SlideShare ist ein Scribd-Unternehmen logo
1 von 12
Downloaden Sie, um offline zu lesen
5/26/2012




     Security for Automotive with Multi-
      core-based Embedded Systems


                                     Claudia Eckert
                                     TU München &
                                     Fraunhofer AISEC
                                 1

                                     DATE 2012, 16. March 2012
                                     Dresden

              C. Eckert, AISEC




Outline



1.         Introduction
2.         Security Issues 
3.         Multi‐core architectures: Risks
4.         Multi‐core architectures: Opportunities
5.
5          Research Challenges
           Research Challenges
6.         Take Home Message


©C. Eckert, AISEC,




                                                                        1
5/26/2012




1. Introduction
   Automotive : Today

• > 80 ECUs, security/safety sensitive services
• Tailored ECUs for additional functions
• High energy consumption
• Expensive 




©C. Eckert, AISEC,

                                                                                                3




1. Introduction Tomorrow: more services
                more computational power required
                                        Intelligent Car
                                        Routing and                     Traffic info and
                       Road Billing
                                        Navigation
                                        N i ti                          web cams



                                                                                (Location based)
                     Fleet Management                                           web information



            GPS Street                                                          Inter Car
            Parking                                                             Communication



                      Parking Slots
                      Reservation                         Contactless Gas        Mobile TV
                                                          Station


   High demand for few highly integrated multi-core systems

©C. Eckert, AISEC,




                                                                                                           2
5/26/2012




Outline



1.         Introduction
2.         Security Issues 
3.         Multi‐core architectures: Risks
4.         Multi‐core architectures: Opportunities
5.
5          Research Challenges
           Research Challenges
6.         Take Home Message


©C. Eckert, AISEC,




2. Security Issues
   Automotive Security: Today

Security level today: 
Security level today:
Do modern cars already provide 
• Secure execution environment?
• Hardened ECUs or security modules to reduce 
  vulnerabilities? 
• Security services like intrusion detection, access 
  controls, self‐monitoring?


©C. Eckert, AISEC,

                                                        6




                                                                   3
5/26/2012




    2. Security Issues
       Automotive: Security Risks

       Vulnerabilities: e.g.
       • ECUs which are not hardened:
         Code injection, data manipulation
       • Software updates via CAN/Ethernet
         insufficient access control (or even missing)
       • External interfaces enable :
         remote access/attacks: NFC, C2C



    ©C. Eckert, AISEC,




    2. Security Issues
       Automotive: Security Risks

    M2M interfaces (GSM) 
    • Communication with backend of OEM 
    • Internet access, added‐value services
    Vulnerabilities: 
    • Car logs into every GSM BTS
    • Attacks  with malformed  
      messages from GSM network 
    • Possible damages: 
      manipulation, DoS, malware
    ©C. Eckert, AISEC,

8                                                        8




                                                                    4
5/26/2012




2. Security Issues
   Automotive: Security Risks




©C. Eckert, AISEC,




 Lessons Learned so far


 Multi‐cores 
 • Multi‐core architectures are required to meet
       l         h                     d
    Increasing demands for computational power
    Demands to reduce power consumption
 • Cars are already  exposed to severe security risks
 Questions
 Q    i
 • Multi‐core: a security enhancing technology ?
 • Multi‐core: even more security/safety risks ?
©C. Eckert, AISEC,

                                                        10




                                                                    5
5/26/2012




Outline



1.         Introduction
2.         Security Issues
3.         Multi‐core architectures: Risks
4.         Multi‐core architectures: Opportunities
5.
5          Research Challenges
           Research Challenges
6.         Take Home Message


©C. Eckert, AISEC,




3. Multi-cores
   Even more risks …
Shared resources: memory, caches, network
 • Data leakages: confidentiality, integrity
        l k             fd     l
 • Covert channels, e.g. cache 
   replacement strategy
 • Denial‐of‐service: e.g. occupying 
   shared memory regions: starving 
   safety‐critical tasks
Vulnerable system software, missing separation
• e.g. BO attacks: malware intrusion, manipulation, …
©C. Eckert, AISEC,

