{"id":13648,"date":"2022-05-07T10:11:12","date_gmt":"2022-05-07T08:11:12","guid":{"rendered":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/?p=13648"},"modified":"2022-05-07T10:11:12","modified_gmt":"2022-05-07T08:11:12","slug":"vital-cyber-security-areas-automakers-must-focus-on","status":"publish","type":"post","link":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/2022\/05\/07\/vital-cyber-security-areas-automakers-must-focus-on\/","title":{"rendered":"Vital Cyber-Security Areas Automakers Must Focus On"},"content":{"rendered":"<p class=\"first_paragraph\" style=\"text-align: justify;\">In January, a teenager in Germany found a vulnerability in third-party software that let him remotely start 25 Teslas in 13 countries, find their locations and determine whether anyone was in the car.<\/p>\n<p style=\"text-align: justify;\">He then was able to access owners\u2019 emails. Hacking an iconic Tesla is way cooler than cracking into some corporate database, right? Luckily, David Colombo is a security researcher, not a criminal. Cars are an attractive target and they\u2019re vulnerable. Researchers have identified vulnerabilities in connected cars for half a decade or more.<\/p>\n<p style=\"text-align: justify;\">While cyber-security has become a strong focus for automakers and their partners, the threat remains high. UN Regulation No. 155 for wheeled vehicles, promulgated in March 2021, identified 69 potential vectors of attack that manufacturers are required to secure. Numaan Huq, senior threat researcher at Trend Micro, says his team has found even more.<\/p>\n<p style=\"text-align: justify;\">One example is cameras and image processing, especially for autonomous systems. He points out that simple hacks such as putting a sticker on a speed sign can confound an AV\u2019s ability to function correctly. \u201cIf you have a fleet of vehicle mostly relying on image processing, you\u2019ll have problems,\u201d Huq says.<\/p>\n<p style=\"text-align: justify;\"><strong>Lessons from IT<\/strong><\/p>\n<p style=\"text-align: justify;\">\u201cThe car is transforming from a standalone device to a supercomputer with wheels connecting to backend systems and communicating in real time. This is very similar to when computers came out and began to connect to the internet. Just as computer applications eventually moved to the cloud, it\u2019s similar with connected cars. So, we can definitely apply what we\u2019ve learned from the IT world,\u201d says Yurika Baba, solutions manager for Trend Micro.<\/p>\n<p style=\"text-align: justify;\">Securing everything from the vehicle to the cloud to the factory to customer databases is a huge and gnarly task. Huq says that the most critical areas, which are not the low-hanging fruit, are denial of service attacks, hosted third-party software like that shown in Colombo\u2019s demo, reaching the car via back-end servers and vulnerabilities in software and hardware.<\/p>\n<p style=\"text-align: justify;\">Says Baba: \u201cThreat intelligence, how to detect and how to protect, has to be bridged between automotive and IT security. While there are automotive-specific protocols and techniques and procedures, both IT and automotive have to be on same side.\u201d<\/p>\n<p style=\"text-align: justify;\"><strong>Better access models<\/strong><\/p>\n<p style=\"text-align: justify;\">Another lesson from the IT world is building out access models, according to Yash Prakash, chief strategy officer for Saviynt. Just as IT departments set up different levels of permission and tight credentialing for employees, automakers should consider the different roles that might need access to automotive data or systems.<\/p>\n<p style=\"text-align: justify;\">It\u2019s difficult enough to transfer access from the first owner to the second when the vehicle is resold. Car sharing adds more than another level of complexity. Then, there are all the third parties that might need access: the dealership, independent mechanics, fleet owners, friends and family of the owner, the manufacturer itself.<\/p>\n<p style=\"text-align: justify;\">\u201cIf you look at how the entire ecosystem will work and what will be captured, this needs a significantly different architecture. It\u2019s not only about capturing information; it needs to be made available to a much larger audience. Building it for scale and storing different types of information becomes critical,\u201d he says.<\/p>\n<p style=\"text-align: justify;\">Prakash thinks there are many architectural approaches that make sense, including validating access with a secure connection to the cloud but access needs to be automated and dynamic. There\u2019s also the matter of who owns and operates the database that contains all this information. Someone must implement a scalable identity warehouse that can securely store all the identity information related to a vehicle.