4 LAYERS OF SECURITY FOR CONNECTED CARS DANNY MCKENNA AUTOMOTIVE MICROCONTROLLERS & PROCESSORS PUBLIC USE The Connected Car… A Cloud-connected Computer Network on Wheels 802.11p • A networked computer • • • • • up to 100 ECUs per car and many sensors inter-connected by wires more and more software Increasingly connected to its environment • to vehicles & infrastructure • to user devices • to cloud services 1 802.11p PUBLIC USE #NXPFTF Radar NFC LF, UHF Portable Device Connectivity NFC NFC … is an Attractive Target for Hackers! Valuable Data High Vulnerability Easy (Remote) Access • Collection of data/info • Storage of data • Diagnostic functions • Increasing number of nodes • More advanced features • X-by-Wire • Fully Connected Car • External & internal interfaces • Wired & wireless interfaces Protect Privacy Increase Safety Prevent Unauthorized Access Cloud Connection Consumer Device Integration In-Vehicle Network 2 PUBLIC USE #NXPFTF Car2X What is Security? • Security is a quality aspect… − Attackers • should not be able to subvert the proper operation of a system …in an uncontrolled and evolving environment − Attackers do not obey to “the rules” − Attack(er)s only get better over time • Security must be an integral part of the system design is as strong as the weakest link point solutions usually don’t work − Secure by design vs. security as an afterthought − Security • 100% secure does not exist in the real world − It’s 3 about finding the right balance between costs (protection level) and benefits (risk reduction) PUBLIC USE #NXPFTF Security requires a Different Mindset Hacker: Engineer: Let’smake makeititwork fail Let’s Security engineer: Think about how things can be made to fail... …and prevent such failures! 4 PUBLIC USE #NXPFTF From Physical to Remote (Logical) Attack • Anatomy of a typical, successful attack: • 1. Find a vulnerability in one ECU • − Automated hacking scripts/tools are published on the internet − The complete attack can be mounted remotely Ideally an ECU that is remotely accessible 2. Exploit the vulnerability • E.g. gain more / full access over that ECU 3. Attack other ECUs • • 5 It gets really “scary” if the attack can be scaled, e.g. because: From the now compromised ECU Ultimately, a hacker might achieve full control over the vehicle • Worst case scenario: script kiddies can remotely control fleets / series of cars Physical Attacks Remote Attacks Typically difficult, requires: • deep knowledge • physical access • reverse engineering May be relatively easy, if e.g. automated tools are published PUBLIC USE #NXPFTF Defense in Depth Securing the Vehicle’s Electronics Architecture • • Multiple security techniques, at different levels in the architecture To mitigate the risk of one component of the defense being compromised or circumvented Prevent access Detect attacks Reduce impact SECURE CAR ACCESS Fix vulnerabilities +1 SECURE PROCESSING Authenticate code (secure boot) Authenticate code Run-Time (secure boot)Protection Integrity Run-Time Resource control Integrity Protection (virtualization) Resource control (virtualization) 4 SECURE NETWORK Secure messaging Secure messaging Firewalls (context-aware Firewalls (context-aware Intrusion detection message filtering)(IDS) message filtering) systems M2M authentication Firewalls (isolate access points) 6 PUBLIC USE M2M authentication Firewalls (isolate access points) #NXPFTF 3 Secure OTA updates Secure OTA updates …) (firmware, policies, …) (firmware, policies,SECURE Separate functional GATEWAY domains Separate functional Intrusion detection domains systems (IDS) Isolated TCU & OBD-II Isolated TCU & OBD-II 2 SECURE INTERFACES 1 NFC 4 Layers to Securing a Car Defense in Depth Layer 1: Secure Interface Layer 2: Secure Gateway Secure M2M authentication, secure key storage Domain isolation, firewall/filter, centralized intrusion detection (IDS) ADAS SE Braking ADAS SE Powertrain TCU TCU IVI Braking Powertrain Safety domain Gateway Comfort domain OBD OBD IVI Cluster Cluster Body Layer 3: Secure Network Layer 4: Secure Processing Message authentication, CAN ID killer, distributed intrusion detection (IDS) Secure boot, run time integrity, OTA updates ADAS SE TCU Braking Powertrain IVI TCU Safety domain Gateway #NXPFTF Powertrain Safety domain Gateway Comfort domain Cluster PUBLIC USE Braking IVI Comfort domain OBD 7 ADAS SE Body Body OBD Cluster Body Layer 1 – Secure Interface • Secure authentication of users, devices and messages • • • • Automotive (M2M): V2X communication, Telematics (online services), … Traditionally (user): banking cards, electronic passports, … Implemented on a tamper-resistant platform… • • • Securely hosts security applications and their confidential data Protected against physical attacks (SCA, reverse engineering, …) Proven security, via 3rd party evaluation and certification (Common Criteria, EMVCo, FIPS 140, …) …that provides: • • • 8 Form factors: smart card embedded Secure Element (eSE) Example