                                                     12




                                                                 6
5/26/2012




Outline



1.         Introduction
2.         Security Issues
3.         Multi‐core architectures: Risks
4.         Multi‐core architectures: Opportunities
5.
5          Research Challenges
           Research Challenges
6.         Take Home Message


©C. Eckert, AISEC,




4. Multi-cores
   Opportunities
Attack tolerance
                                                                  FA
e.g. Fault injections with laser
                                                                       not auth


• Inject jump to bypass security checks
                                  FA
                                           0x00            0x80
• Modify register content         00000000             10000000
• Modify alarm signals             alarm
                                          OK

Multi‐core:
  • Redundant cores to tolerate fault‐attacks:  e.g. SLE 78 
    redundant computation, majority voting, monitoring
©C. Eckert, AISEC,
                                                  14
                                                             14




                                                                                         7
5/26/2012




4. Multi-cores
   Opportunities

 Attack tolerance
 Attack tolerance
 e.g. side‐channel attacks
• Timing (execution time of cryptographic operations) and 
  power (power consumption)  attacks  to crack keys   
Multi‐Core
 • Increased resistance against side‐channel attacks:
    e.g. using multi‐cores for randomized  execution of 
    cryptographic algorithms
©C. Eckert, AISEC,

                                                     15




4. Multi-cores
   Opportunities

Attack tolerance
Attack tolerance
e.g. resistance against software‐based modifications 




   • Redundant computation in different cores to detect 
     abnormal behavior (e.g. manipulated code) 
©C. Eckert, AISEC,

                                                     16




                                                                    8
5/26/2012




4. Multi-cores
   Opportunities
Take advantage of multi‐cores
   • Assign security/safety critical  tasks to dedicated 
     security cores (e.g. hardened cores):
        • secure execution environment
        • strict access controls
   • Distribute sensitive functions 
     between different cores to 
     enhance resistance against  
     reverse engineering attacks
©C. Eckert, AISEC,

                                                            17




4. Multi-cores
   Opportunities

Self‐monitoring
 • Separate a security core from data processing cores :
   • Trusted OSs in monitoring system 
   • Collect data in userland OS (e.g. syscall traces)
   • Securely analyze data to detect malbehavior
   • Dynamic health monitoring
 • Extend  VMI to enhance 
   malware detection on 
   multi‐cores
©C. Eckert, AISEC,

                                                            18




                                                                        9
5/26/2012




Outline



1.         Introduction
2.         Security Issues
3.         Multi‐core architectures: Opportunities
4.         Multi‐core architectures: Risks
5.         Research Challenges
           Research Challenges
6.         Take Home Message


©C. Eckert, AISEC,




5. Research Challenges
   Secure Architectures
                                          other System on Chip
                                M2M
                                    SIM
                                                                 ID        ID
                                   GSM                      Actuator    Sensor


                              Trust
                     Core      OS Core     IO-interfaces         Peripherals
                      1             2


                     Core i      Core n   RAM       Flash           Hardware
                                                                    Security
          System on Chip                                             Module

©C. Eckert, AISEC,




                                                                                       10
5/26/2012




   5. Research Challenges
      Secure Elements

 Scalable hardware trust anchors: 
 • Secure storage: 
   keys, credentials, access tokens
 • Integrity measurement: 
   static (TPM‐like)  as well as dynamic attestations
 • Support for virtualized execution environments:
   attaching a virtual Secure Element to individual 
   environments: Secure Boot, secure Updates , … 
 • PUF technology for secure identification
 ©C. Eckert, AISEC,

                                                                21




   5. Research Challenges
      Secure Software
Software Hardening
• Compile‐time Hardening                             Rich OS
• Operating System Extensions                  3rd Party Application
• Process Virtualization / Sandboxing
                                                      Android
• System Virtualization         Secure OS       including Dalvik VM

Secure Monitoring
Secure Monitoring               Trustworthy           L4Linux
                                component      with Android patches
• VMI for malware detection
                                       VMM (L4 Microkernel)
• Attack tolerance
                                             Multi-core (SoC)

 ©C. Eckert, AISEC,

                                                                22




                                                                             11
5/26/2012




6. Take Home Message

Automotive domain: High demand for
•    openess, value-added services, cost and energy efficiency
•    Security is already a big issue (e.g. impact on safety)
Multi-core architectures: security enhancing technology
•    Attack tolerance, self-monitoring
•    Partitioning: critical, non-critical
Research issues: security architectures & controls & crypto

    Secure multi-cores: key enabling technology for CPS!

