SlideShare une entreprise Scribd logo
1  sur  17
©2017 Trusted Computing Group
Software and Supply
Chain Assurance Forum
TPM for Automotive
1
©2017 Trusted Computing Group
SAE J3101 defines HW Security
• Hardware Protected Security Environment
– Offers at least one mechanism of security
implemented by hardware support
– Offers resilience against arbitrary execution
of software within a system
• Secure Keystore
• Authenticated Boot
• Authenticated Software Flashing
• Authenticate messages in the vehicle
• Broadcast/Multicast Authentication
• Secure Storage
• Access to Private Data
• etc…
• Root of Trust for Measurement (RTM)
• Root of Trust for Reporting (RTR)
• Root of Trust for Storage (RTS)
• Establish a basis of trust – belief that a device
will behave in an expected way
• TCG uses cryptographic methods to attest
identity of the device and its expected
behavior, both of HW and SW
• The TCG’s method for attestation is to use a
key associated with the hardware to sign one
or more values that represent the software
SAE J3101 TPM as a HW RoT
2
©2017 Trusted Computing Group
Defense in Depth
Fast cryptographic performance
Device identification
Isolated execution
(Message) Authentication
Virtualization
Hardware security services that can be used by applications
Platform boot integrity and Chain of Trust
Secure Storage (keys and data)
Secure Communication
Secure Debug
Tamper detection and protection from side channel attacks
Hardware security building blocks
Over-the Air Updates
IDPS / Anomaly Detection
Network enforcement
Certificate Management Services
Antimalware and remote monitoring
Biometrics
Software and Services
Security features in the silicon, for example Memory Scrambling,
Execution Prevention, etc.
Defense in Depth
HardwareRootofTrust(TPM)
Analog security monitoring under the CPU
Components associated with physical
control of the vehicle
Components associated with safety
Components associated with
entertainment and convenience
The Interconnected Car
Image credit: Mercedes-Benz
Museum (as cited in Computer History
Museum, 2011)
3
©2017 Trusted Computing Group
Vehicle Assets (by ENISA)
4
©2017 Trusted Computing Group
Vehicle Threats (by ENISA)
5
©2017 Trusted Computing Group
Why do you need HW Security?
Basic Cryptography Key Management Miscellaneous
Secure Hash (SHA2, SHA3) Key Derivation Function (KDF) Compression/Decompression
Message Authentication Code (CMAC, HMAC, GMAC)
 Generation
 Verification
Secure Key and Certificate Storage
 Access Management
 Import/Export Services
 Generation
 Update
Checksum
Signatures
 Generation
 Verification
Key exchange protocols
Random Number Generation
Encryption/Decryption
 Symmetric (CBC, CTR)
 Asymmetric
 ECC (P-256, NIST, SEC2, Brainpool)
Secure Clock
 Time stamping
 Validity check for key data
6
©2017 Trusted Computing Group
SDC Example
TSS
Dedicated
Security Core
TPM
Example from Mentor Graphics
with HW Security Core and TPM overlay
AUTOSAR CSM
Translation Stack
7
©2017 Trusted Computing Group
Automotive E/E Trends
8
©2017 Trusted Computing Group
TPM Practical Applications
• A Trusted Platform Module (TPM) is a microchip designed to provide basic security-related functions,
primarily involving encryption keys.
• An ECU that incorporates a TPM can create cryptographic keys and encrypt them so that they can
only be decrypted by the TPM (binding a key).
• Certificates can be installed or created; the RSA private key for a certificate is bound to the TPM and
cannot be exported.
• Running software can use the boot measurements of the operating system start state to prove the
integrity of an ECU.
• The TPM has several Group Policy settings that might be useful in certain scenarios such as
authorization.
• Because the TPM uses its own internal firmware and logic circuits to process instructions, it does not
rely on the operating system, and it is not exposed to vulnerabilities that might exist in the operating
system or application software.
9
©2017 Trusted Computing Group
TPM 2.0 Software Stack (TSS)
AUTOSAR CSM Translation
TPM is a dedicated hardware that:
• Protects a unique platform identity (TPM)
• Verifies software integrity before software is
loaded (TPM)
• Protects network integrity (TNC or Trusted
Network Connect)
• Protects data integrity and confidentiality (SED
or Self-Encrypting Drive)
10
©2017 Trusted Computing Group
TPM Main Functions
11
©2017 Trusted Computing Group
Why TPM?
• Trusted computing is cyber defense technology that can be used to protect data, platforms and
networks
• Trusted computing technologies are actively evolving, with new standards and new products
regularly entering the market
• Major hardware manufacturers and software vendors support trusted computing off-the-shelf
• Trusted computing products can offer a cost-effective path to improved compliance and security
TCG has the TPM Automotive Thin Profile specification and is working on the TPM
Automotive Rich Profile specification which will satisfy underlying SAE J3101
requirements and provide security foundation for protecting vehicles.
12
©2017 Trusted Computing Group
Backup
backup
©2017 Trusted Computing Group 14
©2017 Trusted Computing Group
©2017 Trusted Computing Group
©2017 Trusted Computing Group 17

