SlideShare a Scribd company logo
1 of 30
Hacking Your
Connected Car :
What you need to Know
Now
Kapil Kanugo
Twitter: @kapilkanugo
Smart Cars
Cars these days are 90%controlled by
electronics and 10% using mechanics. The
average new car already contains around 20
individual processors to monitor and control
various functions — everything from the
transmission’s shift points to the operation of the
defroster — with about
60 megabytes of software code.
Connected Cars
Many new cars are as “wired” as a
home office — with onboard GPS
navigation and wireless communications
networks including Bluetooth, Wi-Fi or
Internet run on Embedded OS's which run
on converged Electronics to control
these actions.
Seriously??
What if modern car’s onboard electronics
be “hacked” or infected by
a computer virus introduced through a
wireless device that might corrupt
or disable or controlled by a Hacker
sitting at home?
Connected Car Teardown
Connected Car Eco system
•Drivers
•Smartphone Revolution
•Embedded Open Operating
Systems and Application
Stores
•Innovation, Time-to-Market,
and Cost
•Third Party Developer
Ecosystem
•Electrical Vehicles
•Barriers
•Safety Concerns and Risks
•Government Regulation
•Cellular Connectivity Cost
and Coverage
•Telematics Applications
•Emergency Calling
(eCall)
•Roadside Assistance
(bCall)
•Remote Control
•Remote Diagnostics
•Vehicle Tracking,
Geofencing, and Driving
Behavior Monitoring
•Infotainment
Applications
•Multimedia
•Turn-by-Turn Navigation
•Social Location
Applications
•Information and
Content
•Communication
•Safety and Security Applications
•Emergency Calling (eCall)
•Roadside Assistance/Breakdown
Call (bCall)
•Stolen Vehicle Tracking and
Recovery/Geofencing
•Driver Behavior Monitoring
•Connected Infotainment
Applications
•Off-Board and Hybrid Navigation
•Concierge Services
•Online Services and Multimedia
•Pay-as-You-Drive Insurance
•Convenience Applications
•Remote Diagnostics and
Maintenance
•Electronic Toll Collection and
Congestion Charging
•Remote Door Lock/Unlock
•Smartphone Applications
•Standalone Smartphone-
Based Solutions
•Smartphone Applications
Linked with In-car Display,
Audio, and User Interface
Systems
•Use of Smartphones as
Remote Controls for
Embedded Systems
•Hybrid Systems
•Embedded Applications
Automotive
Application
Type
Consumer
Telematics
Services
Market
Drivers and
Barriers
Automotive
Application
Categories
Types of attacks on
smart cars
What types of Attacks are
Are possible on
Smart Cars
Insider Attacks
Attacker can be legitimate
owner w/ extended access rights
Attacker can prevent
emergency protection
mechanisms or security updates
Attacker doesn’t care about
legal penalties
Offline attacks
Attacker has virtually unlimited
time
Attacker has virtually unlimited
trials
Attacker and attack are hard
to detect
Physical Attacks
Asset manipulation or reads via debug
interfaces, probing, side channels,
decryption
Disabling, manipulating or any physical
inputs, outputs and processing like
brakes failure and force engine to not
start
Logical Attacks
Less securely validated software
attack
Less Validated hardware attack
Over the network attack
Over the application level
attack
Privacy Attacks
Track Vehicle movement
Compromise Driver personal
info or identity theft, credit
card info
Manipulate traffic and GPS
info for traffic
Jams or accidents
Services under Attack:
eCall
eToll
Remote Car Control
Remote Diagnosis
Danger Warning
Flashing Firmware
Where do they attack?
Automotive Interfaces
Direct Interfaces
OBD-II
CAN
OEM and Hybrid Telematics Systems
Cellular
Bluetooth
USB
Wi-Fi
Connected Cars: Questions
before us..
Ecosystem
Drivers/Barriers ?
Usage Models ?
Case Studies?
Security Arch ?
1. Data Security (credit
card, personal info,
location)
2. Privacy Protection
and deployment of
solution
3. Security as service
Business models
Risk Mitigation
Strategy?
Honeypots?
Enable Businesses
save cost ?
Business Model ?
Where are we
today?
Where do we have
to go?
What YOU need to know
Prevention
•Privacy Theft
• Disaster Deterrence
•Cryptographic
Encryption
Detection
•Intruder detection
• Internal security and
confidentiality
Deflection
•Honeypots
Countermeasures
Risk mitigation
Recovery
•Backups,
•Updates,
•self correcting
Five Pillars of Security Management in
Vehicles:
How to safeguard
Car as a black box for defining Security
and Privacy policies.
Service oriented and Layered protocol design
