved compliance and security TCG has the TPM Automotive Thin Profile specification and is working on the TPM Automotive Rich Profile specification which will satisfy underlying SAE J3101 requirements and provide security foundation for protecting vehicles. 12
  • 13. ©2017 Trusted Computing Group Backup backup

Hinweis der Redaktion

  1. The interconnected components include the vehicle’s engine management system, brake controller, airbags, seatbelt pre-tensioners, door locks, gauge cluster, sound system, CD changer, seat controls, communications system, telematics unit, and more. Running throughout the vehicle is a network of wires on which sensor data and vehicle control commands transit back and forth. Also visible are several long rectangular boxes that represent controllers. These controllers are responsible for issuing commands to the different vehicular components based on the inputs they receive, either in the form of sensor data or commands from the vehicle operator.
  2. Bullet Point Template
  3. Body Text Template