Contenu connexe

Tendances

Uboot startup sequence
Uboot startup sequenceUboot startup sequence
Uboot startup sequence
Houcheng Lin
 
Audio in linux embedded
Audio in linux embeddedAudio in linux embedded
Audio in linux embedded
trx2001
 
TEE - kernel support is now upstream. What this means for open source security
TEE - kernel support is now upstream. What this means for open source securityTEE - kernel support is now upstream. What this means for open source security
TEE - kernel support is now upstream. What this means for open source security
Linaro
 
HKG18-402 - Build secure key management services in OP-TEE
HKG18-402 - Build secure key management services in OP-TEEHKG18-402 - Build secure key management services in OP-TEE
HKG18-402 - Build secure key management services in OP-TEE
Linaro
 

Tendances (20)

Secure boot general
Secure boot generalSecure boot general
Secure boot general
 
LAS16-402: ARM Trusted Firmware – from Enterprise to Embedded
LAS16-402: ARM Trusted Firmware – from Enterprise to EmbeddedLAS16-402: ARM Trusted Firmware – from Enterprise to Embedded
LAS16-402: ARM Trusted Firmware – from Enterprise to Embedded
 
Yum (Linux)
Yum (Linux) Yum (Linux)
Yum (Linux)
 
U Boot or Universal Bootloader
U Boot or Universal BootloaderU Boot or Universal Bootloader
U Boot or Universal Bootloader
 
Introduction to Java Programming, Basic Structure, variables Data type, input...
Introduction to Java Programming, Basic Structure, variables Data type, input...Introduction to Java Programming, Basic Structure, variables Data type, input...
Introduction to Java Programming, Basic Structure, variables Data type, input...
 
Uboot startup sequence
Uboot startup sequenceUboot startup sequence
Uboot startup sequence
 
Audio in linux embedded
Audio in linux embeddedAudio in linux embedded
Audio in linux embedded
 
TEE - kernel support is now upstream. What this means for open source security
TEE - kernel support is now upstream. What this means for open source securityTEE - kernel support is now upstream. What this means for open source security
TEE - kernel support is now upstream. What this means for open source security
 
U boot-boot-flow
U boot-boot-flowU boot-boot-flow
U boot-boot-flow
 
Yocto Project introduction
Yocto Project introductionYocto Project introduction
Yocto Project introduction
 
SFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEESFO15-503: Secure storage in OP-TEE
SFO15-503: Secure storage in OP-TEE
 
Android open source project build system phi innovations - android summit 2015
Android open source project build system   phi innovations - android summit 2015Android open source project build system   phi innovations - android summit 2015
Android open source project build system phi innovations - android summit 2015
 
HKG15-311: OP-TEE for Beginners and Porting Review
HKG15-311: OP-TEE for Beginners and Porting ReviewHKG15-311: OP-TEE for Beginners and Porting Review
HKG15-311: OP-TEE for Beginners and Porting Review
 
