If you hack the radio, can you send messages to the brakes or the steering?
And if you can, what can you do with them? That’s what two white-hat
hackers wanted to know. In their now famous
car hack, they remotely killed the transmission of a Jeep with a Wired reporter behind the wheel. In that moment, the potential
of car hacking became real to the world.
Much has changed in the automotive industry since then, but to no one’s
surprise, security has become a top concern for automakers. New cars are
loaded with electronic controllers, computing power, lines of code and
wireless connections to the outside world. The attack surface is enormous. And
the media fallout of an attack can be detrimental to a carmaker’s
brand.
Without security, there is no safety
As we saw in the Jeep hack, once a hacker gained control of the radio, it was
easy to wreak havoc with the steering and braking systems through the in-car
network. It didn’t have a secure gateway, which acts as a firewall and
controls the handling of messages in and outside of the car. A gateway
also isolates safety-critical systems from other applications like
infotainment.
In-vehicle networks must be protected against intruders manipulating and
stealing data. This means that vehicle network architectures must be
reconsidered, separating – isolating – the various domains
inside a vehicle network.
Also, strong encryption and authentication must be used to ensure the car is
securely communicating with known and trusted entities only, as well as to
protect code and data that resides inside the vehicle network.
What other security precautions do carmakers need to make? What kind of
hardware security do automotive processors provide? These are some of the
questions and concerns we hear across the industry.
NXP first implemented hardware security on an automotive processor in 2015
Automotive processors generate, process, exchange and store massive amounts
of sensitive data —making them an attractive target for hackers. They
must have high levels of security.
As early as 2015, NXP was focused on getting security right at the processor
level. We released a dedicated automotive hardware security module (HSM) that
offered on-chip security for automotive applications, to protect software from
being manipulated and support secure software updates and data protection.
Even earlier, in 2010, we released an automotive MCU that was SHE (secure
hardware extension) compliant.
A common approach to security in our automotive platforms
Today, every new automotive processor and controller that we make includes a
dedicated hardware security module: on the S32, it’s called HSE
(Hardware Security Engine) and on the i.MX 8, it’s
called SECO (SEcure COntroller). Both modules, or engines, fully
meet the functional goals and objectives of the ‘EVITA Full’
specification and independently manage the security functions without
impacting the function of the processor or controller. Secure boot and
real-time integrity checking schemes verify that the software is authentic,
trusted and unaltered. These modules also add more flexibility to how
automakers can fix security vulnerabilities, as they enable secure
over-the-air updates that let automakers update software after the car hits
the road – without a costly recall.
Furthermore, lifecycle management mechanisms allow controlled lockdown of some
of the controller and processor features. For example, debug and serial
download are essential features during vehicle development and manufacturing
– but they’d be invaluable tools for hackers if they were
accessible on production vehicles! Lastly, there’s also built-in
hardware protection against tampering of the processor voltage, temperature
and power and hardware-enforced resource isolation.
S32 automotive platform is designed for the future growth of software,
connectivity – and security
Our new S32 automotive platform is designed for what’s coming in cars
of tomorrow – fast-to-market cars with rich in-vehicle experiences and
automated driving functions. It adds up to even more software and more
complexity. (Read more about how S32’s common architecture helps automakers
reduce software complexity across the car).
To cope with the increasing security requirements on today’s powerful
ECUs, such as secure gateways and driver assistance systems, the S32’s
embedded hardware security engine (HSE) increases the rigor of the
implementation of the cryptographic algorithms, leveraging technology and
know-how from the financial, banking and government identification industries.
i.MX 8/8X applications processor raises the bar on security for driver
information systems
Applications processors have come a long way. With roots in the earliest forms
of telematics, today’s driver information systems, including heads up
displays, digital clusters, navigation, media players and voice and data
communications, concurrently run multiple complex software stacks and require
true security. Our approach is a layered defense that comprehensively protects
the entire processing unit – from hardware and software down to the
communication links.
The i.MX 8’s secure controller (SECO) is the root-of-trust (RoT) for
the system, not only for key management, but also for authenticating,
monitoring and locking down the system controller firmware. It is also
the RoT for multiple, concurrent operating systems, from power-on to run time.
Complementing the SECO is the i.MX 8’s hardware-based tamper detection
and resistance capabilities and in-processor firewall domains that ensure data
and memory integrity of services, raising the bar on safety and security of
the driver information systems.
Security is essential – people must be able to trust their
cars
Hackers must not be able to gain control of the car or to exploit the privacy
of the driver and their data, including financial information. Automakers need
to use security solutions that will protect the electronic systems against
potential cyber attacks.
Find out more
Secure Vehicle Architecture: Multi-layer defense for connected cars
About the S32 Automotive Processing Platform
About the i.MX 8 series of Applications Processors
Cars are made of code