        ©C. Eckert, AISEC,




                         Thank you for your Attention




                                   Claudia Eckert
                                   Fraunhofer AISEC, Munich
                                   TU Munich, Chair for IT Security
                                   E-Mail: claudia.eckert@aisec.fraunhofer.de
                                   http://www.aisec.fraunhofer.de
                                   http://www aisec fraunhofer de




        ©C. Eckert, AISEC,




                                                                                      12

Weitere ähnliche Inhalte

Ähnlich wie Security for Automotive with Multicore-based Embedded Systems

Fundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cipFundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cip
RoutecoMarketing
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
Ivan Carmona
 

Ähnlich wie Security for Automotive with Multicore-based Embedded Systems (20)

IoT workshop - Is 1kV Also Enough for IoT ESD Protection – Do Current Test Me...
IoT workshop - Is 1kV Also Enough for IoT ESD Protection – Do Current Test Me...IoT workshop - Is 1kV Also Enough for IoT ESD Protection – Do Current Test Me...
IoT workshop - Is 1kV Also Enough for IoT ESD Protection – Do Current Test Me...
 
Review of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptxReview of Hardware based solutions for trusted cloud computing.pptx
Review of Hardware based solutions for trusted cloud computing.pptx
 
seminar ppt.pptx
seminar ppt.pptxseminar ppt.pptx
seminar ppt.pptx
 
ROUGH DOC.437
ROUGH DOC.437ROUGH DOC.437
ROUGH DOC.437
 
40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg40 Jahre Informatik Hamburg
40 Jahre Informatik Hamburg
 
IJCSE Paper
IJCSE PaperIJCSE Paper
IJCSE Paper
 
Cyber security and Industry.pptx
Cyber security and Industry.pptxCyber security and Industry.pptx
Cyber security and Industry.pptx
 
Developing functional safety systems with arm architecture solutions stroud
Developing functional safety systems with arm architecture solutions   stroudDeveloping functional safety systems with arm architecture solutions   stroud
Developing functional safety systems with arm architecture solutions stroud
 
Challenges of the io t v1
Challenges of the io t v1Challenges of the io t v1
Challenges of the io t v1
 
Bryan Singer S4 Presentation
Bryan Singer   S4 PresentationBryan Singer   S4 Presentation
Bryan Singer S4 Presentation
 
Fundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cipFundamentals of ethernet ip osi and cip
Fundamentals of ethernet ip osi and cip
 
ECI Communication Challenges for Power Utilities EUW2017
ECI Communication Challenges for Power Utilities EUW2017ECI Communication Challenges for Power Utilities EUW2017
ECI Communication Challenges for Power Utilities EUW2017
 
Sgcp12 england-sentec
Sgcp12 england-sentecSgcp12 england-sentec
Sgcp12 england-sentec
 
HiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentationHiPEAC 2022_Marcelo Pasin presentation
HiPEAC 2022_Marcelo Pasin presentation
 
Sb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinetSb securing-industrial-control-systems-with-fortinet
Sb securing-industrial-control-systems-with-fortinet
 
Eliptic Curve cryptography based on image
Eliptic Curve cryptography based on imageEliptic Curve cryptography based on image
Eliptic Curve cryptography based on image
 
Cybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT NetworksCybersecurity for Field IIoT Networks
Cybersecurity for Field IIoT Networks
 
Presentation reliable NoC
Presentation reliable NoCPresentation reliable NoC
Presentation reliable NoC
 