HKG18-402 - Build secure key management services in OP-TEE
HKG18-402 - Build secure key management services in OP-TEEHKG18-402 - Build secure key management services in OP-TEE
HKG18-402 - Build secure key management services in OP-TEE
 
Toolchain
ToolchainToolchain
Toolchain
 
LAS16-504: Secure Storage updates in OP-TEE
LAS16-504: Secure Storage updates in OP-TEELAS16-504: Secure Storage updates in OP-TEE
LAS16-504: Secure Storage updates in OP-TEE
 
Bootloaders (U-Boot)
Bootloaders (U-Boot) Bootloaders (U-Boot)
Bootloaders (U-Boot)
 
Automotive OTA Security For The Connected Vehicle (ASRG Secure Our Streets 2022)
Automotive OTA Security For The Connected Vehicle (ASRG Secure Our Streets 2022)Automotive OTA Security For The Connected Vehicle (ASRG Secure Our Streets 2022)
Automotive OTA Security For The Connected Vehicle (ASRG Secure Our Streets 2022)
 
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
Secure Boot on ARM systems – Building a complete Chain of Trust upon existing...
 
LCA14: LCA14-502: The way to a generic TrustZone® solution
LCA14: LCA14-502: The way to a generic TrustZone® solutionLCA14: LCA14-502: The way to a generic TrustZone® solution
LCA14: LCA14-502: The way to a generic TrustZone® solution
 

En vedette

Agustin Barrios Mangore, o homem e o artista
Agustin Barrios Mangore, o homem e o artistaAgustin Barrios Mangore, o homem e o artista
Agustin Barrios Mangore, o homem e o artista
alfeuRIO
 
Unidad educativa municipal san francisco de quito
Unidad educativa municipal san francisco de quitoUnidad educativa municipal san francisco de quito
Unidad educativa municipal san francisco de quito
victor27081998
 

En vedette (20)

Automotive security (cvta)
Automotive security (cvta)Automotive security (cvta)
Automotive security (cvta)
 
Plan de imagen institucional 2013-2015
Plan  de imagen institucional 2013-2015Plan  de imagen institucional 2013-2015
Plan de imagen institucional 2013-2015
 
1110458853 8
1110458853 81110458853 8
1110458853 8
 
93200002 8
93200002 893200002 8
93200002 8
 
1071302232 8
1071302232  81071302232  8
1071302232 8
 
93370499 8
93370499 893370499 8
93370499 8
 
Curso de powerpoint
Curso de powerpointCurso de powerpoint
Curso de powerpoint
 
LIS 704: Ready Reference Instruction for Emily Post's Etiquette
LIS 704: Ready Reference Instruction for Emily Post's EtiquetteLIS 704: Ready Reference Instruction for Emily Post's Etiquette
LIS 704: Ready Reference Instruction for Emily Post's Etiquette
 
Agustin Barrios Mangore, o homem e o artista
Agustin Barrios Mangore, o homem e o artistaAgustin Barrios Mangore, o homem e o artista
Agustin Barrios Mangore, o homem e o artista
 
Scanning the landscape by Ryan Rosauro
Scanning the landscape by Ryan RosauroScanning the landscape by Ryan Rosauro
Scanning the landscape by Ryan Rosauro
 
Universidad fermin toro medicina legal
Universidad fermin toro medicina legalUniversidad fermin toro medicina legal
Universidad fermin toro medicina legal
 
Auto cad 2000
Auto cad 2000Auto cad 2000
Auto cad 2000
 
Setemi News
Setemi NewsSetemi News
Setemi News
 
Рекомендованные Cisco архитектуры для различных вертикалей
Рекомендованные Cisco архитектуры для различных вертикалейРекомендованные Cisco архитектуры для различных вертикалей
Рекомендованные Cisco архитектуры для различных вертикалей
 
Excel 2000
Excel 2000Excel 2000
Excel 2000
 
Unidad educativa municipal san francisco de quito
Unidad educativa municipal san francisco de quitoUnidad educativa municipal san francisco de quito
Unidad educativa municipal san francisco de quito
 
