본문바로가기

RESOURCES

Future Mobility Software Solutions Partner

SCROLL DOWN


[Series] FESCARO's Automotive Cybersecurity FAQs

FESCARO has been operating the ‘FAQs Series’ to address cybersecurity issues for stakeholders in the automotive industry. We have conducted live webinars on four key topics, and the expert panel from FESCARO provided answers to the most commonly asked questions from industry professionals. If you missed a webinar on a topic that interests you, you can access both the recorded video and a text summary (FAQs) at the following link.

 

# FAQs Series

1. Cybersecurity Strategies for Tiers (Emerging-OEMs oriented)

2. Comprehensive Guide on Cybersecurity Solutions & Engineering

3. Cybersecurity Testing method based on VTA Success Stories

4. ECU Cybersecurity guidance : From production to post-mass production

5. How Korea’s Motor Vehicle Management Act Amendment impacts OEMs and Tiers








The last webinar of the year organized by FESCARO was successfully completed. This webinar, titled <ECU Cybersecurity guidance : From production to post-mass production> took place on October and attracted approximately 80 participants from more than 50 companies.

Automotive controller developers should not only apply security solutions to their controllers, but also consider cybersecurity during and after the production. This webinar focused on both the KMS (Key Management System) required during production and the Security Control System required on the post-production phase.  Let’s check out the clear answers from the FESCARO’s expert panel.

 

 

■ Expert Panels

 • Director Ku Seong-seo & Team Leader Choi Hee-sun : 20+ years of experience in embedded system SW development, including automotive controllers and security solutions

 • Director Lee Hyun-Jeong: A white hat hacker who is a question setter for 'CODE GATE CTF', an international hacking defense competition, and an IT/Automotive security expert.

 

■ QUESTION LIST




■ Video Ver.







■ Text Ver.

 

1. What kind of cybersecurity do OEMs require on their production lines?


Typically, OEMs rarely explicitly request cybersecurity-related precautions for manufacturing controllers. This is due to the variations in controller characteristics, semiconductor types, required security functions for each controller, and the assets that need protection.

From the supplier's perspective, it is crucial to establish an appropriate response strategy as they must effectively address these vague requirements. When automotive cybersecurity requirements are unclear, it is advisable to consult the international standard ISO/SAE 21434. The key is to develop a rational and consistent response plan tailored to the specific controller characteristics while aligning with OEM requirements. 







The table provides a summary of ISO/SAE 21434 in its entirety. Section 12 outlines the requirements that need to be considered when manufacturing controllers or vehicles. It establishes two primary objectives: first, the application of WP-10-02, which outlines the requirements that must be met during production after development phase, and second, the prevention of new vulnerabilities from entering the controller during production process. These requirements can be broken down into in three key aspects: the establishment of a robust control plan for production, the inclusion of four specific conditions within the production control plan, and the successful execution of production in accordance with this plan.

 

WP-10-02, which pertains to the requirements on the production process after development includes the initialization actions such as safely injecting and activating security assets (e.g. encryption keys, passwords, certificates, etc.) used in the operation of the security solutions so that the cybersecurity solutions or controllers can operate properly in the vehicle after production.

The production Control Plan, mentioned in RQ-12-02, should include :


  a. Procedure to meet the production requirements described above

  b. Description of tools or equipment to be used for this purpose, e.g. KMS, key injection device, verification device, etc.

  c. Measures to keep the production environment safe (e.g. firewall, VPN, etc.)

  d. Measures to ensure reliable and proper fulfillment of production requirements

We looked in more detail on WP-10-02 and the four key components that must be incorporated within the Production Control Plan. In summary, two things are essential for meeting OEM’s cybersecurity requirements: One is to safely apply and activate security assets during the production process so that the cybersecurity measures applied to the controller can function effectively post-production, and the other is to provide environmental factors so that this process can be sufficiently protected from external intrusions.

