Automotive News is the leading source of news about the global automotive industry. ... tirelessly to force the auto industry and federal and state regulators to make cars, SUVs, pickups and minivans safer. ....
Thứ Sáu, 30 tháng 9, 2016
The New MIVEC Turbo Diesel Engine
Anchoring Trust in the Increasingly Software-Based Car
Bill Boldt
Business Development Manager, Security, Blackberry
wboldt@blackberry.com
Electronic Control Units (ECUs) started out in the 1970s as discrete modules with each one doing one particular thing, at that time mainly for emissions controls and mileage. Then they became connected via in-car networks with the invention of the CAN bus in 1985. In-car networking represented a big improvement in capability. However, being networked means that ECUs became vulnerable to mischief and thus they, and what the connect to (such as domain and area controllers) need to be secured cryptographically to ensure that the signals being sent have not been tampered with or corrupted, and perhaps most importantly, that they are authentic. There is also the emerging need for confidentiality (i.e. encryption/decryption).
The picture below shows the top attack points. This range or targets indicates just how vulnerable cars have become:
Trust
Trust is paramount in digital systems, and increasingly so in automotive. Trust comes from cryptographic solutions that:
- Securely store secret keys
- Securely issue, manage, renew and revoke security certificates
- Include a mix of software and security hardened hardware devices, and
- Are manufactured in highly secure facilities
What Creates Trust?
A major tenet of security is that each system and sub-system will have different types of threats and a range of options to provide countermeasures to those. This means that the automotive security equation has many variables and thus is difficult to solve.
However, two things are always common to trustable cryptographic security, and they form the basic foundation of modern security:
- A proven algorithm (e.g. Elliptic Curve Cryptography (ECC)), and
- A secret cryptographic key (to provide the required level of security for the selected algorithm).
Trust Anchor
On a CAN bus, which was designed without security in mind, ECUs are exposed. So, connected cars should employ best practices for security, but cost, complexity (especially of the supply chain) and time get in the way. Having said that, best practices will eventually prevail and that will likely include a hardware trust anchor system to establish, maintain, and update cryptographic processes.
From the diagram you can see the four basic things that create a PKI-based hardware trust anchor:
- A trusted hardware anchor that stores the key
- That key, which becomes the root of trust
- The certificate chain anchored by the root of trust, and
- A signing mechanism that creates the anchored certificate chain
Multi-level Security
Because there are so many systems in the increasingly software-defined car, security has to be multi-layered and fit the specific application. In other words — it must be tailored. You have to figure out what you are securing, what threats that system will face, and what countermeasures should be employed. You have to pick what pillars of security to apply; namely, confidentiality, data integrity, authentication, and non-revocation. Making sure you are doing the right security things on each system is what Blackberry is positioned to help you with, from consulting, to design, testing, certificate management, securing the supply chain, making updates, and applying cryptography to the in-car and around-the-car networks.
To learn more about cryptography for automotive please contact Blackberry's Certicom
subsidiary, and for more information and/or help regarding reliable, secure, and trusted software for safety- and mission-critical applications such as automotive please contact QNX.
The bottom line is that BlackBerry, Certicom, and QNX can help your system become not just secure, but BlackBerry secure.
Thứ Tư, 28 tháng 9, 2016
How TrueCar and other Third Party Auto Retail Vendors Work
by David Ruggles
How do the third party vendors like TrueCar, and the others, actually work? It’s really quite simple. The auto buying Consumer belongs to retail Auto Dealers. They have the money invested in inventory. They have substantial investment in facilities. The third party vendors spend large amounts of money to “hijack” those auto buying Consumers and take them “hostage.” They then “ransom” them back to the Dealers for a sizable chunk of change. In the case of TrueCar the “ransom” is about $400. on a new vehicle and $300. on pre-owned. That money is reinvested by the vendor and used to “hijack” and “ransom” even more car buying Consumers. They are able to “hijack” these Consumers by pretending to protect them from the Auto Dealers, as if the Consumers are helpless sheep. These vendors don’t lead their message to Consumers with the fact that they raise the cost of the Dealer’s sale, and the Consumer’s purchase price, by the “ransom” amount. How many consumers would knowingly pay an upfront fee to these vendors?
The ultimate customers of these third party vendors are the Dealers. That’s where their revenue is derived. Most Dealers understand what’s going on and aren’t happy about it. A large number of them, however, have capitulated. Others use the third party vendor strategy in their favor without paying for it. For example, a TrueCar customer can come to a Dealership that isn’t a TC Dealer. That Dealer can go to the TC site and use the information provided there as a closing tool to negotiate the deal with the Consumer. Because the non-TC Dealer’s cost doesn’t include the “ransom fee,” the Consumer potentially gets an even better price while the dealer makes additional profit if they split the unpaid “ransom fee.” The Consumer becomes a higher value owner to that Dealer.