External data communication based on
verification if its trustworthy
Safeguard against malwares, rootkits, ROP for
x86,ARM etc platforms
Connected Car Security
Connected Car
Vehicle Platform
(ECU)
Portal at
Automotive
company
delivering services
Communication
link between
portal and Vehicle
Scalability
 Flexible configuration and
secure updates
Deployment of security
policies and privacy
Security Architecture
Identity Protocol
• Key Pair
• Certificate
• Psedonyms
• Security Manager
• Key Management
• Security Daemon
• Application Layer
• Network Layer
• Device Layer
Test Management Center
• Certificate
Management
• Certificate Revocation
TCP/IP
Secure tunnel
Internet
Security
Central
Control
Internet
Roadside Stations
Security Daemon
Communication Control
Layer
IEEE 802.11g
WPA2 protected
Secure
tunnel
Secure
tunnel
Decision basis for Cryptographic
Algorithms
• Privacy
• Key Distribution
• Verification time
• Security Overhead per message
• Authentication
• Active revocation necessary
• Security Risk
• Standards and Regulation
• Security header in Message
Payload transmitted
Encapsulation and
abstraction
Overall on-board security architecture
Centralized maintenance of dedicated security
modules.
Security API for Application developers
Static and Dynamic configuration of security policies
and privacy credentials
Addition of Security payload data for each MAC
transaction.
Need Modular (cost-)
efficient security for:
 In vehicular devices: sensors, actuators, ECU’s
 HW and SW architecture securing SW apps based on HW modules
In order to
 Enforce ECU s/w protection against SW attacks
 Provide reliable ECU/ HW/SW configuration and protection
Based on:
 Hardware based security
 Security software layer
Market Trend: Use cases
Facets of Connected Car
Data
Mobile Operating
Systems
1. Open Source vs.
Proprietary
Operating Systems
2. iPhone and iPod
Touch
1. Android
2. Nokia-Symbian
and MeeGo
3. Blackberry
4. Java
5. Windows Mobile
• Dock and
Transfer of
Credentials
• Media Content
• Web
• Widgets
• Audio
• Conferencing
• Facetime
• Browsing
• Searching
• Maps
3G Service Provider,
App Developer,
HW/SW OEM, 3rd Party
Protection Services for Your
Car
1.Multi-function security bundle
2.Privacy Protection Services
3.Protection services for Cloud farm
4.Self Managed and monitored firewall service
5.Identity Protection services
6.Intrusion prevention and detection service
7.Security services for unified threat management
(mass attack)
Protect software security
mechanisms by:
Providing trustworthy security anchor
for upper SW layers
Secure generation, secure storage
and secure processing of security
critical material from all malicious SW
Establish secure sessions between ECU
and External entity over the network
for secure communication
Reduce security costs and
overhead on high volumes
by:
Applying highly
optimized circuitry
instead of costly general
purpose hardware
Business Continuity and
Resiliency Services
Business continuity is vital to business
success, and in today's
interconnected world, virtually every
aspect of a company's operation is
vulnerable to disruption.
Managed Web security
 Provide real-time scanning of traffic against known virus
and spyware definitions
 Provide an easy-to-use, Web-based policy administration
that establishes appropriate usage and identifies
prohibited sites, content and file types
 Filter Web traffic according to your usage policy and helps
block inappropriate traffic from reaching your network
 Allow forwarding of "clean" Web traffic to the end user with
no noticeable delay in performance
 Help protect your network from new and undiscovered
vulnerabilities using advanced analyses that identify
suspicious activities
 Include Help Desk services, security advisories, and access
to the incident response team
Steps to Take
 Help manage compliance with security initiatives by
scanning for and classifying vulnerabilities
 Provide remediation steps and data to assess and
manage security risks to help reduce threat exposure
 Help reduce cost and complexity of security
maintenance through Intel cloud security services
 Vulnerability management can detect vulnerabilities
across network devices, servers, web applications
and databases to help reduce risk and better
manage compliance requirements. And because
solution is cloud-based, customers can save on
licensing fees and security operations maintenance
costs

