Presentación de la Mesa de debate 14: 'Ciberseguridad en el automóvil Autónomo y Conectado' en el 32º Encuentro de la Economía Digital y las Telecomunicaciones, Santander (3-5 septiembre 2018)
Presentation on how to chat with PDF using ChatGPT code interpreter
Jack Wolosewicz, CYBERUS LABS
1. 32 Encuentro de la Economía Digital y las Telecomunicaciones
3 – 5 September 2018, Santander, Spain
Keeping your connected smart devices protected
against hackers & cyber attacks
EASY & LIGHTWEIGHT
IoT PROTECTOR
ELIoT Pro
2. Company Profile:
Mission:
To make strong cybersecurity simple and accessible
Company:
Cyberus Labs is a cybersecurity solutions provider co-founded in
2015 by Silicon Valley and Polish entrepreneurs
We developed and commercialized our first project in 2017:
Cyberus Key – credential-less, secure user authentication.
Launched at Mobile World Congress in Barcelona.
IoT Technology partners
and early adopters:
Cyberus Labs joined the prestigious group of the most innovative
European companies selected by the European Commission for
funding from the SME Instrument (Horizon 2020) to complete
development and bring to market ELIoT Pro - solution dedicated to IoT
3. Problem Solution
• Cyber-attacks, phishing attacks, data
and identity thefts on a massive scale.
ELIoT Pro - a next generation end-to-end cyber
security solution using patented, password-less,
secure Human to Machine (H to M) authentication
and secure Machine to Machine (M to M)
authentication and encryption using a “lightweight”
IoT cypher.• IoT devices vulnerable against
cyber-attacks.
• Safety issues are hampering growth and
use of IoT solutions globally.
• IoT Devices can’t support existing
security solutions.
• Over 50% of consumers worldwide
are concerned about IoT security.
Old security measures are not good enough
H to M: No passwords
Nothing to create, remember or type
No user credentials for hackers to steal.
No Captcha. No malicious websites.
No phishing or man-in-the-middle attacks
No user credentials for hackers to steal
M to M – minimum computation IoT cypher.
Self healing platform using AI to detect anomalous
behavior and predict device failure.
4. ELIoT Pro Solution Graphic
SMART HOMES SMART CITIES SMART MOBILITY INDUSTRIAL IOT
CCTV cameras
IoT Nodes
Sensors
IoT Hubs & Servers
End Point Devices
Low power
Low processing
Low memory
Lightweight
Encryption
Human to Machine (H2M ) Machine to Machine (M2M)
End -to -End Security
Secure
Authentication, Authorization
& Communication
5. Problem Solution
• Key Fob RKE, PKE Relay (Amplification)
attack - Audi, BMW, Citroen, Ford, Honda,
Hyundai KIA, Lexus, Mazda, Mitsubishi, Nissan,
Range Rover, Renault and others.
• Key Fob RKE, PKE Cloning attack - VW, Alfa
Romeo, Chevrolet, Peugeot, Lancia, Opel,
Renault, Ford, and others.
Connected Car Trends and Security Challenges
• Prevented by ELIoT Pro’s addition of audio
signaling and Time Of Flight analysis. In
collaboration with Premo Group.
• Prevented by ELIoT Pro’s dynamic ID using a
pseudo-randomizing key algorithm. In collaboration
with Premo Group.
Trends: Key Fob RKE, PKE; Cell phone as key; Voice Control
• Voice Control - Transaction voice commands
can come from unauthorized users.
• Multi-factor user authentication via ELIoT Pro
sonic protocol.
• Using the cell phone as key with the ELIoT Pro app,
solves the PKE, RKE FOB problems. Development
in collaboration with Premo Group.
6. Problem Solution
• CAV relies on real time data sources
for navigation which may be spoofed.
Connected Car Trends and Security Challenges
• Prevented by white-listing sources and
secure links. Isolate Infotainment from
CAN 2. Industry standards issue.
• Prevented by redesigning CAN 2 for hardening
and physical intrusion detection, PUF and
encryption. Industry standards issue.
Trends: Online Infotainment, Shared Economy, CAV
• Prevented by redesigning CAN 2, provide
secure links to white-listed, encrypted sources.
• Online Infotainment: malware and
hacks embedded in content.
• Shared economy: exposes CAN 2 to
physical hacking.