Energia nuclear
Energia nuclearEnergia nuclear
Energia nuclear
 
Análisis critico libro adolescentes
Análisis critico libro adolescentesAnálisis critico libro adolescentes
Análisis critico libro adolescentes
 
Diez
DiezDiez
Diez
 
EDRM Australia 2017: (Electronic Document and Records Management)
EDRM Australia 2017: (Electronic Document and Records Management)EDRM Australia 2017: (Electronic Document and Records Management)
EDRM Australia 2017: (Electronic Document and Records Management)
 

Similaire à Why TPM in Automotive?

Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Linaro
 

Similaire à Why TPM in Automotive? (20)

Abbie Barbir Tcg Final
Abbie Barbir Tcg FinalAbbie Barbir Tcg Final
Abbie Barbir Tcg Final
 
Trusted computing introduction and technical overview
Trusted computing introduction and technical overviewTrusted computing introduction and technical overview
Trusted computing introduction and technical overview
 
Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)Introduction of Trusted Network Connect (TNC)
Introduction of Trusted Network Connect (TNC)
 
Trusted Computing security _platform.ppt
Trusted Computing security _platform.pptTrusted Computing security _platform.ppt
Trusted Computing security _platform.ppt
 
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304Demystifying Security Root of Trust Approaches for IoT/Embedded  - SFO17-304
Demystifying Security Root of Trust Approaches for IoT/Embedded - SFO17-304
 
Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
LAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devicesLAS16-203: Platform security architecture for embedded devices
LAS16-203: Platform security architecture for embedded devices
 
DYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGESDYNAMIC ROOT OF TRUST AND CHALLENGES
DYNAMIC ROOT OF TRUST AND CHALLENGES
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
Standardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-VStandardizing the tee with global platform and RISC-V
Standardizing the tee with global platform and RISC-V
 
Trusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .pptTrusted _Computing _security mobile .ppt
Trusted _Computing _security mobile .ppt
 
Introduction to Trusted Computing
Introduction to Trusted ComputingIntroduction to Trusted Computing
Introduction to Trusted Computing
 
trusted computing platform alliancee.ppt
trusted computing platform alliancee.ppttrusted computing platform alliancee.ppt
trusted computing platform alliancee.ppt
 
50120140502015
5012014050201550120140502015
50120140502015
 
Security Consideration for Set-top box SoC
Security Consideration for Set-top box SoCSecurity Consideration for Set-top box SoC
Security Consideration for Set-top box SoC
 
Knorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case StudyKnorr-Bremse Group Strong Authentication Case Study
Knorr-Bremse Group Strong Authentication Case Study
 
Trusted Computing Base
Trusted Computing BaseTrusted Computing Base
Trusted Computing Base
 
Software development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiuSoftware development in ar mv8 m architecture - yiu
Software development in ar mv8 m architecture - yiu
 
Trusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.pptTrusted Computing _plate form_ model.ppt
Trusted Computing _plate form_ model.ppt
 
Proving the Security of Low-Level Software Components & TEEs
Proving the Security of Low-Level Software Components & TEEsProving the Security of Low-Level Software Components & TEEs
Proving the Security of Low-Level Software Components & TEEs
 

Plus de Alan Tatourian

Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?
Alan Tatourian
 

Plus de Alan Tatourian (9)

Systems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasisSystems architecture with the functional safety/security emphasis
Systems architecture with the functional safety/security emphasis
 
Security Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical SystemsSecurity Architecture for Cyber Physical Systems
Security Architecture for Cyber Physical Systems
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
 
Highly dependable automotive software
Highly dependable automotive softwareHighly dependable automotive software
Highly dependable automotive software
 
Securing future connected vehicles and infrastructure
Securing future connected vehicles and infrastructureSecuring future connected vehicles and infrastructure
Securing future connected vehicles and infrastructure
 
Functional Safety and Security process alignment
Functional Safety and Security process alignmentFunctional Safety and Security process alignment
Functional Safety and Security process alignment
 
High dependability of the automated systems
High dependability of the automated systemsHigh dependability of the automated systems
High dependability of the automated systems
 
Safe and secure autonomous systems
Safe and secure autonomous systemsSafe and secure autonomous systems
Safe and secure autonomous systems
 
Will future vehicles be secure?
Will future vehicles be secure?Will future vehicles be secure?
Will future vehicles be secure?
 

