Guardians of the Code: Unleashing the Power of IDPS and TEE in Software-Defined Vehicles

  Переглядів 275

Automotive Security Research Group

Automotive Security Research Group

28 днів тому

If you like to know more about ASRG, look at our quick introduction at • Intro to ASRG , visit our webpage at www.asrg.io or contact us directly.
PRESENTATION:
In an era where software-defined vehicles (SDVs) promise safer, connected, and autonomous driving experiences, the stakes have never been higher. But beneath the sleek exteriors and cutting-edge features lies a complex web of risks-millions of lines of code, diverse connectivity interfaces, and potential exploitable vulnerabilities. OEMs and Tier 1s need to meet these threats and comply with new Cybersecurity standards and regulations. How then should they rise to the challenge?
In this talk, we will explain the problem and outline an approach. Attackers are experts, and SDVs are no place for amateur hour. We will explain how horizontal protection and UN R155 compliance needs can be met using an Intrusion Detection and Prevention System (IDPS). An IDPS system is a vigilant sentry within electronic control units (ECUs). When a cyberattack strikes, the IDPS springs into action, protecting the vehicle and its occupants. It also acts as a data aggregator, feeding insights to the Vehicle Security Operations Center (VSOC). The IDPS is the night watchman, but that means it becomes a target for attack. We therefore need to guard the Guardian. We will explain how IDPS can be strengthened against various attacks by using a Trusted Execution Environment (TEE) to manage and mediate configuration and updates to the IDPS system. We will further explore how the TEE can be used to protect output from the IDPS ensuring the VSOC only receives high quality and high integrity data.
Join us to learn how to build a strategic approach to security - and leave DIY to the hobbyists.
PRESENTERS:
Dipl. Inf. (FH) Gregor Knappik
Cybersecurity Solutions Architect
VicOne
Gregor Knappik built his expertise in the integration of large-scale embedded software projects using state-of-the-art cybersecurity solutions over the past 15 years. Recently, he has been helping OEMs and Tier 1 suppliers build up a VSOC, an IDPS, and a vulnerability management system to prevent the exploitation of potential vulnerabilities in the SBOM. He has also been supporting them in their UN Regulation No. 155 and ISO/SAE 21434 compliance journeys. He holds a certificate in Automotive Cybersecurity Professional - Advanced Level Engineering with TÜV Rheinland Certified Qualification.
Richard Hayton
Chief Strategy & Innovation Officer
Trustonic
Richard Hayton is an experienced technology leader. With over 30 years in the cybersecurity industry, he is a regular speaker and influencer on matters of cybersecurity. Richard is a board
member at GlobalPlatform and chairs the Trusted Environments and Services (TES) Group, and the Automotive Task Force. Before joining Trustonic, Richard was Chief Architect for Citrix Mobility, where he was responsible for crafting the XenMobile Enterprise Mobility Suite. During his 20 years at Citrix, Richard led projects ranging from embedded software to global enterprise systems, with a focus on user and developer experience.
Richard holds a Ph.D. in Computer Science from Cambridge University, focusing on identity federation for users, devices, and services.
PRESENTERS SLIDES:
garage.asrg.io/webinars/guard...

КОМЕНТАРІ: 1
@Mohamed-Nabil-Gaber
@Mohamed-Nabil-Gaber 27 днів тому
Is the process of new attacks or malicious behavior by IDPS will be real time analysis ?
CompTIA Network+ Certification Video Course
3:46:51
PowerCert Animated Videos
Переглядів 6 млн
20 System Design Concepts Explained in 10 Minutes
11:41
NeetCode
Переглядів 815 тис.
MINHA IRMÃ MALVADA CONTRA O GADGET DE TREM DE DOMINÓ 😡 #ferramenta
00:40
1 класс vs 11 класс (рисунок)
00:37
БЕРТ
Переглядів 3 млн
КИРПИЧ ОБ ГОЛОВУ #shorts
00:24
Паша Осадчий
Переглядів 2,5 млн
BRAWLER MUTATIONS WILL BREAK THE GAME! - Brawl Talk
09:34
Brawl Stars
Переглядів 25 млн
Game Webserver in C and JS
4:43:44
Sean Bix
Переглядів 30
Data Security: Protect your critical data (or else)
7:22
IBM Technology
Переглядів 35 тис.
CANCAN: CAN-IN-CAN Attack for Bypassing Security
45:25
Automotive Security Research Group
Переглядів 922
What is Software-Defined Networking (SDN)?
11:39
Cisco U. by Learning & Certifications
Переглядів 15 тис.
Identity and Access Management: Technical Overview
17:53
VMware End-User Computing
Переглядів 356 тис.
How to Use NVIDIA ChatRTX | AI Chatbot Using Your Files
14:31
Kevin Stratvert
Переглядів 7 тис.
Cybersecurity for Beginners: Basic Skills
5:41
The PC Security Channel
Переглядів 175 тис.
Как должен стоять ПК?
1:00
CompShop Shorts
Переглядів 570 тис.
Опасная флешка 🤯
0:22
FATA MORGANA
Переглядів 485 тис.
Нужен ли робот пылесос?
0:54
Катя и Лайфхаки
Переглядів 830 тис.