More Related Content

What's hot

Building Beautiful High Performance Connected Car Applications
Building Beautiful High Performance Connected Car ApplicationsBuilding Beautiful High Performance Connected Car Applications
Building Beautiful High Performance Connected Car ApplicationsJason Wiener
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car SecuritySuresh Mandava
 
Connected Car as New Marketplace SxSW 2016
Connected Car as New Marketplace  SxSW 2016Connected Car as New Marketplace  SxSW 2016
Connected Car as New Marketplace SxSW 2016Jason Hoover
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioHCL Technologies
 
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...Lounge47
 
Arynga webinar: monetize connected car
Arynga webinar: monetize connected carArynga webinar: monetize connected car
Arynga webinar: monetize connected carArynga
 
Alexa and the Connected Car
Alexa and the Connected CarAlexa and the Connected Car
Alexa and the Connected CarEmily (Hong) Lam
 
MONETIZING THE CONNECTED CAR, Citi 2013 Connected Car Symposium
MONETIZING  THE CONNECTED CAR, Citi 2013 Connected Car SymposiumMONETIZING  THE CONNECTED CAR, Citi 2013 Connected Car Symposium
MONETIZING THE CONNECTED CAR, Citi 2013 Connected Car SymposiumArynga
 
Connected Cars Are the Next Must Have Consumer Electronics Device
Connected Cars Are the Next Must Have Consumer Electronics DeviceConnected Cars Are the Next Must Have Consumer Electronics Device
Connected Cars Are the Next Must Have Consumer Electronics DeviceCisco Jasper
 
WSO2 @ Connected Car
WSO2 @ Connected CarWSO2 @ Connected Car
WSO2 @ Connected CarWSO2
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...CA API Management
 
Connected car solutions: one of the major business drivers for the automotive...
Connected car solutions: one of the major business drivers for the automotive...Connected car solutions: one of the major business drivers for the automotive...
Connected car solutions: one of the major business drivers for the automotive...Pierre Audoin Consultants
 
Lochbridge Connected Car Ecosystem
Lochbridge Connected Car EcosystemLochbridge Connected Car Ecosystem
Lochbridge Connected Car EcosystemRomil Bahl
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive IndustrySasken Technologies Ltd.
 
24 Connected Car features to look out for before the release of Bond 24
24 Connected Car features to look out for before the release of Bond 2424 Connected Car features to look out for before the release of Bond 24
24 Connected Car features to look out for before the release of Bond 24HARMAN Services
 
connected car is mobile, social, big data, cloud
connected car is mobile, social, big data, cloudconnected car is mobile, social, big data, cloud
connected car is mobile, social, big data, cloudJoe Speed
 
Connected Car by Ashish Bhasin
Connected Car by Ashish BhasinConnected Car by Ashish Bhasin
Connected Car by Ashish BhasinAshish Bhasin
 

What's hot (20)