Dernier

Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
lizamodels9
 
Greenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptxGreenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptx
zohiiimughal286
 
Vip Mumbai Call Girls Mumbai Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Mumbai Call On 9920725232 With Body to body massage wit...Vip Mumbai Call Girls Mumbai Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Mumbai Call On 9920725232 With Body to body massage wit...
amitlee9823
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Shankar vihar ≼🔝 Delhi door step delev...
Call Now ≽ 9953056974 ≼🔝 Call Girls In Shankar vihar ≼🔝 Delhi door step delev...Call Now ≽ 9953056974 ≼🔝 Call Girls In Shankar vihar ≼🔝 Delhi door step delev...
Call Now ≽ 9953056974 ≼🔝 Call Girls In Shankar vihar ≼🔝 Delhi door step delev...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
shivangimorya083
 
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
ezgenuh
 
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
amitlee9823
 
一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国
一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国
一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国
ezgenuh
 
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
nirzagarg
 
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
amitlee9823
 
Vip Hot Call Girls 🫤 Mahipalpur ➡️ 9711199171 ➡️ Delhi 🫦 Whatsapp Number
Vip Hot Call Girls 🫤 Mahipalpur ➡️ 9711199171 ➡️ Delhi 🫦 Whatsapp NumberVip Hot Call Girls 🫤 Mahipalpur ➡️ 9711199171 ➡️ Delhi 🫦 Whatsapp Number
Vip Hot Call Girls 🫤 Mahipalpur ➡️ 9711199171 ➡️ Delhi 🫦 Whatsapp Number
kumarajju5765
 
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfSales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Aggregage
 
Call Girls Bangalore Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Bangalore Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Bangalore Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Bangalore Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
amitlee9823
 
Vip Mumbai Call Girls Mira Road Call On 9920725232 With Body to body massage ...
Vip Mumbai Call Girls Mira Road Call On 9920725232 With Body to body massage ...Vip Mumbai Call Girls Mira Road Call On 9920725232 With Body to body massage ...
Vip Mumbai Call Girls Mira Road Call On 9920725232 With Body to body massage ...
amitlee9823
 

Dernier (20)

Stay Cool and Compliant: Know Your Window Tint Laws Before You Tint
Stay Cool and Compliant: Know Your Window Tint Laws Before You TintStay Cool and Compliant: Know Your Window Tint Laws Before You Tint
Stay Cool and Compliant: Know Your Window Tint Laws Before You Tint
 
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
Call Girls In Kotla Mubarakpur Delhi ❤️8448577510 ⊹Best Escorts Service In 24...
 
Greenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptxGreenery-Palette Pitch Deck by Slidesgo.pptx
Greenery-Palette Pitch Deck by Slidesgo.pptx
 
Vip Mumbai Call Girls Mumbai Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Mumbai Call On 9920725232 With Body to body massage wit...Vip Mumbai Call Girls Mumbai Call On 9920725232 With Body to body massage wit...
Vip Mumbai Call Girls Mumbai Call On 9920725232 With Body to body massage wit...
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In Shankar vihar ≼🔝 Delhi door step delev...
Call Now ≽ 9953056974 ≼🔝 Call Girls In Shankar vihar ≼🔝 Delhi door step delev...Call Now ≽ 9953056974 ≼🔝 Call Girls In Shankar vihar ≼🔝 Delhi door step delev...
Call Now ≽ 9953056974 ≼🔝 Call Girls In Shankar vihar ≼🔝 Delhi door step delev...
 
