主要由机械部件(jian)构成的(de)传统(tong)汽(qi)(qi)车正(zheng)在被日益普及的(de)软件(jian)定义汽(qi)(qi)车(SDV)迅速取代,SDV不仅能(neng)让(rang)驾驶员(yuan)和乘(cheng)客与(yu)数字世界保持连接,还(hai)可通过自(zi)动(dong)驾驶功能(neng)让(rang)人们享受更(geng)安全、更(geng)轻松的(de)旅程。
更多的互联接(jie)口增加了软件定义车辆遭(zao)受网络(luo)攻(gong)击的可能性。(是德科技)
汽车网络安(an)全测(ce)试设备示例。(是德科(ke)技)
软(ruan)件定义汽车工程师可从物(wu)联网的发展中(zhong)借鉴(jian)经验。
物联网(wang)的(de)发(fa)展(zhan)已(yi)向(xiang)我们(men)证明:互联程(cheng)度的(de)提(ti)升(sheng)必将(jiang)伴随着网(wang)络安(an)全(quan)风险(xian)的(de)增(zeng)加。就(jiu)在(zai)不久前(qian),人们(men)还对(dui)手机物联网(wang)的(de)便(bian)捷(jie)性津津乐道(dao),因(yin)为(wei)只需轻点屏幕就(jiu)能(neng)够轻松享受(shou)银行服务和购买定(ding)制品牌(pai)等便(bian)利。然而,日益猖(chang)獗(jue)的(de)网(wang)络犯罪令这种便(bian)利性大(da)打折扣。据Statista统计(ji)(ji),预计(ji)(ji)到2026年(nian),网(wang)络犯罪活动将(jiang)对(dui)全(quan)球经济造(zao)成超过每年(nian)20万亿美元的(de)损失(shi)(shi),较2022年(nian)增(zeng)长了1.5倍(bei)。这些惊人的(de)损失(shi)(shi)为(wei)我们(men)敲(qiao)响了警钟。因(yin)此,汽车行业(ye)正积(ji)极(ji)采取预防(fang)措施,以确(que)保下一个移(yi)动大(da)数据生态——SDV的(de)安(an)全(quan)性。
确保SDV的(de)(de)安全(quan)性极具(ju)挑战(zhan),因为(wei)互联(lian)程度(du)的(de)(de)提(ti)升意味着潜在攻击的(de)(de)数(shu)量也(ye)会增(zeng)加。网络黑客不仅使(shi)用了更(geng)先进的(de)(de)工具(ju),而且攻击目(mu)标也(ye)不再局限于(yu)直接(jie)攻击私人汽车,而是(shi)包括车队、出行应用和(he)各种服务(wu)。
|
|
|
||
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
为(wei)了管理这(zhei)份冗长(zhang)而详尽的(de)(de)测试清单(dan),并满足审(shen)计追踪的(de)(de)要(yao)(yao)求,汽车(che)制造(zao)商(shang)及其供应(ying)商(shang)正转而采用一站式的(de)(de)汽车(che)网络安全测试解决(jue)方案。这(zhei)些解决(jue)方案由(you)电(dian)子系统和软件(jian)组成,可模拟(ni)受攻击车(che)辆和黑(hei)客(ke),通常(chang)包(bao)含以下关键(jian)要(yao)(yao)素(su):
-
无线(xian)和有线(xian)信号模拟器(qi)及分析(xi)仪,用于(yu)模拟和监控汽车的通(tong)信系(xi)统
-
侦察和漏洞利用服务(wu)器
-
应用和(he)威(wei)胁情(qing)报库,可对(dui)其中不同的攻击(ji)活动进行筛选(xuan)和(he)规划(hua)
-
自动化和跟(gen)踪(zong)平台,用于管理测试数(shu)据(ju)和结果,以便进行报告和审查
本文由是德科技(Keysight Technologies)的行业和解决方案营销经理Hwee Yng Yeo撰写。
Old car models with mechanical components are rapidly giving way to the increasingly software-defined vehicle (SDV) with features that not only allow drivers and passengers to stay connected to the digital world but to enjoy a safer and easier journey with automated driving features (see Figure 1).
With increasing connectivity comes greater exposure to cybersecurity risks, as attested by the Internet of Things (IoT). It wasn’t so long ago when the conveniences of mobile connectivity seemed like a real boon, from banking and buying bespoke brands just a click away. That was until cybercrimes became a bane and a scourge, estimated to cost the global economy more than US $20 trillion a year by 2026, a 1.5x increase compared to 2022, according to Statista. These staggering dollar amounts represent hard lessons learned, and the automotive industry is stepping up on preemptive efforts to secure the next big data mine on wheels: the SDV.
