In-Vehicle Security

Complete vehicular cybersecurity from development to post-production
featured image

The essential cybersecurity solution to protect vehicles from hackers.

Cyberattacks on vehicle systems can be silent yet catastrophic. By gaining access to the Automotive Emergency Braking (AEB) system, hackers can delete or alter outgoing messages from the network, ultimately taking control of the vehicle.

In-vehicle security is a complete solution that covers vehicular cybersecurity at all three stages: pre-production development, production, and post-production monitoring and threat mitigation. All are essential for vehicle type approval, as regulated by WP.29.

AUTOCRYPT provides complete security for the internal system of the vehicle. Starting with TARA, followed by rigorous Security Testing and AutoCrypt IVS engineering, and finishing with continuous monitoring and reporting enabled by AutoCrypt vSOC. 

Highlights

All You Need to Know About In-Vehicle Security

and stay prepared with AUTOCRYPT

In-Vehicle Structure

A vehicle’s internal system consists of over 100 electronic control units (ECU), which control a number of electrical subsystems responsible all functionalities of the vehicle, from handling to connectivity.

page image

The network protocols that enable the ECUs are largely categorized into the Controller Area Network (CAN) and MOST (Media Oriented System Transport) systems.

The CAN bus manages a vehicle’s internal communications for controlling power, direction, brakes, etc. MOST manages the systems for transmitting in-vehicle audio, video, and data via fiber-optic cables. Other network protocols like FlexRay and Ethernet govern high-capacity on-board computing.

page image

Need for Security

The CAN (Control Area Network) bus is designed to allow microcontrollers and in-vehicle systems to communicate without a host computer.

However, they are not built with the intention of tracking where the communicated messages come from, making the systems vulnerable to external threat actors.

page image

If an attacker were to take over an ECU by exploiting vulnerabilities in the network, they would be able to control certain parts of the vehicle using forged data or injecting malicious code, as well as gaining access to sensitive information.

Hackers may attempt to establish a foothold in the vehicle’s various systems by executing attacks through making changes to the memory disk, damaging the ECU functions, or infiltrating the core data storage units of the vehicle.

page image
Ensuring the security of a vehicle’s internal structure is of utmost importance.
If the security of the network is compromised, it becomes the ideal environment for hackers to seize control of the vehicle’s core functions like steering, braking, data collection, and network communication.
Network Infiltration Attack Cases
2010. 08    |   Message fabrication from tire-pressure monitoring system (TPMS) resulting in false activation of warning lights and announcing falsesystem failure in ECU systems
2013. 10     |   Demonstration of potential attack on vehicle’s CAN bus by sending random malicious CAN packets, resulting in the yield of complete control of the vehicle’s display, acceleration, and brake settings. 
2015. 02    |    Allegemeiner Deutscher Automobil-Club (ADAC) confirmed the vulnerability of BMW’s ConnectedDrive by demonstrating that it is possibleto open and close vehicle doors by sending a simple SMS text.
2015. 07    |   Vehicles with GM’s OnStar system were found vulnerable regarding security of door locks and jumpstarting
2019. 03    |   Toyota had a security breach that leaked sensitive information. More than 3.1 million people were affected. Additionally, unauthorized attempts to enter the systems of Toyota’s subsidiaries were detected. 

Our In-Vehicle Security Solution

AUTOCRYPT provides complete security for the internal systems of the car.

AUTOCRYPT’s in-vehicle security solution involves a three-step process from 1) TARA, 2) Security Testing, to 3) Mitigation and Monitoring (with AutoCrypt IVS and AutoCrypt vSOC; see AutoCrypt IVS for details).

In-vehicle security not only blocks malicious threats from outside the vehicle, but also monitors communications within the vehicle, responding to any abnormal or malicious activities. With AutoCrypt IVS Intrusion Detection System (IDS) and Intrusion Protection System (IPS), AUTOCRYPT provides a complete, secure ECU security module for the vehicle.

page image
page image