본문바로가기

RESOURCES

Future Mobility Software Solutions Partner

SCROLL DOWN









Automotive cybersecurity threats will continue to intensify. The importance of a continuous and efficient operation management system throughout the vehicle lifecycle is emerging. Beyond the vehicle’s software-centric development, the true value of SDVs can be demonstrated when the way of working also becomes software-driven, creating mutual synergy. Just as SDV improves the user experience for drivers, a software-defined operation (SDO) management solution for SDV, enhances the user experience for those involved in vehicle cybersecurity, directly leading to improved work efficiency. To lay a secure foundation for SDVs, it's important to realize continuous cybersecurity with SDO.

by Hyunjung Lee, CTO, FESCARO

 

Hyunjung Lee is a co-founder of FESCARO and is in charge of the Security Development Division. A former white hacker, she developed FESCARO's proprietary security algorithm technology and obtained FIPS 140-2 certification from the National Institute of Standards and Technology (NIST). She also successfully conducted V2X security technology R&D and demonstration projects for the Korea Automobile Testing & Research Institute (KATRI). By fusing automotive cybersecurity and IT server technology, she has developed an IT-based operation management solution that covers the entire lifecycle from vehicle production to post-mass production, contributing to dramatically increasing the work efficiency of automakers and controller developers.

 





Advancement of vehicle software and its inevitable consequences  




The generative AI service ‘ChatGPT’ is also blowing in the automotive industry. GM is working with Microsoft to develop a ChatGPT virtual assistant, and Volkswagen, Mercedes-Benz, and BMW have also announced plans to introduce ChatGPT in their vehicles.

While ChatGPT is undoubtedly a good choice for improving the driver experience, but it is also necessary to consider potential risks. ChatGPT is sophisticated software. Vehicles are equipped with software for driving, safety, infotainment, etc., and additional software will be added continuously. As software increases, there are inevitably vulnerabilities. This is the threat of hacking.

Cybersecurity-related regulations are being enacted to welcome software-defined vehicles (SDVs), from R155 and R156 in Europe to the Motor Vehicle Management Act in Korea and GB in China. The automotive industry is applying cybersecurity to respond to these regulations, but hacking threats continue to evolve. This is why 'continuity' is emerging as the key to regulatory response.

 

 



V-model and DevOps   




The automotive industry uses the V-model when developing software. It is a process of analyzing requirements, designing and applying architecture, and validating it. In effect, because development ends after the vehicle is launched, it is difficult to respond quickly to software errors and defects or improve quality after mass production.

With the advent of the SDV era, the vehicle lifecycle is being extended with software technologies that are easy to update, increasing the importance of continuous development and management even after launch. This is the background to the emergence of a new methodology called DevOps, which compensates for the shortcomings of the V-model. It is a methodology that integrates development and operation to continuously improve products through a cycle of design, development, verification, distribution, operation, and monitoring.

 



 

Beyond Regulatory Response, Truly Continuous Cybersecurity (Feat. IT Infrastructure)




Cybersecurity is no exception. The field where the DevOps concept must be applied is cybersecurity. This is because vehicles can be effectively protected only when continuously responding to evolving hacking threats. By integrating server technology, I have built an IT-based cybersecurity management system that covers the entire vehicle lifecycle. The IT infrastructure solution actually applied to a global automotive OEM consists of three systems, and the main roles of each system are as follows


1) Cybersecurity Certification Management System    


- Vehicle type-specific project management and project-specific sub-item management

- Security module and firmware electronic signature management for component suppliers

- Certificate issuance and distribution management for vehicle diagnostics

- Generation and management of encryption keys used in encryption algorithms

 

2) Real-time incident response management system  


- Security event history management by vehicle type and individual vehicle

- Real-time monitoring of security events

- Security vulnerability management and security measure implementation

- Wireless firmware update (OTA, Over The Air) for each vehicle type

 

3) Software update management system   


- Software version, history, and update status management

- Impact analysis and evaluation management by software changes

- RXSWIN (Regulation X Software Identification Number) management

- Vehicle type-specific package management for software updates

 


The above three systems are effective even when used individually, but they are recommended to be interconnected to maximize the ‘orchestration’ effect. This is because it enables automation and optimization of cybersecurity work processes throughout the vehicle life cycle, from development to production to post-production. There is a case where a global OEM has implemented all three systems to maximize regulatory response effectiveness and work productivity.

 

The IT infrastructure solution was evaluated as pivotal in helping OEMs obtain CSMS (Cybersecurity Management System) and SUMS (Software Update Management System) certification from the UN R155·R156 certification body.


FESCARO's IT infrastructure solution delivers the following key values. 


First, it systematically tracks and manages the organic impact of the complex interconnections between cybersecurity, software updates, and related regulations to minimize the spread of damage. In the event of a security issue, the impact on derivative and subsequent projects can be identified, and security measures can be taken collectively for all related vehicles. The impact on existing item certification can be effectively analyzed and assessed even when software is updated.

Second, it improves work efficiency by unifying and computerizing the management of distributed cybersecurity tasks across all areas of vehicle development and operation. It is also possible to systematically manage the history of security-related work across the board, which can be utilized as evidence in the future.


Third, it can facilitate practical regulatory responses. Many organizations conduct cybersecurity regulatory response work separately from their original work. FESCARO minimizes the overlap between the original work and regulatory response work by designing and implementing an IT infrastructure optimized for the customer's business processes.





The rise of software-defined operation (SDO)  




As automotive cybersecurity threats are expected to intensify in the future, the importance of a continuous and efficient operation management system throughout the entire vehicle lifecycle is emerging. Beyond developing products (vehicles) centered on software, it is expected that the true value of SDV can be fully demonstrated by creating mutual synergy when the way of working (management system) changes to be software-centered.

I have defined the software-centered operation management solution for SDV as Software Defined Operation (SDO).

Just as SDV improves the user experience for drivers, SDO enhances the user experience for those involved in vehicle cybersecurity, directly leading to greater work efficiency. In an era where the importance of the post-production phase is emphasized, it is essential to realize continuous cybersecurity with SDO to lay a secure foundation for SDV.



Source: AEM (Software-Defined Operation Management Leveraging the True Value of SDVs)

CONTACT USquestion_mark

SITEMAP