 


2. What are security assets and KMS? 





To help you understand, let me begin by explaining the terms. An asset is something that requires protection since it possesses inherent value or contributes to the overall value. In the context of a controller, assets encompass controller functions, hardware (HW), software (SW), and the data stored or utilized within the controller. The security assets mentioned in the question refer to data, software, and various information used for cybersecurity functions. These are also critical assets that need to be protected.

Moving on to KMS (Key Management System), it refers to a device or equipment responsible for generating, securely storing, and managing security assets used in the controller's security functions. Additionally, it facilitates the distribution and injection of security assets into the controller during the production process. For those who may not be familiar with KMS, I will provide a more detailed explanation. 




The diagram above illustrates the process of applying security assets, whether provided by OEMs or independently created, to controller production. In total, there are three Key Management Systems (KMSs), all of which are responsible for managing security assets, such as certificates and security keys, and distributing them as needed. For instance, OEMs create, distribute, and manage security libraries or other keys required for security functions at the request of suppliers request. The suppliers, in turn, receive, manage, and securely maintain these assets, incorporating them into production when required. The controller suppliers themselves have to generate essential security keys, passwords, and other components, inject them into the controller, and activate the security functions, and collect, manage the information to be used when needed.

 

Therefore, it is crucial to understand the OEM's requirements, identify the assets integrated into the controller, and make informed decisions regarding the configuration of the KMS and related processes. This necessitates professional judgment grounded in expertise and experience.





FESCARO possesses a track record of constructing and delivering Key Management Systems (KMS) for OEMs. The KMS incorporates processes to create/distribute/manage security assets necessary for OEMs to cooperate with suppliers, and to carry out tasks appropriate to each role within the organization.

 




The KMS developed for suppliers was tailored to suit the unique attributes of both the controller and the supplier, and it was seamlessly integrated with the production line. Furthermore, we furnished a key injection system that interfaces with both the KMS and the controller during the actual production phase, allowing for the injection of security assets. Additionally, we have frequently created and supplied software (SW) capable of receiving these assets from the controller, securely storing them, and triggering security functions when needed.

 

 

3. Requirements for building KMS

 

When selecting a Key Management System (KMS), it is vital to understand its intended purpose, namely, what data will be generated, managed, and distributed. This can differ significantly between various OEMs and controller types. This discussion outlines the fundamental factors that should be taken into account when dealing with KMS, even when their specific purposes may vary. Two key considerations must be addressed when developing KMS.

 

1. The robustness and reliability of the security assets generated by KMS need to be upheld.

2. The environment where the KMS is located must be very safe from external access.

 



First, to ensure the robustness and reliability of security assets, it is imperative that only authorized individuals have the capability to execute actions in accordance with their granted permissions. The security assets should be created and stored securely, and the recipients requiring these security assets must be accurately specified to ensure precise distribution. Moreover, effective management of their expiration dates and change cycles is essential, and they should be restored or disposed of as necessary.

 

We will express the above five requirements technically so that practitioners can understand them more easily. We can assess compliance with the first condition by verifying whether the system aligns with the Key Management Interoperability Protocol (KMIP). KMIP serves as a client-to-server communication protocol utilized for the storage and maintenance of security assets, including security keys and certificates. The second requirement involves the use of Hardware Security Module (HSM) certified under FIPS 140-2 standards. This certification ensures the stability and reliability of the security logic within the system. As for the third condition, it's imperative to implement redundancy measures to protect the created assets and prevent operational disruptions. Lastly, the system should offer support for functions such as dashboards, enhancing convenience in terms of management and operations. 





First, to ensure the robustness and reliability of security assets, it is imperative that only authorized individuals have the capability to execute actions in accordance with their granted permissions. The security assets should be created and stored securely, and the recipients requiring these security assets must be accurately specified to ensure precise distribution. Moreover, effective management of their expiration dates and change cycles is essential, and they should be restored or disposed of as necessary.