Building Beautiful High Performance Connected Car Applications
Building Beautiful High Performance Connected Car ApplicationsBuilding Beautiful High Performance Connected Car Applications
Building Beautiful High Performance Connected Car Applications
 
Connected Car Security
Connected Car SecurityConnected Car Security
Connected Car Security
 
Connected Cars
Connected CarsConnected Cars
Connected Cars
 
Telefonica's 2014 connected car report
Telefonica's 2014 connected car reportTelefonica's 2014 connected car report
Telefonica's 2014 connected car report
 
Connected Car as New Marketplace SxSW 2016
Connected Car as New Marketplace  SxSW 2016Connected Car as New Marketplace  SxSW 2016
Connected Car as New Marketplace SxSW 2016
 
Connected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian ScenarioConnected Cars - Use Cases for Indian Scenario
Connected Cars - Use Cases for Indian Scenario
 
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
IoT - CONNECTED CAR - TECHNOLOGY TRENDS & OPPORTUNITIES - Harsha Bagur, Rober...
 
Arynga webinar: monetize connected car
Arynga webinar: monetize connected carArynga webinar: monetize connected car
Arynga webinar: monetize connected car
 
Alexa and the Connected Car
Alexa and the Connected CarAlexa and the Connected Car
Alexa and the Connected Car
 
MONETIZING THE CONNECTED CAR, Citi 2013 Connected Car Symposium
MONETIZING  THE CONNECTED CAR, Citi 2013 Connected Car SymposiumMONETIZING  THE CONNECTED CAR, Citi 2013 Connected Car Symposium
MONETIZING THE CONNECTED CAR, Citi 2013 Connected Car Symposium
 
Future Of Driving
Future Of DrivingFuture Of Driving
Future Of Driving
 
Connected Cars Are the Next Must Have Consumer Electronics Device
Connected Cars Are the Next Must Have Consumer Electronics DeviceConnected Cars Are the Next Must Have Consumer Electronics Device
Connected Cars Are the Next Must Have Consumer Electronics Device
 
WSO2 @ Connected Car
WSO2 @ Connected CarWSO2 @ Connected Car
WSO2 @ Connected Car
 
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
APIs Fueling the Connected Car Opportunity - Scott Morrison, SVP & Distinguis...
 
Connected car solutions: one of the major business drivers for the automotive...
Connected car solutions: one of the major business drivers for the automotive...Connected car solutions: one of the major business drivers for the automotive...
Connected car solutions: one of the major business drivers for the automotive...
 
Lochbridge Connected Car Ecosystem
Lochbridge Connected Car EcosystemLochbridge Connected Car Ecosystem
Lochbridge Connected Car Ecosystem
 
Addressing Security in the Automotive Industry
Addressing Security in the Automotive IndustryAddressing Security in the Automotive Industry
Addressing Security in the Automotive Industry
 
24 Connected Car features to look out for before the release of Bond 24
24 Connected Car features to look out for before the release of Bond 2424 Connected Car features to look out for before the release of Bond 24
24 Connected Car features to look out for before the release of Bond 24
 
connected car is mobile, social, big data, cloud
connected car is mobile, social, big data, cloudconnected car is mobile, social, big data, cloud
connected car is mobile, social, big data, cloud
 
Connected Car by Ashish Bhasin
Connected Car by Ashish BhasinConnected Car by Ashish Bhasin
Connected Car by Ashish Bhasin
 

Viewers also liked

Insurance is the most profitable connected vehicle service
Insurance is the most profitable connected vehicle serviceInsurance is the most profitable connected vehicle service
Insurance is the most profitable connected vehicle serviceCambridge Mobile Telematics
 
Value for a Connected Vehicle (IoT)
Value for a Connected Vehicle (IoT)Value for a Connected Vehicle (IoT)
Value for a Connected Vehicle (IoT)Brian Loomis
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...CA API Management
 
Rapport modélisation web 2.0
Rapport modélisation web 2.0Rapport modélisation web 2.0
Rapport modélisation web 2.0Tbatou sanae
 
Braking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesBraking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesPriyanka Aash
 
"Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro...
"Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro..."Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro...
"Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro...Edge AI and Vision Alliance
 
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...FFRI, Inc.
 