<\/p>\n<p style=\"text-align: justify;\">\u201cIt will be tricky in the short term to determine who will build out the infrastructure. It could be built by any of the players: cities, car rental companies, fleet owners or car manufacturer themselves,\u201d Prakash says. \u201cAn ecosystem is always better, because it allows for sharing of technology and intelligence. It does become a bit of a challenge to get vendors to participate and share but that\u2019s what pushes the envelope for innovation.\u201d<\/p>\n<p style=\"text-align: justify;\">Keeping control of the data and adhering to the various governmental privacy requirements will be key. Prakash thinks blockchain could provide the kind of secure access and information sharing necessary. Access models should be an upfront priority, according to Prakash. \u201cAuto companies should build access models into a vehicle\u2019s design rather than adding them as an afterthought,\u201d he notes.<\/p>\n<p style=\"text-align: justify;\"><strong>Taking it to the chips<\/strong><\/p>\n<p style=\"text-align: justify;\">Security needs to be applied at all layers, says Robert Schweiger, director of automotive solutions at Cadence. \u201cIt\u2019s not one dedicated security measure you need to apply. It\u2019s many things you need to apply to protect the car at all levels.\u201d<\/p>\n<p style=\"text-align: justify;\">Customers that design chips are looking for specific security IP, Schweiger says, such as a root of trust system to support a secure boot. Because hardware manufacturers need to apply security measures in parallel throughout the many layers of automotive software, it\u2019s difficult for them to use off-the-shelf technology. They also need tools and methodologies to check whether their systems are secure.<\/p>\n<p style=\"text-align: justify;\">Noting the trend to push as much intelligence as possible to edge devices like smart sensors and microphones, George Wall, director of product marketing for Tensilica Xtensa Processor IP, Cadence, says: \u201cThe best way to future-proof your product is to provide programmability but anything that can execute software can be influenced by a malicious actor. It\u2019s incumbent on providers of processor IP to provide security features.\u201d<\/p>\n<p style=\"text-align: justify;\">Threats may come from third-party software applications, as the Tesla hack illustrates. As automakers move to differentiate themselves with entertainment and apps, they\u2019ll need to be able to keep critical software systems safe from not only today\u2019s apps but from the next generation enabled by 5G.<\/p>\n<p style=\"text-align: justify;\">The common approach is to break the car\u2019s internal domains into secure and non-secure, or trusted and non-trusted, but processors must be able to enforce limited access of non-trusted software to only the resources it needs, according to Wall. However, if processors aren\u2019t programmable, they may not be able to handle future needs. \u201cYou need programmability to adapt to new algorithms, new technologies and new standards that come around,\u201d Wall adds.<\/p>\n<p style=\"text-align: justify;\"><strong>Smart infrastructure, dumb move<\/strong><\/p>\n<p style=\"text-align: justify;\">Here\u2019s another easy way for attackers to mess things up: Exploiting lapses by third parties such as vendors. Remember when hackers obtained credit card information from Target using credentials from the retailer\u2019s HVAC vendor? Huq points out that municipalities usually hire third parties to install and maintain connected traffic infrastructure. \u201cSometimes the integrators leave a cellular modem connected to the box so they can troubleshoot it and work on it remotely, and they\u2019re slack about security,\u201d Huq says.<\/p>\n<p style=\"text-align: justify;\"><strong>Tampering with the back end<\/strong><\/p>\n<p style=\"text-align: justify;\">It\u2019s not only the vehicles themselves that are vulnerable. Disrupting automakers\u2019 operational systems can wipe out millions of dollars in profit. In February 2022, Toyota had to <a href=\"https:\/\/www.tu-auto.com\/cyber-attack-shuts-toyotas-japanese-plants\/\">suspend domestic operations<\/a> because of an attack on a supplier, losing production of 13,000 cars. That same month, Nvidia reported a cyber-security \u201cincident\u201d that impacted operations.<\/p>\n<p style=\"text-align: justify;\">While these attacks weren\u2019t confirmed as connected to Russia\u2019s invasion of Ukraine, the US Cyber-security &amp; Infrastructure Security Agency and the FBI warned businesses to step up efforts to increase their cyber resilience.