Secure IOT Gateway
Secure IOT GatewaySecure IOT Gateway
Secure IOT Gateway
 
Enabling utility protocols in Edge gateways
Enabling utility protocols in Edge gatewaysEnabling utility protocols in Edge gateways
Enabling utility protocols in Edge gateways
 

Mehr von Fraunhofer AISEC

PEP - Protecting Electronic Products
PEP - Protecting Electronic ProductsPEP - Protecting Electronic Products
PEP - Protecting Electronic Products
Fraunhofer AISEC
 

Mehr von Fraunhofer AISEC (20)

Fraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vornFraunhofer Magazin weiter.vorn
Fraunhofer Magazin weiter.vorn
 
Internet of (Every)Thing
Internet of (Every)ThingInternet of (Every)Thing
Internet of (Every)Thing
 
App Ray: 10000 Apps
App Ray: 10000 AppsApp Ray: 10000 Apps
App Ray: 10000 Apps
 
Produktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische GeräteProduktschutz-Technologien für elektronische Geräte
Produktschutz-Technologien für elektronische Geräte
 
Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013Cyber-Sicherheit - Newsletter 2013
Cyber-Sicherheit - Newsletter 2013
 
Native Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on AndroidNative Code Execution Control for Attack Mitigation on Android
Native Code Execution Control for Attack Mitigation on Android
 
An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition An Antivirus API for Android Malware Recognition
An Antivirus API for Android Malware Recognition
 
Marktchancen mit IT-Sicherheit
Marktchancen mit IT-SicherheitMarktchancen mit IT-Sicherheit
Marktchancen mit IT-Sicherheit
 
Cybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for SecurityCybersecurity 2013 - Design for Security
Cybersecurity 2013 - Design for Security
 
Sicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der ITSicherheitsgipfel - Chancen und Risiken der IT
Sicherheitsgipfel - Chancen und Risiken der IT
 
Tech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on AndroidTech Report: On the Effectiveness of Malware Protection on Android
Tech Report: On the Effectiveness of Malware Protection on Android
 
PEP - Protecting Electronic Products
PEP - Protecting Electronic ProductsPEP - Protecting Electronic Products
PEP - Protecting Electronic Products
 
Firmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote UpdateFirmware Encryption and Secure Remote Update
Firmware Encryption and Secure Remote Update
 
Infografik Produktschutz
Infografik ProduktschutzInfografik Produktschutz
Infografik Produktschutz
 
Cyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der WissenschaftCyber Security aus Sicht der Wissenschaft
Cyber Security aus Sicht der Wissenschaft
 
Produktschutz Infografik
Produktschutz InfografikProduktschutz Infografik
Produktschutz Infografik
 
IKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealthIKT-Trends und deren Bedeutung für eHealth
IKT-Trends und deren Bedeutung für eHealth
 
Innovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht ForschungInnovation braucht Sicherheit - Sicherheit braucht Forschung
Innovation braucht Sicherheit - Sicherheit braucht Forschung
 
Alan Turing
Alan Turing Alan Turing
Alan Turing
 
Sicherheit im Smart Grid
Sicherheit im Smart GridSicherheit im Smart Grid
Sicherheit im Smart Grid
 

Kürzlich hochgeladen

Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
gajnagarg
 
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
ezgenuh
 
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
gajnagarg
 
如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一
如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一
如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一
opyff
 
一比一原版(Greenwich毕业证书)格林威治大学毕业证如何办理
一比一原版(Greenwich毕业证书)格林威治大学毕业证如何办理一比一原版(Greenwich毕业证书)格林威治大学毕业证如何办理
一比一原版(Greenwich毕业证书)格林威治大学毕业证如何办理
bd2c5966a56d
 
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
ezgenuh
 
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
avy6anjnd
 
如何办理莱斯大学毕业证(Rice毕业证)毕业证成绩单原版一比一
如何办理莱斯大学毕业证(Rice毕业证)毕业证成绩单原版一比一如何办理莱斯大学毕业证(Rice毕业证)毕业证成绩单原版一比一
如何办理莱斯大学毕业证(Rice毕业证)毕业证成绩单原版一比一
avy6anjnd
 
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
gajnagarg
 

Kürzlich hochgeladen (20)

Why Does My Porsche Cayenne's Exhaust Sound So Loud
Why Does My Porsche Cayenne's Exhaust Sound So LoudWhy Does My Porsche Cayenne's Exhaust Sound So Loud
Why Does My Porsche Cayenne's Exhaust Sound So Loud
 
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In dewas [ 7014168258 ] Call Me For Genuine Models We ...
 