How To Fix Mercedes Benz Anti-Theft Protection Activation Issue
How To Fix Mercedes Benz Anti-Theft Protection Activation IssueHow To Fix Mercedes Benz Anti-Theft Protection Activation Issue
How To Fix Mercedes Benz Anti-Theft Protection Activation Issue
 
Why Won't Your Subaru Key Come Out Of The Ignition Find Out Here!
Why Won't Your Subaru Key Come Out Of The Ignition Find Out Here!Why Won't Your Subaru Key Come Out Of The Ignition Find Out Here!
Why Won't Your Subaru Key Come Out Of The Ignition Find Out Here!
 
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Saket 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home DeliveryCall me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
Call me @ 9892124323 Call Girl in Andheri East With Free Home Delivery
 
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
一比一原版(PU学位证书)普渡大学毕业证学历认证加急办理
 
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
Top Rated Call Girls Mumbai Central : 9920725232 We offer Beautiful and sexy ...
 
一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国
一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国
一比一原版(UVic学位证书)维多利亚大学毕业证学历认证买留学回国
 
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
Rekha Agarkar Escorts Service Kollam ❣️ 7014168258 ❣️ High Cost Unlimited Har...
 
What Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop WorkingWhat Could Cause Your Subaru's Touch Screen To Stop Working
What Could Cause Your Subaru's Touch Screen To Stop Working
 
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Kanakapura Road Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
Vip Hot Call Girls 🫤 Mahipalpur ➡️ 9711199171 ➡️ Delhi 🫦 Whatsapp Number
Vip Hot Call Girls 🫤 Mahipalpur ➡️ 9711199171 ➡️ Delhi 🫦 Whatsapp NumberVip Hot Call Girls 🫤 Mahipalpur ➡️ 9711199171 ➡️ Delhi 🫦 Whatsapp Number
Vip Hot Call Girls 🫤 Mahipalpur ➡️ 9711199171 ➡️ Delhi 🫦 Whatsapp Number
 
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdfSales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
Sales & Marketing Alignment_ How to Synergize for Success.pptx.pdf
 
Call Girls Bangalore Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Bangalore Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Bangalore Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Bangalore Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Vip Mumbai Call Girls Mira Road Call On 9920725232 With Body to body massage ...
Vip Mumbai Call Girls Mira Road Call On 9920725232 With Body to body massage ...Vip Mumbai Call Girls Mira Road Call On 9920725232 With Body to body massage ...
Vip Mumbai Call Girls Mira Road Call On 9920725232 With Body to body massage ...
 
Chapter-1.3-Four-Basic-Computer-periods.pptx
Chapter-1.3-Four-Basic-Computer-periods.pptxChapter-1.3-Four-Basic-Computer-periods.pptx
Chapter-1.3-Four-Basic-Computer-periods.pptx
 

Why TPM in Automotive?