 

We will express the above five requirements technically so that practitioners can understand them more easily. We can assess compliance with the first condition by verifying whether the system aligns with the Key Management Interoperability Protocol (KMIP). KMIP serves as a client-to-server communication protocol utilized for the storage and maintenance of security assets, including security keys and certificates. The second requirement involves the use of Hardware Security Module (HSM) certified under FIPS 140-2 standards. This certification ensures the stability and reliability of the security logic within the system. As for the third condition, it's imperative to implement redundancy measures to protect the created assets and prevent operational disruptions. Lastly, the system should offer support for functions such as dashboards, enhancing convenience in terms of management and operations. 





Usually, as part of quality activities, a process for managing security events is defined and operated according to a manual. However, today we will focus on collecting and managing security events that occur in the field.

 

FESCARO is constructing security event monitoring systems for clients across the entire vehicle life cycle. The security event monitoring function is initially activated during the vehicle production on the assembly line. At this stage, details such as the software (SW) and hardware (HW) version information installed on the vehicle, and the occurrence of security events, are recorded on the server.

 

Once the security event monitoring function is initiated on the production line, the Central Gateway (CGW) is tasked with collecting and storing data regarding security events for controllers equipped with cybersecurity functions within the vehicle.

Subsequently, when a manufactured vehicle is brought to a repair shop for maintenance, diagnostic equipment is employed to ascertain whether any security events have transpired in the vehicle. In the event of a security event, the security log is gathered and transmitted to the server to update the vehicle's status.

In cases where a security event occurs in a connected vehicle equipped with an external communication controller, the controller communicates a security event notification to the server. The server can, if necessary, request comprehensive data from the vehicle for further analysis. Upon receiving such a request, the vehicle transmits detailed data, including CAN messages before and after a security event, to the server.





Upon receiving a security event that has transpired in a vehicle through the three pathways previously described, the server undergoes an automatic process to determine the vehicle model, controller, and software (SW) in which the security event occurred. The server automatically categorizes the array of security events obtained from diverse vehicles, facilitating an environment where individuals can carry out their respective analysis tasks. The server may encounter security events of a type that it cannot classify. In such instances, these events are labeled as "Unknown" to enable human analysis.

 

Next, one or more security events that are related to each other are grouped and managed as one security vulnerability. For example, security events identified as abnormal messages by CAN-IDS are amalgamated into a singular security vulnerability and collectively managed until the security vulnerability is resolved.

 

Lastly, abnormal vehicles are managed. The status of each vehicle produced on the production line is recorded, and this status is continually updated through maintenance and connectivity activities. During this process, not only the vehicle that reported the security event but also those vehicles with a potential risk of encountering a similar security event are identified. This proactive approach enables preemptive measures to be taken, enhancing overall security.

 


5. Examples of building a security control system

 



FESCARO has successfully developed and maintained security control systems for global passenger and commercial automakers. The image above illustrates the security control system we've implemented for a global OEM. While there are numerous functions within the system, we will introduce some of the key features.

 

First, let's discuss the dashboard. The dashboard provides a concise overview of the current security event status. It offers real-time updates on which security events have occurred in specific vehicles and compiles statistical data. This data includes insights into which security events on which vehicle type have been most frequent. It also includes a highly regarded feature among OEMs: the ability to 'Download as Report.' This feature generates reports detailing the status of security events, organized by month, week, vehicle type, and individual vehicle, all conveniently presented in Excel format.

 

Next, we have a feature that allows to examine the status of security events in greater detail. It displays information about which events occurred on which vehicles, along with their timestamps, event specifics, and any mitigation actions taken. To simplify the analysis of raw data, this feature visualizes and presents CAN messages.

 

Furthermore, the system provides a timeline of security events for a specific vehicle. This timeline aids in easily assessing which security events have taken place in a given vehicle. Importantly, the security control system goes beyond merely collecting security events from the field; it streamlines and visualizes tasks that would otherwise require manual handling, reducing the workload for human operators. Feedback from our customers attests to the convenience and efficiency that the security control system brings to the analysis process.

