Cyber Security

Cyber Security

The Android system being an open architecture OS, public community has access to the complete source code and internal details. A hacker who knows the internal details of the system could inject a malicious app to take control of the system. Usage of connectivity technologies such as Wi-Fi, Bluetooth along with the Internet has become essential for fulfilling various core automotive software features, but it increased the vulnerability to hackers’ attacks. It is a massive challenge for OEMs to develop systems with high security which prevents all sorts of attacks and keeps the vehicle safe all the time.

Key security requirements of IVI systems

  1. Secure OS
  2. Support Hardware based security (HSM, TEE)
  3. Secure boot
  4. Secure Software Update
  5. Protection of sensitive information
  6. Secure communication and networking
  7. Intrusion detection
  8. Robustness against failed or compromised components
  9. Least privilege and minimal trust base
  10. Robustness against external input
  11. Minimization of information exposure

Security Design by threat modelling

Threat modelling is a structured, systematic and iterative approach of analyzing security of a system. It helps security architects to

  1. Accurately determine the attack surface of the system
  2. Assign risk to various threats
  3. Drive the vulnerability mitigation process

It is widely considered to be one of the best methods of improving the security of the software

Acsia Expertise in IVI Security implementation

Acsia has incorporated complex security requirements for infotainment solutions. To ensure total security, it requires many solutions as a well-connected chain which prevents all sorts of attacks through vulnerabilities.

Case Studies