Supplier Spotlight

Show Reviews

Automotive Testing Expo Europe 2016 Show Review

Click here to read

 

Automotive Testing Expo Europe 2015 Show Review

Click here to read

 

Automotive Testing Expo North America 2014 Show Review

Click here to read

 

Automotive Testing Expo India 2014 Show Review

Click here to read

 

Latest Video


Evaluating the VW Atlas

LV

The OEM provides a glimpse into the rigorous test regime of its new SUV.

Click here to watch the video

Volvo crash test footage

LV

Watch the new XC60 undergo a series of crash tests at the Volvo Safety Center. For an interview with Malin Ekholm, director of the facility in Gothenburg, Sweden, see this year's upcoming issue of Crash Test Technology International.

Click here to watch the video

Kia Stinger winter testing

LV

As part of a grueling two-month winter test program, Kia engineers visited Arjeplog, Sweden to refine the Stinger's dynamics in extreme low-grip conditions.

Click here to watch the video

Industry Opinion

« back to blog listings

Security alert

When it comes to testing the components of modern connected cars, of course pen-testing (penetration testing) has its place; however, it is no substitute for solid product development.

In testing, companies often operate under the notion that an identified problem can be fixed or patched. This may be true for some areas of testing, but for security, it is not sufficient. Security needs to be built-in, from the ground up. And that means starting at the hardware layer, which is seldom done today, but which is completely viable given the advancements in silicon and other connected vehicle technologies.

In fact, the prpl Foundation has produced a guide on how to secure critical areas of embedded computing that advocates the use of open, interoperable protocols and APIs, exercising security by separation, through implementing hardware virtualization and anchoring a root of trust in silicon.

Looking back at all of the recent public cases of researchers hacking connected cars, they all share the exploitation of proprietary code. This idea that closed, proprietary systems can work within Internet of Things and connected devices is a myth. In contrast, an open security framework means it has constantly been tested and had many eyes cast over it to ensure its strength.

The second thing they all have in common is that once hackers were able to reverse engineer vendor-specific code to gain access to one area of the system, they proceeded to move around laterally to other networked components. This idea that once an actor can gain access to a non-critical component in a vehicle, such as the entertainment system, and then work their way into a critical area, such as the steering, is scary to think about. But without using the time tested method of security by separation, it is a reality. This separation can be achieved by using hardware virtualization so that although independently they might not be more secure, as a system, one bad apple doesn’t compromise the whole system.

Finally, all of these security controls need to be tied to a root of trust in silicon; this can be a by-product of the hypervisor used in creating hardware virtualization or by some other method. One neat area being explored by prpl at the moment is physical unclonable function (PUF) technology that can extract a unique identifier from the silicon itself, much like a fingerprint, to provide authentication and establish a root of trust.

In summary, pen-testing is important, but it is no replacement for sound product development. Security can only be forged from the ground up in the silicon of connected components themselves. It cannot be added as an afterthought as we have seen time and time again. Testing alone does not make a product secure. From a risk management perspective, testing lowers the risk but doesn’t completely remove it. After all, upon successful testing one can say, “I couldn’t find anything wrong,” which is not the same as saying, “There is nothing wrong.”

Cesare Garlati, formerly VP of mobile security at Trend Micro, currently serves as chief security strategist at prpl Foundation and co-chair of the mobile working group at Cloud Security Alliance.

Prior to Trend Micro, Garlati held director positions within leading mobility companies such as iPass, Smith Micro Software and WaveMarket. Before this, he was senior manager of product development at Oracle, where he led the development of Oracle’s first cloud application and many other modules of the Oracle E-Business Suite.

October 18, 2016

 

Comments:

There are currently no comments.

If you would like to post a comment about this blog, please click here.
Read Latest Issue
Read Latest Issue

Web Exclusives

Augmented reality enhances VW development

ATTI visits Volkwagen’s Virtual Engineering Lab in Wolfsburg, Germany, where augmented reality is enabling vehicle developers to complete more design iterations faster
Click here to read more



PSA and Exa in CAE development tie-up

The French OEM has ambitious aims to develop all of its vehicles entirely using CAE by 2025
Click here to read more



Hyster-Yale Group uses HBM technology

R&D engineers at Hyster are able to collect, process and report on 95% of all test data during physical analysis using HBM test and measurement systems
Click here to read more



Q&A: Raunaq Bose, Humanising Autonomy

Mechanical engineer Raunaq Bose gives an insight into Blink, a revolutionary communications technology being developed by a UK-based team at Humanising Autonomy, that will indicate to pedestrians a vehicle’s intent
Click here to read more



Site visit: Seat Technical Centre

We take a tour of the climate test facility at Seat’s Technical Centre in Montorell, Spain
Click here to read more




Submit your industry opinion

Industry BlogDo you have an opinion you'd like to share with the automotive testing community? Good or bad, we'd like to hear your views and opinions on the leading issues shaping the industry. Share your comments by sending up to 500 words to john.thornton@ukimediaevents.com

Advertising

Recruitment AdTo receive information on booking an advertising banner please email jason.sullivan@ukimediaevents.com