Presentation is loading. Please wait.

Presentation is loading. Please wait.

Slide 1 GUARD Peter Priller, AVL List GmbH Security Verification for connected vehicles and transportation systems Consortia Status per Feb 6 th, 2014.

Similar presentations


Presentation on theme: "Slide 1 GUARD Peter Priller, AVL List GmbH Security Verification for connected vehicles and transportation systems Consortia Status per Feb 6 th, 2014."— Presentation transcript:

1 Slide 1 GUARD Peter Priller, AVL List GmbH Security Verification for connected vehicles and transportation systems Consortia Status per Feb 6 th, 2014

2 GUARD Status day 2 13 countries: AT, BE, CZ, DE, DK, ES, FI, FR, IT, NL, NO, PL, SE Project GUARDARTEMIS Brokerage Event 4./ : Status Name AffiliationTypeCountryCommentremark Stefan / IAIKUniATformal methods; security testing Thomas Ebner EvolarisResearchATapps for integrated onboard systems Erwin verification; V2x Peter Priller AVLLEAT security verification of automotive systems; DoE, test methods, automation,… Stefan Van security architecture, encryption (HW, SW), participated in nat. project (secure chip in car) with NXP; vehicle and building domain; potentially interest/partner in Rail domain Dominique Segers BarcoLEBEsecurity in Avionics, Defence aread Pavel CEITECUniCZ V2x wireless and wired communication security, embedded systems tamper detection and protection, power train control in automotive applications; security impact on safety (eg. powertrain), IDEAS, POLLUX, E3CAR, MOTORBRAIN Jiri Data recording unit for car systems; pre-accident sensor status & camera footage / follow up IDEAS, E3CAR, POLLUX project Pavel FITUniCZencryption aspects; traffic control systems (V2I)will talk to CZ SME CAMEA Markus testing in automotive environment Georg testing Martin GroupLEDE security in wireless communication (esp. in-flight); jamming detection, system integrity, reliability, dependability, intrusion detection, tamper resistance Aerospace domain (Airbus, Astrium,…) Georg GermanyLEDE secure IVN, secure access (wireless keys), C2x, end- to-end sec. Michael GmbhSMEDE security verification, product "model trust center"; gateways; also interested in other domains talk with railway operators (DB, SNCF) Thomas methodologies for HW, SW formal verification, model driven SW + HW dev. methods including formal methods, Standardization (analog + mixed signals); coooperate with NXP DE/AT Dr. Marko security in building domain (surveillance, …) side channel attacks; fault injection, remote timing attacks, remote penetration testing in vehicles automotive domain; and BUILDING domain Friedrich Schön FOKUSResearchDE Security testing, V2x, model-based-testing; model bus Harald Pötter Fraunhofer IZMResearchDE Jörg Settelmeier AVL SFRLEDEsecurity in V2x; impact security -> safety Paul Pop DTUUniDK "open networks": how to guarantee safety and security in the context of the "connected car"; security safety links; config. tools for open safety/security protecting systems alt. contact: Domitian Tamas-Selicean, Pascal Schleuninger will talk to add. partners/domains Arne Skou CISSResearchDKsecurity verification and testing will talk to SME's in building domain Daniel Saez depandability, reliability, consistency in middleware; SLA definitions; Access control and intrusion detection; mem alloc and scheduling in RT systems; computer vision (e.g. pedestrian / situaiotn recognition) Pablo P. security metrics performance analysis tools / Project TOISE; network analysis & simulation will check with SME's and LE's; automotive & building domain Carles Ferrer i security in HW & SW and WSN / Project TruDevice; experience from POLLUX Roberto mobile platforms, devices as gateways, as security token in vehicles Jorge embedded systems for autonomous vehicles (cars, UAV,…); interactions; safety measures estibaliz Delgado Martinez TecnaliaResearchES certification ; safe and secure SW dev; smart analytics; use cases smart mobility, smart city; also in DEWI and SAFERDAT security in V2V, V2I Automotive & building domain Christos Verikoukis CTTCResearchES design of protocols and building blocks implementation for mobile solutions, Smart cities and smart mobility Jacobo Dominquez Mosquera AcordeSMEES Wireless comm links (also satelite comm., GNSS, ZigBee, Wifi, BT,..) Jani Mänty scuerity testing; alt. contact: Ailisto Heikki Jaakko Saarela CentriaResearchFI Keijo Haataja University of Eastern Finland UniFI WS security; intrusion detection & preevention; auth. & encr. methods, intell. alg. ; machine compmuter vision, learning systems will talk to companies like F-Secure Eric Menard, Guy Convenant ValeoLEFRindustrial use cases PEBAY-PEYROULA Florian on SW David security assessment and testing in automotive context, development of countermeasures, HW based security, system integrity, secure low level communication layers Caroline FranceLEFR Girardi Antonio simulation platforms and modeling for system performance analysis (UFS); bottom-up simu (e.g. verify mem alternative); derive impact/requ. to mem. systems; memory systems for security and low-power; Roberto Petroccia WsenseSMEITsecurity in wireless networks Francesco Fileppo akhelaSMEIT context-aware UI, bus interfaces, penetration testing for automotive apps Romano Hoofman NL, BELENL secure IVN, secure access (wireless keys), secure Car-2-x communication; provide system view of V2x Peter J. van Otterloo TU/eUniNL 1. system integrity, reliability, dependability 2. V2V communication 3. security by virtualization (HW, SW) (Kees) 4. intrusion detection, tamper resistance Marleen Methods2Busine ss SMENL methodologies for HW, SW formal verification, model driven SW + HW dev. methods including formal methods, SystemC, wireless communication IP and security for wirless connectivity; HW and SW for the MAC layer of IEEE n, partner for PHY; AES security encryption Guido Dolmans Holst Center IMEC ResearchNL Security in wireless communications for automotive connectivity see imec proposal doc Maurits De Graaf Thales NLLENL Martin Linges SimulaResearchNO Lukasz observe, monitor wireless transmissions to check for security on radio layer vehicle and building domain Przemyslaw Sekalski Open RnDSMEPL SW & HW prototyping; collaborates with Arynga; secure over-the-air updates of xCU'S, remote diagnostics CarSync sync; will talk to PKP (Polish Railways) Alexey Halmstad University UniSEV2V and V2I protocol design Jakob Swedish Inst. of Computer Science ResearchSE securing plug-in architecture for automotvie systems "AppStore" open demo platform Michael R. V. Chaudron, Christian Chalmers University UniSEdata flow analysis / data leakage detection Mauro ITLEITsecurity on wireless networks Gerd vom IMSResearchDE hardware design & verification (antenna design, SWR) Roberto STMicroelectron ics LEIT

3 Ideas, topics define threat models security verification on IVN, wireless com, SW and HW level testing methodologies capture & replay of attacks (library) on vehicle test beds random testing (guided by captured attacks/formal protocol analysis) Grammar-Based Fuzzing test generation apply known hacking methods (buffer overflow testing…) test automation, test management, result management systems formal methods, MBT, DoE / test cases design HW and SW simulators and test facilities for security testing embedded sandboxing, firewalls, intrusion detection, tamper proofing, intrusion detection, …

4 GUARD Status day 2 Domains Automotive Aeronautics Building Railway


Download ppt "Slide 1 GUARD Peter Priller, AVL List GmbH Security Verification for connected vehicles and transportation systems Consortia Status per Feb 6 th, 2014."

Similar presentations


Ads by Google