All Dealers have advertising and marketing budgets. These third party vendors would like everyone to believe that their fee would be spent in other areas of advertising rather than adding to the cost of individual the vehicles sold to Consumers the vendor took “hostage.” The vendors insist that their services allow dealers to target their marketing efforts better, thereby providing savings. The fact of the matter is that Dealer advertising budgets have done nothing but rise since the proliferation of third party vendors came into being. The Internet has spawned so many “leads” that Dealers are now struggling to figure out how to “weight” them, to distinguish leads in terms of “likelihood to purchase.” Despite the fact that TrueCar has yet to make a profit, despite reaching a Dealer saturation point that they used to claim would make them money, many third party vendors DO make money. They make enough money that there is about to be a flood of new major players enter the field.
In particular, enter Amazon Vehicles, with pockets deeper than any of the existing players. They will potentially have the budget to do almost anything they want. Indeed, they can afford to fritter away a lot of money figuring things out. Relative to stand-alone players they can lose money for an extended period of time, in a market where profits are already diluted, all the while using their competitors as “pricing cover.” Dealers could call a halt to all of this by just saying no, but while a few may hold back, enough will participate because they just don't get it, and their rivals down the street will join to make sure they don't gain an advantage. So collectively they won’t say no. There will be further consolidation in this business as players with really deep pockets enter the fray. In the meantime, neither Consumers nor Dealers will be well served.
The Secret to a Successful Autonomous Vehicle Development Program: A Data-Centric Approach to Autonomous Car Design
Romain Saha, Strategic Alliances, Manager at BlackBerry
The automotive industry is facing unprecedented changes in the coming decade. With the rise of autonomous and connected cars, software is a significant differentiator in the automotive market. As software takes a central role in the functions and features of the car the investment in software development is accelerating dramatically. Automotive companies must adopt novel software design methodologies to be competitive, as well as ensure safety, security, and a quality user experience. Fortunately, embedded system architecture is also evolving. Fueling this change is the proliferation of “system-of-systems” architectures, where connectivity and accessibility are baseline requirements. This requires interoperability!
IIoT and Data-Centric Design
The rise of the Industrial Internet of Things (IIoT) is driving this need for new architectures to unify the standalone devices of the past. These changes are already happening in other market segments and are fully applicable to automotive. In ever more connected and autonomous cars, many subsystems operate in tandem, but without the benefit of a greater awareness. For example, braking systems have very little interaction with power steering. As we connect these systems and add layers of automation, the car itself becomes a system-of-systems – where braking and steering coordinate with vision and sensor functions – and every car is then connected to a much larger system.
- Time-sensitive reliable transport, safety and mission-critical rigor in software design;
- Interoperability between applications, domains, operating systems, and entire heterogeneous systems;
- Support for high volume communication across multiple domains or compute platforms (sensors, actuators, etc.); and
- Code reuse and the evolution of the system as it moves from research to development, on to production and into maintenance lifecycles that span multiple model releases.
Complete Lifecycle Support Platform
Certified Software Stack
applications. Founded in 1980, QNX Software Systems Limited is headquartered in Ottawa, Canada.
For more information on Connext DDS in Autonomous Vehicles, please download our whitepaper or register for this upcoming joint webinarwith QNX and RTI.
Thứ Ba, 27 tháng 9, 2016
Do the "Jobs" Arithmetic: Trump Calls for 19 million Immigrants
mike smitka
In the first presidential candidate debate Donald Trump proposed creating 25 million jobs. Now currently 152 million people are employed in the US, out of a potential labor force of 156 million. Yes, we're short – by 4 million jobs. Now because of baby boomer retirements and lower birth rates over the past 20 years, the size of the potential labor force will rise to only 158 million by February 2021. So while he could oversee an economy that creates 6 million additional jobs, the only way to add 25 million new jobs would be to bring in 19 million working-age adults from outside the US. Yes, Trump must be pro-immigration.
...Trump can only add 25 mil jobs by bringing in 19 mil immigrants...
There are other, less palatable alternatives, such as instituting a draft of all 22 million youth of high-school age. Since relatively few of them work or have family responsibilities, that could get him to the 25 million level.
So let's assume instead that he's not engaged in sophistry but is instead being sophisticated. That is, he's arguing about GROSS job creation, not net new jobs. In 2016, on a monthly basis about 5 million people leave their jobs, voluntarily or otherwise, and 5.1-5.2 million people are hired, in what to those individuals are new jobs. Then all Mr. Trump proposes is 5 months hires at the normal rate. Using this metric, over 4 years he needs to create not 25 million but 250 million jobs.
Now does everything Secretary Clinton has said on the economy during her decades of public life make sense? Unlikely! We all spout nonsense on occasion. But she does have staff, listens to them, and mainly gets things right. Once Trump proposes actual policies, I'll look at her proposals. But so far all he has are sound bites that don't add up.
Thứ Bảy, 24 tháng 9, 2016
On Clusters and Infotainment
BlackBerry
- Can you share graphics and still achieve true safety isolation?
- Is the hypervisor built in a way that you can reasonably safety certify your system.
- Is it real-time?
- How much overhead does it add to the overall system?
- What happens if a guest OS goes rogue?