SEM 922 MOTOR GRADER PARTS LIST, ALL WHEEL DRIVE
SEM 922 MOTOR GRADER PARTS LIST, ALL WHEEL DRIVESEM 922 MOTOR GRADER PARTS LIST, ALL WHEEL DRIVE
SEM 922 MOTOR GRADER PARTS LIST, ALL WHEEL DRIVE
 
Housewife Call Girl in Faridabad ₹7.5k Pick Up & Drop With Cash Payment #8168...
Housewife Call Girl in Faridabad ₹7.5k Pick Up & Drop With Cash Payment #8168...Housewife Call Girl in Faridabad ₹7.5k Pick Up & Drop With Cash Payment #8168...
Housewife Call Girl in Faridabad ₹7.5k Pick Up & Drop With Cash Payment #8168...
 
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
 
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
Top profile Call Girls In Ranchi [ 7014168258 ] Call Me For Genuine Models We...
 
如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一
如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一
如何办理多伦多大学毕业证(UofT毕业证书)成绩单原版一比一
 
一比一原版(Greenwich毕业证书)格林威治大学毕业证如何办理
一比一原版(Greenwich毕业证书)格林威治大学毕业证如何办理一比一原版(Greenwich毕业证书)格林威治大学毕业证如何办理
一比一原版(Greenwich毕业证书)格林威治大学毕业证如何办理
 
Effortless Driving Experience Premier Mercedes Sprinter Suspension Service
Effortless Driving Experience Premier Mercedes Sprinter Suspension ServiceEffortless Driving Experience Premier Mercedes Sprinter Suspension Service
Effortless Driving Experience Premier Mercedes Sprinter Suspension Service
 
Vip Begusarai Escorts Service Girl ^ 9332606886, WhatsApp Anytime Begusarai
Vip Begusarai Escorts Service Girl ^ 9332606886, WhatsApp Anytime BegusaraiVip Begusarai Escorts Service Girl ^ 9332606886, WhatsApp Anytime Begusarai
Vip Begusarai Escorts Service Girl ^ 9332606886, WhatsApp Anytime Begusarai
 
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
一比一原版(UdeM学位证书)蒙特利尔大学毕业证学历认证怎样办
 
Marathi Call Girls Santacruz WhatsApp +91-9930687706, Best Service
Marathi Call Girls Santacruz WhatsApp +91-9930687706, Best ServiceMarathi Call Girls Santacruz WhatsApp +91-9930687706, Best Service
Marathi Call Girls Santacruz WhatsApp +91-9930687706, Best Service
 
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
如何办理(Waterloo毕业证书)滑铁卢大学毕业证毕业证成绩单原版一比一
 
Changodar Call Girls Book Now 7737669865 Top Class Escort Service Available
Changodar Call Girls Book Now 7737669865 Top Class Escort Service AvailableChangodar Call Girls Book Now 7737669865 Top Class Escort Service Available
Changodar Call Girls Book Now 7737669865 Top Class Escort Service Available
 
West Bengal Factories Rules, 1958.bfpptx
West Bengal Factories Rules, 1958.bfpptxWest Bengal Factories Rules, 1958.bfpptx
West Bengal Factories Rules, 1958.bfpptx
 
如何办理莱斯大学毕业证(Rice毕业证)毕业证成绩单原版一比一
如何办理莱斯大学毕业证(Rice毕业证)毕业证成绩单原版一比一如何办理莱斯大学毕业证(Rice毕业证)毕业证成绩单原版一比一
如何办理莱斯大学毕业证(Rice毕业证)毕业证成绩单原版一比一
 
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
Premium Call Girls Nagpur Call Girls (Adult Only) 💯Call Us 🔝 6378878445 🔝 💃 E...
 
