Ed Adams, CEO of Security Innovation, along with Brian Witten from Symantec address the trade-off between safety, security and convenience as well as the steps that need be taken by manufacturers before we can trust our the new IoT ecosystem to deliver the promised benefits of connected services.
The 7 Things I Know About Cyber Security After 25 Years | April 2024
Connected Cars - Poster Child for the IoT Reality Check
1. Connected Cars - Poster Child
for the IoT Reality Check
Brian Witten, Symantec
Ed Adams, Security Innovation
Conference: April 6-7, 2016
Exhibit Hall: April 6-8, 2016
Sands Expo, Las Vegas, NV
7. Can extremely constrained devices
do meaningful security?
7
$0.25
Early 80’s grade chip
8 bit
8 MHz
2 k SRAM
25 seconds AA Battery: 20+ years
Leading 10 year old chips
16 bit, 16 MHz
30 k SRAM
3 seconds AA Battery: 20+ years
Current 32 bit chips
32 bit, 84 MHz
30+ k SRAM
150 ms AA: 20 years$0.50
Benchmark: ECC/ECDSA256
For a copy of the slides, email bwitten@symantec.com
8. Protect The
Communications
8
Certificates:
Over a Billion IoT devices chain to a
world class Certificate Authority (CA)
Roots of Trust:
IoT “Roots of Trust” can help
identify foreign devices
Devices
& Sensors
Hardware
Operating
Systems
Embedded
Software
Required: Authentication
Helpful: Encryption
Note: Signing “objects” can
avoid decrypt/re-encrypt burden
Crypto Libraries:
Several good open-source
and commercial options
What’s needed?
For a copy of the slides, email bwitten@symantec.com
9. Automotive Authentication Schemes
9
In-Vehicle & Vehicle to “X” (V2X)Vehicle to Vehicle (V2V)
CAMP: Crash Avoidance Metrics Program
VSC3: Vehicle Safety Communications
SLC: Short Lived Certificates
CRL: Certificate Revocation List
ECC: Elliptic Curve Cryptography
CAMP VSC3
SLC with CRL;
For additional privacy, rotation among a
pool of SLC all within validity period
ECC 256
HIS SHE: Hersteller Initiative Software, Secure Hardware Extensions
EVITA: E-safety Vehicle Intrusion Protected Applications
HSM: Hardware Security Module
AUTOSAR: Automotive Open System Architecture
CAL: Crypto Abstraction Library
CSM: Crypto Service Manager
HIS SHE
EVITA (HSM)
AUTOSAR (CAL & CSM)
HIS SHE, EVITA HSM “Light” & “Medium”
(symmetric)
EVITA HSM “Full”
(symmetric + asymmetric)
AES 128 (all of above)
RSA 2048, 4096
(AUTOSAR + EVITA “Full”)
Standards
Approach
Underlying
Crypto
For a copy of the slides, email bwitten@symantec.com
15. Building Comprehensive Security Into Cars
Brian Witten
bwitten@symantec.com
www.symantec.com/iot
Thank You!
^Internet of Things (IoT)
16. Connected Cars:
What Could Possibly Go Wrong?
Ed Adams
CEO, Security Innovation
Research Fellow, The Ponemon Institute
March 23, 2016
IT Security Leaders Dallas
17. Cars are part of the Internet of Things (IoT)
• The network of physical objects or "things" embedded with
electronics, software, sensors, and network connectivity,
collecting and exchanging data
• Anything with an on/off switch and connection to the Internet
(or each other)
• Cell phones, coffee makers, washing machines, headphones,
lamps, wearable devices and almost anything else you can think of.
20. F22 RaptorS-Class Mercedes
1.7 Million
Lines of Code
6.5M Million
Lines of Code
100 Million
Lines of Code
IoT Reality Check: Software Runs the World
787 Dreamliner
and
100 ECUs
5 Networks
2 miles of cable
10+ Operating Systems
50% of total cost
21. • 35,000 US road deaths, and 3,800,000 injuries
• Fatalities and injuries = $300B/year
• Congestion = $230B/year
• Leading cause of death, people aged 15-34 in US
Let’s Talk About Traffic Safety
Technology Evolution
Passive Active Proactive
24. Connected Cars:
Putting our Theory to Test
• Basic Safety Message:
• All equipped vehicles broadcast 10 times/second
• On board logic detects hazards and alerts driver
• Here I am; Here’s my speed & direction; Brake status; (plus…??)
• Communications are V2X
• Vehicle-to-vehicle
• Vehicle-to-infrastructure
• Vehicle-to-RSE (road-side equipment)
• Vehicle-to-AMD (after-market device)
• VRUs (vulnerable road users)
25. • V2V is a Dept. Of Transportation mandate
• Driver awareness & notification of invisible dangers
• US DOT Mandate, EU OEM-driven
• V2V will prevent 76 percent of crashes (US DOT)
• “The most important safety improvement in automobiles
since the seatbelt”
– Transportation Secretary Anthony Foxx
• World’s largest Certificate Management System
V2V
V2I
Connected Cars:
Secure Vehicle to Vehicle/Infrastructure Communications (V2X)
Leveraging Technology to Save Lives
26. V2V: the worries
• Security
• Will hackers be able to take
control of my car?
• Will terrorists be able to cause
mass havoc
• Privacy
• Will the government be able to
track my every move?
• Will I be issued automatic
speeding tickets everywhere?
• Messages must be secure
– Authentication, Integrity, Availability, Timeliness
• The system must provide anonymity
– Individual messages don’t give away identity
– Messages can’t be determined (by their contents
alone) to have come from the same origin
– No anonymity requirement for public safety
vehicles
• Must be able to remove bad actors
27. V2X Progress
• Standards have been defined
• Technology has been successfully
field tested
• Security and Privacy proven resilient
• Projects are underway to build
infrastructure
• Ann Arbor, San Francisco, NYC
• Europe running parallel pilots
• Equipment in Europe and US are
hardware compatible
29. Cybersecurity Standards
Hacking protection
Data security
Hacking mitigation
Privacy standards
Transparency
Consumer choice
Marketing prohibition
Cyber dashboard
A window sticker showing how well the car
protects the security and privacy of the owner.
Government Takes Action
The Security and Privacy in Your Car (SPY) Act
30. Remaining challenges
• PKI governance and certification
• Privacy as certificates deplete
• Secure implementations / Cybersecurity
• Multi-application operations
• Cross-border issues and harmonization of trust
31. Reasons for optimism
• It is very hard to hack cars en masse
And there are other juicier targets out there
• Useful parallels to traditional IT
• Car makers are being pro-active
• Standards under development
• The V2V program will save lives!
32. Connected Cars:
What Could Possibly Go Wrong?
Questions?
For a copy of the slides, email:
Ed Adams
eadams@securityinnovation.com