Smart Car Marketing Recommendations
Smart Car Marketing RecommendationsSmart Car Marketing Recommendations
Smart Car Marketing Recommendationschris_mac
 
Rapport application chat
Rapport application chatRapport application chat
Rapport application chatTbatou sanae
 
Braking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesBraking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesPriyanka Aash
 
Exposé traitement d'image
Exposé traitement d'image Exposé traitement d'image
Exposé traitement d'image Tbatou sanae
 
Connected Cars by Akshat Kant
Connected Cars by Akshat KantConnected Cars by Akshat Kant
Connected Cars by Akshat KantAkshat Kant
 
BUSINESS RESCUE & OPPORTUNITIES FOR DISTRESSED FUNDS IN SOUTH AFRICA
BUSINESS RESCUE & OPPORTUNITIES FOR DISTRESSED FUNDS IN SOUTH AFRICABUSINESS RESCUE & OPPORTUNITIES FOR DISTRESSED FUNDS IN SOUTH AFRICA
BUSINESS RESCUE & OPPORTUNITIES FOR DISTRESSED FUNDS IN SOUTH AFRICAWerksmans Attorneys
 
Global Commercial Telematics Market - Size, Share, Global Trends, Company Pro...
Global Commercial Telematics Market - Size, Share, Global Trends, Company Pro...Global Commercial Telematics Market - Size, Share, Global Trends, Company Pro...
Global Commercial Telematics Market - Size, Share, Global Trends, Company Pro...Allied Market Research
 

Viewers also liked (17)

Cyber Security for the Connected Car
Cyber Security for the Connected Car Cyber Security for the Connected Car
Cyber Security for the Connected Car
 
Insurance is the most profitable connected vehicle service
Insurance is the most profitable connected vehicle serviceInsurance is the most profitable connected vehicle service
Insurance is the most profitable connected vehicle service
 
Value for a Connected Vehicle (IoT)
Value for a Connected Vehicle (IoT)Value for a Connected Vehicle (IoT)
Value for a Connected Vehicle (IoT)
 
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ... Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
Panel Session: Security & Privacy for Connected Cars w/ Scott Morrison, SVP ...
 
Csss3
Csss3Csss3
Csss3
 
Rapport modélisation web 2.0
Rapport modélisation web 2.0Rapport modélisation web 2.0
Rapport modélisation web 2.0
 
Braking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesBraking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle Vulnerabilities
 
"Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro...
"Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro..."Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro...
"Computer Vision in Cars: Status, Challenges, and Trends," a Presentation fro...
 
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
Trend of Next-Gen In-Vehicle Network Standard and Current State of Security(F...
 
Smart Car Marketing Recommendations
Smart Car Marketing RecommendationsSmart Car Marketing Recommendations
Smart Car Marketing Recommendations
 
Rapport application chat
Rapport application chatRapport application chat
Rapport application chat
 
Braking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle VulnerabilitiesBraking the Connected Car: The Future of Vehicle Vulnerabilities
Braking the Connected Car: The Future of Vehicle Vulnerabilities
 
Smart Cars
Smart Cars Smart Cars
Smart Cars
 
Exposé traitement d'image
Exposé traitement d'image Exposé traitement d'image
Exposé traitement d'image
 
Connected Cars by Akshat Kant
Connected Cars by Akshat KantConnected Cars by Akshat Kant
Connected Cars by Akshat Kant
 
BUSINESS RESCUE & OPPORTUNITIES FOR DISTRESSED FUNDS IN SOUTH AFRICA
BUSINESS RESCUE & OPPORTUNITIES FOR DISTRESSED FUNDS IN SOUTH AFRICABUSINESS RESCUE & OPPORTUNITIES FOR DISTRESSED FUNDS IN SOUTH AFRICA
BUSINESS RESCUE & OPPORTUNITIES FOR DISTRESSED FUNDS IN SOUTH AFRICA
 
Global Commercial Telematics Market - Size, Share, Global Trends, Company Pro...
Global Commercial Telematics Market - Size, Share, Global Trends, Company Pro...Global Commercial Telematics Market - Size, Share, Global Trends, Company Pro...
Global Commercial Telematics Market - Size, Share, Global Trends, Company Pro...
 