applications: mobile payment 2nd factor user auth. V2X communication electronic passport secure crypto processing (AES, RSA, ECC, TRNG, …) secure (crypto) key generation & storage secure certificate handling (validate & store) PUBLIC USE #NXPFTF Layer 2 – Secure Gateway • Vehicle Architecture (Simplified) Gateway is THE central node in the vehicle architecture • Connects all the vehicle domains across all the interfaces (Ethernet, CAN FD, LIN) • Provides network isolation and security between functional domains and networks • Includes hardware accelerated crypto capability (HSM/CSE) • Transmits message to ECU on destination domain (adding secure signature to message) Gateway ECU ECU Infotainment domain (CAN1) ECU ECU Safety domain (FlexRay) Body domain (CAN0) Other Domains (Ethernet, CAN, LIN) Gateway Function • ~20% adoption in vehicle architecture today, moving to ~50% by 2020 • NXP will be #1 in this market by 2018 CAN, LIN, FlexRay, Ethernet R X Filter / Firewall What Action? SOC Resources HSM PUBLIC USE #NXPFTF Outgoing Frame T X CPU Comms 9 Sign Auth HSM Comms CAN, LIN, FlexRay, Ethernet Layer 3 – Secure Network Starting from an ultra-low Emission, 5Mbps-fast CAN transceiver Advanced technology enables intelligence being added • Adding security at network (link) level: • rate limiting • context-aware message filtering (incl. deep packet inspection) • • 10 message protection (message encryption, authentication) • device (ECU) authentication • … CAN Transceiver CAN decoder CAN FD controller Set of policies stored in memory Reacts to Wake up Frame CAN bus monitor Partial Networking Stops all FD frames Sends error frames CAN FD bus monitor FD Shield Detect / block malicious frames ID/Frame/Rate inspection IDS / IPS Message authentication (+encryption) Crypto engine CAN message protection Hybrid Networks CAN, CAN FD Network Security Option: small programmable core AES accelerator, Key storage CAN FD Network Security Example: extending a CAN FD PHY with message filtering and message protection features For example, integrated into: • CAN transceivers (retrofit security to legacy networks) • Ethernet transceivers and switches (MACsec / 802.1AE) PUBLIC USE Energy saving, ECU flashing #NXPFTF Future IVN: Automotive Ethernet Layer 4 – Secure Processing • Defined by hardware accelerated Crypto capability • IP can be applied to any MCU/Processor • Use cases: • • • • • 11 CAN Message authentication Secure boot – FW auth. Key storage Encryption OTA software updates PUBLIC USE #NXPFTF ADAS GPIS C&S VDS Advanced Driver Assistance Systems General Purpose & Integrated Connectivity & Security Vehicle Dynamics & Safety Radar 8 Bit Vison 16/32 Bit Fusion Integrated Gateway Chassis & Safety Powertrain Custom Securing Firmware Over-the-Air (FOTA) Update Flow Security Needs: • Protect the authenticity and integrity of firmware to prevent a hacker from running modified code • Encrypt the firmware to prevent a hacker from stealing IP • Establish secure end-to-end connection to prevent man-in-themiddle attacks. • Ensure firmware cannot be rolled back • Ensure a secure, trusted location for the OTA Manager application 12 PUBLIC USE #NXPFTF User Demands: • Minimal affect on drivers (e.g. no vehicle down time during update) • no risk of failed update leaving car unusable. Hardware Security is a Must • Crypto accelerators, to guarantee strict performance requirements − E.g. • SECURE CAR ACCESS message authentication (V2X, CAN), secure boot Hardware-enforced isolation, to protect against software attacks − E.g. • +1 SECURE PROCESSING system vs. user mode, TrustZone, SHE/HSM 4 Tamper-resistant hardware, to protect against advanced, physical attacks − E.g. • SECURE NETWORK 3 Secure Elements SECURE GATEWAY Lifecycle management to gradually close device access through manufacturing cycle − E.g. 13 test & debug access PUBLIC USE #NXPFTF 2 SECURE INTERFACES 1 NFC Security Throughout the Entire Lifecycle Increased security level at each stage of the development lifecycle • Non-reversible, non-revocable • Enable application development, debugging and failure analysis • Without compromising security in In Field Security Level • Vehicle Production Application Development Out of Fab the production vehicle Vehicle Lifecycle 14 PUBLIC USE #NXPFTF Field Return NXP Automotive Security SECURE CAR ACCESS ● NXP #1 in Auto HW Security ● 4-Layer Cyber Security Solution ● Secure on-board communication Secure Transceivers Plus ‘Best In Class’ Car Access Systems ● Recognized Thought & Innovation Leader Central Gateway Secure Routing, Firewall ● > 900 security patent families, ~ 200 specific to Automotive ● Partner of Choice for OEMS, T1s & Industry Alliances +1 NFC Secure Car Access Immobilizer, RKE/PKE & Smart Car Access SECURE PROCESSING Secure “Brains” Secure MCU/MPU 4 SECURE NETWORK 3 SECURE GATEWAY 2 SECURE INTERFACES 1 15 Secure Cloud Connections (V2X, Telematics, cGW) Secure Element PUBLIC USE #NXPFTF
© Copyright 2025 Paperzz