Securing SDVs is extremely challenging, as increased connectivity means an increased number of potential attack interfaces (see Figure 2). Not only are cyber-hacking tools more advanced, but attackers are also moving beyond direct attacks against individual vehicles to target fleets, mobility applications, and services.
Evolving regulations and standards
Until the recent past, there were no global automotive cybersecurity standards, leaving automakers and their Tier 1 supply chain to develop their own cybersecurity testing requirements. In 2020, the United Nations’ World Forum for Harmonization of Vehicle Regulations (WP.29) introduced an automotive cybersecurity regulatory framework for OEMs.
For example, UN Regulation 155 (UN R155) mandates rigorous cybersecurity management system audits for automakers and their suppliers. It also requires automakers to obtain "vehicle type approval", which involves auditors conducting tests on vehicle products sharing the same electrical architecture. As recently as September 2021, SAE and the International Organization for Standardization (ISO) jointly published the ISO/SAE 21434 standard.
WP.29 regulations |
ISO/SAE 21434 standards |
UN R155 under WP.29 requires automakers to obtain a “certificate of compliance” under a cybersecurity management system (CSMS). This is to gain “vehicle type approval” so that the vehicle type can operate on public roads in participating nations.
UN R156 – mandates the deployment of a software update management system (SUMS) as a future condition of type approval.
Both regulations will be extended to existing architectures by July 2024. |
Cybersecurity engineering standard that implements a risk-driven CSMS focused on engineering vehicles securely.
The standard provides vocabulary, objectives, requirements, and guidelines as a foundation for common understanding throughout the supply chain.
This enables organizations to:
|
Automakers and their key suppliers must comply with UN R155 regulations while ISO/SAE 21434 is a set of guidelines. Both must go hand-in-hand if automakers want to bring new vehicle models to market.
Exactly how can automakers and Tier 1s translate both regulation and standards into action to secure the software-defined vehicle? The automotive industry has the benefit of leveraging learnings from cybersecurity experts who have been trying to stay ahead of hackers since the Internet of Things arrived. For example, the non-profit cybersecurity advocate group Open Web Application Security Project has an OWASP Top 10 list of vulnerabilities that automakers reference to secure the various attack interfaces of the software-defined vehicle. Table 2 shows the OWASP Top10 list, and the tests that automakers can implement for boosting automotive cybersecurity:
OWASP Top 10 list of preventable cybersecurity vulnerabilities |
||
|
Common threats |
Related tests |
1 |
Weak, guessable, or hardcoded passwords |
Brute force scanner |
2 |
Insecure network services |
Service discovery |
3 |
Insecure ecosystem interfaces |
Application layer scan and attack |
4 |
Lack of secure update mechanism |
Validation of secure communications |
5 |
Use of insecure or outdated components |
Vulnerability assessment |
6 |
Insufficient privacy protection |
Assess services access |
7 |
Insecure data transfer and storage |
Validation of secure communications |
8 |
Lack of device management |
Summarize device identification |
9 |
Insecure default settings |
Overall summary of device settings |
10 |
Lack of physical hardening |
You must lock your car! |
Putting security to the test
Testing is an essential part of the UN R155 automotive cybersecurity management system (CSMS). Different systems must be thoroughly tested, from onboard hardware like physical in-vehicle networks, electronic control units, and EV charging ports through all layers of the open systems interconnection (OSI) stack. Multiply that with different threat scenarios and design iterations, the list of tests is extensive.
To manage the exhaustive lists of tests and be able to manage and pass audit trails, automakers, and their suppliers are turning to turnkey automotive cybersecurity test solutions. These solutions comprise electronic systems and software to emulate a victim vehicle and hacker(s). They typically comprise these key elements (see Figure 3):
- Wireless and wireline signal emulators and analyzers to simulate and monitor the vehicle’s communication systems
- Reconnaissance and exploitive attack servers
- Application and threat intelligence library from which different attacks can be selected and scheduled
- Automation and tracking platform to manage test data and results for reporting and auditing
Early detection saves money – and reputation
Taking a page off the history of the Internet of Things, and in more recent times, the smartphone, where millions of dollars are lost daily to scammers and hackers, securing the connected smart vehicle of the future is both important and urgent. IoT and the smartphone changed the way we live. There is no going back to an off-grid world for most of us, despite the dangers of cyber exploitations.
SDVs will likely expand upon the connected way of living for us. Hopefully, with lessons learned on how to secure our connected world, automakers and their key suppliers can stay many steps ahead of cybercriminals waiting to exploit both individual car owners and organizations that run fleets and associated transportation systems and electric vehicle supply equipment. Rigorous testing throughout a vehicle’s life cycle will minimize the risks of automotive cyberattacks and help keep automakers and service providers off the headlines of who’s been hacked.
Hwee Yng Yeo is industry and solutions marketing manager at Keysight Technologies.
等级
打分
- 2分
- 4分
- 6分
- 8分
- 10分
平均分