Similar to Hacking your Connected Car: What you need to know NOW

Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesMadhur Gupta
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsGGR Communications
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securitypptSachin Roy
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsTonex
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Turvallisuus2013
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic ChallengesJorge Sebastiao
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectivePragati Rai
 
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptxSeminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptxsaketkumar128143
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldBrad Nicholas
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General InfoAnton Lishchuk
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber SecurityJAZEEL K T
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities DeckPete Wassell
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protectionxband
 
Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF Kemp
 
IoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosIoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosXylos
 

Similar to Hacking your Connected Car: What you need to know NOW (20)

Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and RemediesConnected vehicles: An Overview on Security, Vulnerabilities and Remedies
Connected vehicles: An Overview on Security, Vulnerabilities and Remedies
 
Secure Mobility from GGR Communications
Secure Mobility from GGR CommunicationsSecure Mobility from GGR Communications
Secure Mobility from GGR Communications
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securityppt
 
Network Security for Automotive Embedded Systems
Network Security for Automotive Embedded SystemsNetwork Security for Automotive Embedded Systems
Network Security for Automotive Embedded Systems
 
Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013Cyber Tekes Safety and Security programme 2013
Cyber Tekes Safety and Security programme 2013
 
Insight into IT Strategic Challenges
Insight into IT Strategic ChallengesInsight into IT Strategic Challenges
Insight into IT Strategic Challenges
 
Mobile Commerce: A Security Perspective
Mobile Commerce: A Security PerspectiveMobile Commerce: A Security Perspective
Mobile Commerce: A Security Perspective
 
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptxSeminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
Seminar topic -ROLE OF CYBER SECURITY IN CON CAR.pptx
 
Countering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT WorldCountering Cybersecurity Risk in Today's IoT World
Countering Cybersecurity Risk in Today's IoT World
 
SecureTower General Info
SecureTower General InfoSecureTower General Info
SecureTower General Info
 
Apani Ov V9
Apani Ov V9Apani Ov V9
Apani Ov V9
 
Visiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watchVisiongain publishes report on: The 100 connected car companies to watch
Visiongain publishes report on: The 100 connected car companies to watch
 
MBM Security Products Matrix
MBM Security Products MatrixMBM Security Products Matrix
MBM Security Products Matrix
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
Smart Grid Cyber Security
Smart Grid Cyber SecuritySmart Grid Cyber Security
Smart Grid Cyber Security
 
Augmate Capabilities Deck
Augmate Capabilities DeckAugmate Capabilities Deck
Augmate Capabilities Deck
 
Complete Endpoint protection
Complete Endpoint protectionComplete Endpoint protection
Complete Endpoint protection
 
Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF Internet of Things, OWASP & WAF
Internet of Things, OWASP & WAF
 
IoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaosIoT from edge to cloud: bringing order to the chaos
IoT from edge to cloud: bringing order to the chaos
 