  • 1. ©2017 Trusted Computing Group Software and Supply Chain Assurance Forum TPM for Automotive 1
  • 2. ©2017 Trusted Computing Group SAE J3101 defines HW Security • Hardware Protected Security Environment – Offers at least one mechanism of security implemented by hardware support – Offers resilience against arbitrary execution of software within a system • Secure Keystore • Authenticated Boot • Authenticated Software Flashing • Authenticate messages in the vehicle • Broadcast/Multicast Authentication • Secure Storage • Access to Private Data • etc… • Root of Trust for Measurement (RTM) • Root of Trust for Reporting (RTR) • Root of Trust for Storage (RTS) • Establish a basis of trust – belief that a device will behave in an expected way • TCG uses cryptographic methods to attest identity of the device and its expected behavior, both of HW and SW • The TCG’s method for attestation is to use a key associated with the hardware to sign one or more values that represent the software SAE J3101 TPM as a HW RoT 2
  • 3. ©2017 Trusted Computing Group Defense in Depth Fast cryptographic performance Device identification Isolated execution (Message) Authentication Virtualization Hardware security services that can be used by applications Platform boot integrity and Chain of Trust Secure Storage (keys and data) Secure Communication Secure Debug Tamper detection and protection from side channel attacks Hardware security building blocks Over-the Air Updates IDPS / Anomaly Detection Network enforcement Certificate Management Services Antimalware and remote monitoring Biometrics Software and Services Security features in the silicon, for example Memory Scrambling, Execution Prevention, etc. Defense in Depth HardwareRootofTrust(TPM) Analog security monitoring under the CPU Components associated with physical control of the vehicle Components associated with safety Components associated with entertainment and convenience The Interconnected Car Image credit: Mercedes-Benz Museum (as cited in Computer History Museum, 2011) 3
  • 4. ©2017 Trusted Computing Group Vehicle Assets (by ENISA) 4
  • 5. ©2017 Trusted Computing Group Vehicle Threats (by ENISA) 5
  • 6. ©2017 Trusted Computing Group Why do you need HW Security? Basic Cryptography Key Management Miscellaneous Secure Hash (SHA2, SHA3) Key Derivation Function (KDF) Compression/Decompression Message Authentication Code (CMAC, HMAC, GMAC)  Generation  Verification Secure Key and Certificate Storage  Access Management  Import/Export Services  Generation  Update Checksum Signatures  Generation  Verification Key exchange protocols Random Number Generation Encryption/Decryption  Symmetric (CBC, CTR)  Asymmetric  ECC (P-256, NIST, SEC2, Brainpool) Secure Clock  Time stamping  Validity check for key data 6
  • 7. ©2017 Trusted Computing Group SDC Example TSS Dedicated Security Core TPM Example from Mentor Graphics with HW Security Core and TPM overlay AUTOSAR CSM Translation Stack 7
  • 8. ©2017 Trusted Computing Group Automotive E/E Trends 8
  • 9. ©2017 Trusted Computing Group TPM Practical Applications • A Trusted Platform Module (TPM) is a microchip designed to provide basic security-related functions, primarily involving encryption keys. • An ECU that incorporates a TPM can create cryptographic keys and encrypt them so that they can only be decrypted by the TPM (binding a key). • Certificates can be installed or created; the RSA private key for a certificate is bound to the TPM and cannot be exported. • Running software can use the boot measurements of the operating system start state to prove the integrity of an ECU. • The TPM has several Group Policy settings that might be useful in certain scenarios such as authorization. • Because the TPM uses its own internal firmware and logic circuits to process instructions, it does not rely on the operating system, and it is not exposed to vulnerabilities that might exist in the operating system or application software. 9
  • 10. ©2017 Trusted Computing Group TPM 2.0 Software Stack (TSS) AUTOSAR CSM Translation TPM is a dedicated hardware that: • Protects a unique platform identity (TPM) • Verifies software integrity before software is loaded (TPM) • Protects network integrity (TNC or Trusted Network Connect) • Protects data integrity and confidentiality (SED or Self-Encrypting Drive) 10
  • 11. ©2017 Trusted Computing Group TPM Main Functions 11
  • 12. ©2017 Trusted Computing Group Why TPM? • Trusted computing is cyber defense technology that can be used to protect data, platforms and networks • Trusted computing technologies are actively evolving, with new standards and new products regularly entering the market • Major hardware manufacturers and software vendors support trusted computing off-the-shelf • Trusted computing products can offer a cost-effective path to improved compliance and security TCG has the TPM Automotive Thin Profile specification and is working on the TPM Automotive Rich Profile specification which will satisfy underlying SAE J3101 requirements and provide security foundation for protecting vehicles. 12
  • 13. ©2017 Trusted Computing Group Backup backup

Notes de l'éditeur

  1. The interconnected components include the vehicle’s engine management system, brake controller, airbags, seatbelt pre-tensioners, door locks, gauge cluster, sound system, CD changer, seat controls, communications system, telematics unit, and more. Running throughout the vehicle is a network of wires on which sensor data and vehicle control commands transit back and forth. Also visible are several long rectangular boxes that represent controllers. These controllers are responsible for issuing commands to the different vehicular components based on the inputs they receive, either in the form of sensor data or commands from the vehicle operator.
  2. Bullet Point Template
  3. Body Text Template