 

 

6. Do Tiers necessarily need a security control system? Wouldn’t quality activities be enough?

 

Of course, we can manage security events through quality activities. However, there are practical limitations to manual management, especially for Tier suppliers who often work with multiple OEMs and their various vehicle variants. Instead of manually classifying and analyzing every security event, the adoption of a security control system can significantly enhance efficiency.

While security control systems may not be mandated for Tiers, an impact analysis process is crucial. A single security event may potentially affect multiple vehicles and vehicle types. Security control systems automatically conduct impact analysis and identify vehicles that haven't encountered a security event yet but are at risk, enabling proactive measures to prevent the propagation of damage resulting from security incidents.

Vehicles become increasingly interconnected with external networks and hackers' attack strategies continuously evolve. What may be cutting-edge security technology for controllers today may not be so in 10 or 20 years. Given that no security system is entirely foolproof, ongoing monitoring after production is essential. Rapid identification and analysis of security incidents, followed by appropriate mitigation actions, are vital.

To achieve this, an appropriate security control system must be introduced to protect against security threats throughout the vehicle's entire life cycle.

 


7. How is the security events of the vehicle shared?

 


Security events that can occur in vehicles include intrusion detection events, software tampering events, and secure storage tampering events etc. When these events occur, related information is collected and stored.

In the case of connected vehicles, security event data is instantly relayed to a controller equipped with a telematics unit, such as a CCU. The contents of security events and related information are gathered by the CCU and then transmitted to the server. However, since connected services are optional for vehicles, not all vehicles transmit security event data to the server in real time.

For vehicles that are not connected, there is currently no direct means to send security events to the server in real time. Nonetheless, the collection of security events from as many vehicles as possible is essential for addressing and preventing potential security incidents in the future.

To address this, non-connected vehicles rely on car repair shops to carry out this task. When a vehicle is brought to a repair shop and connected to diagnostic equipment, the diagnostic tools search for stored security events within the vehicle's gateway and subsequently transmit this information to the server. FESCARO is also actively developing and delivering a security solution for diagnostic equipment to facilitate the search and automated transmission of security events from the gateway to the server.





Let's explore the details of the security event information transmitted to the server. In paragraph 7.2.2.2 of UN Regulation 155, the regulation doesn't specify the exact information to be managed. However, it does emphasize the need for a process to provide relevant data to support the analysis of attempted or successful cyberattacks. This process must be in operation and proven during the certification process.

To establish effective preventive measures, it is crucial to utilize security event information to understand the nature of intrusion attempts, identify issues, and pinpoint the timing of such events. Therefore, the necessary information must be collected for analysis.

The information sent to the server includes the Vehicle Identification Number (VIN) to determine which specific vehicle the security event occurred in, the type of security event, a timestamp to track the time it occurred, and, a freeze frame (for intrusion detection events) containing the CAN messages that were involved in triggering the event.

 

8. How does the gateway protect vehicles?







The gateway maintains vehicle security with the following functions:

 

 1. Primary defense against intrusion attempted through the OBD diagnostic port connected from outside the vehicle

 2. Monitoring abnormal behavior of vehicle controllers and reporting detected abnormal operations to the server

 3. Detecting the operation of unauthorized software other than officially certified software through the VTA certification process and reporting it to the server

Let's begin by examining the concept of 'defense against intrusion from outside the vehicle'. Indeed, this concept is about shielding the vehicle from external intrusions that might occur through a diagnostic port with an external contact point. This protection is achieved by implementing security measures such as Secure Unlock, Secure Access, Secure Flash, etc. For more about security features, please refer to the ‘Comprehensive Guide on Cybersecurity Solutions & Engineering’ FAQs.