Recently uploaded

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 

Recently uploaded (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 

Hacking your Connected Car: What you need to know NOW

  • 1. Hacking Your Connected Car : What you need to Know Now Kapil Kanugo Twitter: @kapilkanugo
  • 2. Smart Cars Cars these days are 90%controlled by electronics and 10% using mechanics. The average new car already contains around 20 individual processors to monitor and control various functions — everything from the transmission’s shift points to the operation of the defroster — with about 60 megabytes of software code.
  • 3. Connected Cars Many new cars are as “wired” as a home office — with onboard GPS navigation and wireless communications networks including Bluetooth, Wi-Fi or Internet run on Embedded OS's which run on converged Electronics to control these actions.
  • 4. Seriously?? What if modern car’s onboard electronics be “hacked” or infected by a computer virus introduced through a wireless device that might corrupt or disable or controlled by a Hacker sitting at home?
  • 6. Connected Car Eco system •Drivers •Smartphone Revolution •Embedded Open Operating Systems and Application Stores •Innovation, Time-to-Market, and Cost •Third Party Developer Ecosystem •Electrical Vehicles •Barriers •Safety Concerns and Risks •Government Regulation •Cellular Connectivity Cost and Coverage •Telematics Applications •Emergency Calling (eCall) •Roadside Assistance (bCall) •Remote Control •Remote Diagnostics •Vehicle Tracking, Geofencing, and Driving Behavior Monitoring •Infotainment Applications •Multimedia •Turn-by-Turn Navigation •Social Location Applications •Information and Content •Communication •Safety and Security Applications •Emergency Calling (eCall) •Roadside Assistance/Breakdown Call (bCall) •Stolen Vehicle Tracking and Recovery/Geofencing •Driver Behavior Monitoring •Connected Infotainment Applications •Off-Board and Hybrid Navigation •Concierge Services •Online Services and Multimedia •Pay-as-You-Drive Insurance •Convenience Applications •Remote Diagnostics and Maintenance •Electronic Toll Collection and Congestion Charging •Remote Door Lock/Unlock •Smartphone Applications •Standalone Smartphone- Based Solutions •Smartphone Applications Linked with In-car Display, Audio, and User Interface Systems •Use of Smartphones as Remote Controls for Embedded Systems •Hybrid Systems •Embedded Applications Automotive Application Type Consumer Telematics Services Market Drivers and Barriers Automotive Application Categories
  • 7. Types of attacks on smart cars What types of Attacks are Are possible on Smart Cars
  • 8. Insider Attacks Attacker can be legitimate owner w/ extended access rights Attacker can prevent emergency protection mechanisms or security updates Attacker doesn’t care about legal penalties
  • 9. Offline attacks Attacker has virtually unlimited time Attacker has virtually unlimited trials Attacker and attack are hard to detect
  • 10. Physical Attacks Asset manipulation or reads via debug interfaces, probing, side channels, decryption Disabling, manipulating or any physical inputs, outputs and processing like brakes failure and force engine to not start
  • 11. Logical Attacks Less securely validated software attack Less Validated hardware attack Over the network attack Over the application level attack
  • 12. Privacy Attacks Track Vehicle movement Compromise Driver personal info or identity theft, credit card info Manipulate traffic and GPS info for traffic Jams or accidents
  • 13. Services under Attack: eCall eToll Remote Car Control Remote Diagnosis Danger Warning Flashing Firmware
  • 14. Where do they attack? Automotive Interfaces Direct Interfaces OBD-II CAN OEM and Hybrid Telematics Systems Cellular Bluetooth USB Wi-Fi
  • 15. Connected Cars: Questions before us.. Ecosystem Drivers/Barriers ? Usage Models ? Case Studies? Security Arch ? 1. Data Security (credit card, personal info, location) 2. Privacy Protection and deployment of solution 3. Security as service Business models Risk Mitigation Strategy? Honeypots? Enable Businesses save cost ? Business Model ? Where are we today? Where do we have to go?
  • 16. What YOU need to know Prevention •Privacy Theft • Disaster Deterrence •Cryptographic Encryption Detection •Intruder detection • Internal security and confidentiality Deflection •Honeypots Countermeasures Risk mitigation Recovery •Backups, •Updates, •self correcting Five Pillars of Security Management in Vehicles:
  • 17. How to safeguard Car as a black box for defining Security and Privacy policies. Service oriented and Layered protocol design External data communication based on verification if its trustworthy Safeguard against malwares, rootkits, ROP for x86,ARM etc platforms
  • 18. Connected Car Security Connected Car Vehicle Platform (ECU) Portal at Automotive company delivering services Communication link between portal and Vehicle
  • 19. Scalability  Flexible configuration and secure updates Deployment of security policies and privacy
  • 20. Security Architecture Identity Protocol • Key Pair • Certificate • Psedonyms • Security Manager • Key Management • Security Daemon • Application Layer • Network Layer • Device Layer Test Management Center • Certificate Management • Certificate Revocation TCP/IP Secure tunnel Internet Security Central Control Internet Roadside Stations Security Daemon Communication Control Layer IEEE 802.11g WPA2 protected Secure tunnel Secure tunnel Decision basis for Cryptographic Algorithms • Privacy • Key Distribution • Verification time • Security Overhead per message • Authentication • Active revocation necessary • Security Risk • Standards and Regulation • Security header in Message Payload transmitted
  • 21. Encapsulation and abstraction Overall on-board security architecture Centralized maintenance of dedicated security modules. Security API for Application developers Static and Dynamic configuration of security policies and privacy credentials Addition of Security payload data for each MAC transaction.
  • 22. Need Modular (cost-) efficient security for:  In vehicular devices: sensors, actuators, ECU’s  HW and SW architecture securing SW apps based on HW modules In order to  Enforce ECU s/w protection against SW attacks  Provide reliable ECU/ HW/SW configuration and protection Based on:  Hardware based security  Security software layer
  • 24. Facets of Connected Car Data Mobile Operating Systems 1. Open Source vs. Proprietary Operating Systems 2. iPhone and iPod Touch 1. Android 2. Nokia-Symbian and MeeGo 3. Blackberry 4. Java 5. Windows Mobile • Dock and Transfer of Credentials • Media Content • Web • Widgets • Audio • Conferencing • Facetime • Browsing • Searching • Maps 3G Service Provider, App Developer, HW/SW OEM, 3rd Party
  • 25. Protection Services for Your Car 1.Multi-function security bundle 2.Privacy Protection Services 3.Protection services for Cloud farm 4.Self Managed and monitored firewall service 5.Identity Protection services 6.Intrusion prevention and detection service 7.Security services for unified threat management (mass attack)
  • 26. Protect software security mechanisms by: Providing trustworthy security anchor for upper SW layers Secure generation, secure storage and secure processing of security critical material from all malicious SW Establish secure sessions between ECU and External entity over the network for secure communication
  • 27. Reduce security costs and overhead on high volumes by: Applying highly optimized circuitry instead of costly general purpose hardware
  • 28. Business Continuity and Resiliency Services Business continuity is vital to business success, and in today's interconnected world, virtually every aspect of a company's operation is vulnerable to disruption.
  • 29. Managed Web security  Provide real-time scanning of traffic against known virus and spyware definitions  Provide an easy-to-use, Web-based policy administration that establishes appropriate usage and identifies prohibited sites, content and file types  Filter Web traffic according to your usage policy and helps block inappropriate traffic from reaching your network  Allow forwarding of "clean" Web traffic to the end user with no noticeable delay in performance  Help protect your network from new and undiscovered vulnerabilities using advanced analyses that identify suspicious activities  Include Help Desk services, security advisories, and access to the incident response team
  • 30. Steps to Take  Help manage compliance with security initiatives by scanning for and classifying vulnerabilities  Provide remediation steps and data to assess and manage security risks to help reduce threat exposure  Help reduce cost and complexity of security maintenance through Intel cloud security services  Vulnerability management can detect vulnerabilities across network devices, servers, web applications and databases to help reduce risk and better manage compliance requirements. And because solution is cloud-based, customers can save on licensing fees and security operations maintenance costs