<\/p>\n<p style=\"text-align: justify;\">Gartner says that, by 2025, criminals will harm or even kill people with attacks on operational technology systems. When Trend Micro set up a fake, smart factory as a honeypot, attacks included malicious cryptocurrency mining, multiple types of fraud, ransomware, regular traffic from unknown scanners and unknown commands to ICS protocol ports.<\/p>\n<p style=\"text-align: justify;\">As this honeypot shows, attack surface for connected and autonomous vehicles is broad and deep, from the automakers\u2019 operational technologies and enterprise systems, through the car and into the streets. The focus for automotive cyber-security will continue to widen.<\/p>\n<p>&nbsp;<\/p>\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<h3 class=\"author-name\">By Susan Kuchinskas<\/h3>\n<p><span class=\"posted-by\">Source: <a href=\"https:\/\/www.tu-auto.com\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/www.tu-auto.com<\/a><\/span><\/p>\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<div class=\"g-cols wpb_row type_default valign_top vc_inner vc_custom_1585038969469\">\n<div class=\"vc_col-sm-12 wpb_column vc_column_container\">\n<div class=\"vc_column-inner\">\n<div class=\"wpb_wrapper\">\n<div class=\"w-post-elm post_content\">\n<h1 style=\"text-align: center;\"><a href=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/who-we-are\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>KNOW WHO WE ARE<\/strong><\/a><\/h1>\n<p><a href=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/who-we-are\/\"><img loading=\"lazy\" class=\"aligncenter wp-image-11695\" src=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2021\/07\/AFMC4000-300x150.jpg\" sizes=\"(max-width: 430px) 100vw, 430px\" srcset=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2021\/07\/AFMC4000-300x150.jpg 300w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2021\/07\/AFMC4000-1024x512.jpg 1024w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2021\/07\/AFMC4000-1536x768.jpg 1536w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2021\/07\/AFMC4000-2048x1024.jpg 2048w\" alt=\"\" width=\"430\" height=\"215\" \/><\/a><\/p>\n<div class=\"w-post-elm post_content\">\n<h1 style=\"text-align: center;\"><strong>KNOW THE FLEET MANAGEMENT YOUTUBE CHANNEL<\/strong><\/h1>\n<p>&nbsp;<\/p>\n<\/div>\n<p><a href=\"https:\/\/www.youtube.com\/channel\/UCOPw2rdwSEA0iIapSs0fHJw\"><img loading=\"lazy\" class=\"alignnone wp-image-13320 size-full aligncenter\" src=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2022\/03\/AFMT4000-scaled.jpg\" sizes=\"(max-width: 2560px) 100vw, 2560px\" srcset=\"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2022\/03\/AFMT4000-scaled.jpg 2560w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2022\/03\/AFMT4000-300x150.jpg 300w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2022\/03\/AFMT4000-1024x512.jpg 1024w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2022\/03\/AFMT4000-1536x768.jpg 1536w, https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-content\/uploads\/sites\/3\/2022\/03\/AFMT4000-2048x1024.jpg 2048w\" alt=\"\" width=\"2560\" height=\"1280\" \/><\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<div class=\"w-post-elm post_navigation layout_simple inv_false\">\n<div class=\"post_navigation-item-arrow\"><\/div>\n<div class=\"post_navigation-item-title\"><\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>In January, a teenager in Germany found a vulnerability in third-party software that let him remotely start 25 Teslas in 13 countries, find their locations and determine whether anyone was in the car. He then was able to access owners\u2019 emails. Hacking an iconic Tesla is way cooler than cracking into some corporate database, right?&#8230;<\/p>\n","protected":false},"author":3,"featured_media":13649,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[18],"tags":[361],"_links":{"self":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/13648"}],"collection":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/comments?post=13648"}],"version-history":[{"count":1,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/13648\/revisions"}],"predecessor-version":[{"id":13650,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/posts\/13648\/revisions\/13650"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/media\/13649"}],"wp:attachment":[{"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/media?parent=13648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/categories?post=13648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/advancedfleetmanagementconsulting.com\/eng\/wp-json\/wp\/v2\/tags?post=13648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}