Second is about CAN-IDS, which upholds vehicle security by focusing on the ‘detection and reporting of abnormal behavior occurring inside the vehicle’ as specified in UN R155. This encompasses the following six key activities:

 

· Undefined message detection

· Undefined signal detection

· Abnormal DLC message detection

· Abnormal cycle message detection

· Bus load detection

· Signal rate of change detection

In the development of a gateway, CAN messages or signals are typically routed and processed according to a CAN DBC. The CAN-IDS function comes into play when a message is received that is not defined in the CAN DBC or when the signals fall outside the specified range. It is also utilized when the length of the actual message received differs from the DLC defined in the DBC or exceeds the defined cycle.

 

Expanding on this functionality, the CAN-IDS can detect as abnormal conditions if it exceeds the defined range which the bus load of the CAN network defined and gets overloaded or if signals that should change gradually, such as RPM or vehicle speed, exhibit rapid and irregular changes. However, it's important to clarify that the gateway primarily detects and reports abnormal behavior rather than immediately implementing defense mechanisms. This is because vehicles operate on a broadcast CAN network, making it exceedingly challenging to identify the specific controller responsible for an abnormal operation. Attempting to immediately control the problematic controller can be hazardous during driving. Therefore, the current approach involves detecting abnormal behavior, reporting it to the server, and subsequently addressing the issue through software modifications and updates to ensure safety.

 

Last is the 'detection of unauthorized software.' As previously discussed UN Regulation 155, we will now introduce UN Regulation 156, known as the Software Update Management System (SUMS). The gateway plays a vital role in maintaining vehicle security by guaranteeing that only safe and authorized software updates are applied and operated. This is achieved through a database that manages software and hardware versions, compatibility information, and other relevant data, which is linked to vehicle type certification and referred to as RxSWIN for all controllers within the vehicle.

UN R156 requirements:

 

· 7.1 : Identify hardware and software versions and component information and check software integrity

· 7.2 : Identify software (RxSWIN) related to Vehicle Type Approval (VTA) and check update compatibility;

· 7.2.1.1 : Protect and prevent damage of the authenticity and integrity of software updates, and prevent invalid updates

· 7.2.2 : Ensure safe execution of updates and demonstrate that vehicle users are aware of updates.

 

The gateway plays a crucial role in ensuring that only software specified in the RxSWIN DB can be updated. It also verifies the integrity of the software to guarantee secure execution during the updating process, utilizing methods such as Secure Flash.

 


FESCARO has proven outstanding capabilities in key management systems (KMS), security control systems, and security gateway controllers. For key management systems, we have provided security asset injection solutions to OEMs and Tiers. Additionally, we have developed and maintained security control systems for leading global automakers and commercial vehicle manufacturers. FESCARO's security gateway controller, encompassing development on both software and hardware, is employed in approximately seven vehicle models, including both passenger cars and commercial vehicles, recognizing for its reliability.

 

If you encounter challenges in meeting OEM cybersecurity requirements or face cybersecurity difficulties on production and post-production phase of controllers, please contact the FESCARO’s ‘Security Counseling Center'. Together, we can collaborate to identify and implement solutions to address your specific cybersecurity needs.




■ Webinar Reviews


Cheol Lee "I hope that more specific and honest webinars focusing on cases like this continues. I was impressed by the difference from other webinars."


Hoon Noh “I think FESCARO's guidelines are a good strategy to respond to OEMs. It was beneficial as I had no experience communicating with OEMs.”


* Ki Song “The issues our company was concerned about were covered well, and it was especially helpful to my business as it was a Q&A related to practical work.”


* Kyo Jeong "I was curious about the security control system for monitoring and incident response after mass production, and it was easy to understand with actual application examples."


* Seok Go "I liked that it went beyond controller security, such as production lines and security control. There was a lot of new content that couldn't be found anywhere else."


* Mi Seung "It was good that production and post-production responses were also covered, and that the issues tiers were concerned about were explained from the OEM's perspective."


* Cheol Kang "The talk format was refreshing. It was interesting to hear things I was curious about before but found it difficult to ask questions about openly."


* Jun Lee "The TALK with the host and panelists was outstanding. I would like to hear about the cybersecurity system and preparations for SDV in future webinars."


CONTACT USquestion_mark

SITEMAP