Abstract:
In various embodiments, methods, systems, and vehicle apparatuses are provided. A method for determining a trusted context of operation by an in-vehicle Network Intrusion Detection System (NIDS) for learning of a vehicle platform, including executing the NIDS to monitor a set of Electronic Control Units (ECUs) and vehicle state elements by receiving a set of vehicle derived inputs about a vehicle's operating state; in response to a determination about the vehicle's operating state, identifying the trusted window during which learning about network topology and whitelisted messages contained in a vehicle platform is allowable; creating a vehicle-specific configuration containing a list of networks of topologies and whitelisted messages in use by the ECUs in the vehicle platform, and preventing misconfiguring of at least one network in the list of network topologies and whitelisted messages of the vehicle-specific configuration in the vehicle platform outside the trusted window.
Abstract:
A system for in-vehicle network intrusion detection includes a microcontroller having first and second cores and memory. The first core may be configured to obtain one or more network messages from one or more communication buses of a vehicle describing one or more events associated with the vehicle. The memory may be configured to store the one or more network messages obtained by the first core. The second core may be configured to: (i) read the one or more network messages from the memory; (ii) detect whether at least some of the one or more events constitute an anomaly based on predefined rules; (iii) generate one or more resident incident logs including metadata associated with one or more detected anomalous events based on the detected anomaly event data; and (iv) generate one or more transmitted incident logs based on the one or more resident incident logs.
Abstract:
A system and method of securely communicating information between a vehicle and a central facility includes receiving at a vehicle diagnostic tool a challenge query from the vehicle; establishing a wireless connection between the vehicle diagnostic tool and a central facility; transmitting the challenge query from the vehicle diagnostic tool to the central facility via the wireless connection; receiving at the vehicle diagnostic tool a response to the challenge query via the wireless connection; and accessing one or more vehicle modules on the vehicle using the received response to the challenge query.
Abstract:
A method for securing an electronic control unit (ECU). The method may include generating a granular security control adjustment authorization ticket (G-SCAAT) for securing the ECU according to a plurality of security parameters determined based on to a role selected for a corresponding user. The G-SCAAT may include security values to be used in controlling the ECU to operate according to the security parameters.
Abstract:
A system and method of regulating data communications between a vehicle electronics system and a computing device includes: communicatively linking a first data port of an isolation device with the vehicle electronics system; communicatively linking a second data port of the isolation device with the computing device; receiving data at the isolation device sent between the computing device and the vehicle electronics system; and permitting the data to pass through the isolation device based on the identity of the computing device, the rate at which the data passes through the isolation device, or the content of the data.
Abstract:
A vehicle control module is provided and includes a hybrid memory and a processor. The hybrid memory includes: application memory that stores application code; boot memory that stores a first RMTS code, where the first RMTS code includes first risk functions; and ETM that temporarily stores a second RMTS code. The second RMTS code includes second risk functions. The processor: based on an operating mode of the vehicle control module, executes the application, first RMTS and second RMTS codes; erases the ETM prior to installation of the vehicle control module in a vehicle or delivery of the vehicle; and based on the first RMTS code, permits execution of the first RMTS code prior to and subsequent to installation of the vehicle control module in the vehicle and the second RMTS code prior to installation of the vehicle control module in the vehicle or delivery of the vehicle.
Abstract:
A method of providing access to a password-protected electronic control unit (ECU) using encryption includes generating a cryptographic key for the ECU using a master password, a serial number of the ECU, and a password-based key derivation function; converting the generated cryptographic key into an ECU password; and accessing data from the ECU using the ECU password.
Abstract:
A method for performance tuning an electronic control unit (ECU). The performance tuning may include determining one or more tunable values stored on a tunable implementation memory of the ECU to specify tunable calibration data for one or more tunable calibration parameters selected for performance tuning and controlling an application software of the ECU to execute according to the tunable calibration data.
Abstract:
In various embodiments, methods, systems, and vehicle apparatuses are provided. A method for determining a trusted context of operation by an in-vehicle Network Intrusion Detection System (NIDS) for learning of a vehicle platform, including executing the NIDS to monitor a set of Electronic Control Units (ECUs) and vehicle state elements by receiving a set of vehicle derived inputs about a vehicle's operating state; in response to a determination about the vehicle's operating state, identifying the trusted window during which learning about network topology and whitelisted messages contained in a vehicle platform is allowable; creating a vehicle-specific configuration containing a list of networks of topologies and whitelisted messages in use by the ECUs in the vehicle platform, and preventing misconfiguring of at least one network in the list of network topologies and whitelisted messages of the vehicle-specific configuration in the vehicle platform outside the trusted window.
Abstract:
A method for securing an electronic control unit (ECU). The method may include generating a granular security control adjustment authorization ticket (G-SCAAT) for securing the ECU according to a plurality of security parameters determined based on to a role selected for a corresponding user. The G-SCAAT may include security values to be used in controlling the ECU to operate according to the security parameters.