01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc
01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc
01552_14_01306_8.0_EPS_CMP_SW_VC2_Notebook.doc
 
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In DubaiStacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
Stacey+= Dubai Calls Girls O525547819 Call Girls In Dubai
 
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
Top profile Call Girls In Anand [ 7014168258 ] Call Me For Genuine Models We ...
 

Security for Automotive with Multicore-based Embedded Systems

  • 1. 5/26/2012 Security for Automotive with Multi- core-based Embedded Systems Claudia Eckert TU München & Fraunhofer AISEC 1 DATE 2012, 16. March 2012 Dresden C. Eckert, AISEC Outline 1. Introduction 2. Security Issues  3. Multi‐core architectures: Risks 4. Multi‐core architectures: Opportunities 5. 5 Research Challenges Research Challenges 6. Take Home Message ©C. Eckert, AISEC, 1
  • 2. 5/26/2012 1. Introduction Automotive : Today • > 80 ECUs, security/safety sensitive services • Tailored ECUs for additional functions • High energy consumption • Expensive  ©C. Eckert, AISEC, 3 1. Introduction Tomorrow: more services more computational power required Intelligent Car Routing and Traffic info and Road Billing Navigation N i ti web cams (Location based) Fleet Management web information GPS Street Inter Car Parking Communication Parking Slots Reservation Contactless Gas Mobile TV Station High demand for few highly integrated multi-core systems ©C. Eckert, AISEC, 2
  • 3. 5/26/2012 Outline 1. Introduction 2. Security Issues  3. Multi‐core architectures: Risks 4. Multi‐core architectures: Opportunities 5. 5 Research Challenges Research Challenges 6. Take Home Message ©C. Eckert, AISEC, 2. Security Issues Automotive Security: Today Security level today:  Security level today: Do modern cars already provide  • Secure execution environment? • Hardened ECUs or security modules to reduce  vulnerabilities?  • Security services like intrusion detection, access  controls, self‐monitoring? ©C. Eckert, AISEC, 6 3
  • 4. 5/26/2012 2. Security Issues Automotive: Security Risks Vulnerabilities: e.g. • ECUs which are not hardened: Code injection, data manipulation • Software updates via CAN/Ethernet insufficient access control (or even missing) • External interfaces enable : remote access/attacks: NFC, C2C ©C. Eckert, AISEC, 2. Security Issues Automotive: Security Risks M2M interfaces (GSM)  • Communication with backend of OEM  • Internet access, added‐value services Vulnerabilities:  • Car logs into every GSM BTS • Attacks  with malformed   messages from GSM network  • Possible damages:  manipulation, DoS, malware ©C. Eckert, AISEC, 8 8 4
  • 5. 5/26/2012 2. Security Issues Automotive: Security Risks ©C. Eckert, AISEC, Lessons Learned so far Multi‐cores  • Multi‐core architectures are required to meet l h d  Increasing demands for computational power  Demands to reduce power consumption • Cars are already  exposed to severe security risks Questions Q i • Multi‐core: a security enhancing technology ? • Multi‐core: even more security/safety risks ? ©C. Eckert, AISEC, 10 5
  • 6. 5/26/2012 Outline 1. Introduction 2. Security Issues 3. Multi‐core architectures: Risks 4. Multi‐core architectures: Opportunities 5. 5 Research Challenges Research Challenges 6. Take Home Message ©C. Eckert, AISEC, 3. Multi-cores Even more risks … Shared resources: memory, caches, network • Data leakages: confidentiality, integrity l k fd l • Covert channels, e.g. cache  replacement strategy • Denial‐of‐service: e.g. occupying  shared memory regions: starving  safety‐critical tasks Vulnerable system software, missing separation • e.g. BO attacks: malware intrusion, manipulation, … ©C. Eckert, AISEC, 12 6
  • 7. 5/26/2012 Outline 1. Introduction 2. Security Issues 3. Multi‐core architectures: Risks 4. Multi‐core architectures: Opportunities 5. 5 Research Challenges Research Challenges 6. Take Home Message ©C. Eckert, AISEC, 4. Multi-cores Opportunities Attack tolerance FA e.g. Fault injections with laser not auth • Inject jump to bypass security checks FA 0x00 0x80 • Modify register content 00000000 10000000 • Modify alarm signals alarm OK Multi‐core: • Redundant cores to tolerate fault‐attacks:  e.g. SLE 78  redundant computation, majority voting, monitoring ©C. Eckert, AISEC, 14 14 7
  • 8. 5/26/2012 4. Multi-cores Opportunities Attack tolerance Attack tolerance e.g. side‐channel attacks • Timing (execution time of cryptographic operations) and  power (power consumption)  attacks  to crack keys    Multi‐Core • Increased resistance against side‐channel attacks: e.g. using multi‐cores for randomized  execution of  cryptographic algorithms ©C. Eckert, AISEC, 15 4. Multi-cores Opportunities Attack tolerance Attack tolerance e.g. resistance against software‐based modifications  • Redundant computation in different cores to detect  abnormal behavior (e.g. manipulated code)  ©C. Eckert, AISEC, 16 8
  • 9. 5/26/2012 4. Multi-cores Opportunities Take advantage of multi‐cores • Assign security/safety critical  tasks to dedicated  security cores (e.g. hardened cores): • secure execution environment • strict access controls • Distribute sensitive functions  between different cores to  enhance resistance against   reverse engineering attacks ©C. Eckert, AISEC, 17 4. Multi-cores Opportunities Self‐monitoring • Separate a security core from data processing cores : • Trusted OSs in monitoring system  • Collect data in userland OS (e.g. syscall traces) • Securely analyze data to detect malbehavior • Dynamic health monitoring • Extend  VMI to enhance  malware detection on  multi‐cores ©C. Eckert, AISEC, 18 9
  • 10. 5/26/2012 Outline 1. Introduction 2. Security Issues 3. Multi‐core architectures: Opportunities 4. Multi‐core architectures: Risks 5. Research Challenges Research Challenges 6. Take Home Message ©C. Eckert, AISEC, 5. Research Challenges Secure Architectures other System on Chip M2M SIM ID ID GSM Actuator Sensor Trust Core OS Core IO-interfaces Peripherals 1 2 Core i Core n RAM Flash Hardware Security System on Chip Module ©C. Eckert, AISEC, 10
  • 11. 5/26/2012 5. Research Challenges Secure Elements Scalable hardware trust anchors:  • Secure storage:  keys, credentials, access tokens • Integrity measurement:  static (TPM‐like)  as well as dynamic attestations • Support for virtualized execution environments: attaching a virtual Secure Element to individual  environments: Secure Boot, secure Updates , …  • PUF technology for secure identification ©C. Eckert, AISEC, 21 5. Research Challenges Secure Software Software Hardening • Compile‐time Hardening Rich OS • Operating System Extensions 3rd Party Application • Process Virtualization / Sandboxing Android • System Virtualization Secure OS including Dalvik VM Secure Monitoring Secure Monitoring Trustworthy L4Linux component with Android patches • VMI for malware detection VMM (L4 Microkernel) • Attack tolerance Multi-core (SoC) ©C. Eckert, AISEC, 22 11
  • 12. 5/26/2012 6. Take Home Message Automotive domain: High demand for • openess, value-added services, cost and energy efficiency • Security is already a big issue (e.g. impact on safety) Multi-core architectures: security enhancing technology • Attack tolerance, self-monitoring • Partitioning: critical, non-critical Research issues: security architectures & controls & crypto Secure multi-cores: key enabling technology for CPS! ©C. Eckert, AISEC, Thank you for your Attention Claudia Eckert Fraunhofer AISEC, Munich TU Munich, Chair for IT Security E-Mail: claudia.eckert@aisec.fraunhofer.de http://www.aisec.fraunhofer.de http://www aisec fraunhofer de ©C. Eckert, AISEC, 12