Desay's Cyber Security Initiative & Autonomous Vehicle - - PowerPoint PPT Presentation

desay s cyber security initiative autonomous vehicle
SMART_READER_LITE
LIVE PREVIEW

Desay's Cyber Security Initiative & Autonomous Vehicle - - PowerPoint PPT Presentation

Desay's Cyber Security Initiative & Autonomous Vehicle Development D E S AY S V A U T O M O T I V E E w e Te i k E n g 2 9 M a r c h 2 0 1 8 Confidential Contents l INTRODUCTION l


slide-1
SLIDE 1

点击此处 输入您的封面 标题

Confidential

Desay's Cyber Security Initiative & Autonomous Vehicle Development

E w e Te i k E n g 2 9 M a r c h 2 0 1 8 D E S AY S V A U T O M O T I V E

slide-2
SLIDE 2

No photos Confidential

2

Contents

l

INTRODUCTION

l

DESAY’S CYBER SECURITY INITIATIVE

l

DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT

l

CHALLENGES

l

FUTURE TREND

slide-3
SLIDE 3

No photos Confidential

3

Contents

l

INTRODUCTION

Ø

DESAY SV AUTOMOTIVE IN A GLANCE

Ø

DEVELOPMENT OF CAR INDUSTRY IN CHINA

Ø

EVOLUTION OF AUTOMOTIVE ELECTRONICS

Ø

AUTONOMOUS DRIVING IN CHINA

slide-4
SLIDE 4

No photos Confidential

4

DESAY SV AUTOMOTIVE IN A GLANCE

M ission: To provide innovative, competitive and smart automotive products and services to our customers.

30%

Navigation in OEM market share reaches 30%

10

Production quantity in 2015 exceeded 10 million sets million

1986

Founded in 1986

车载信息娱乐系统 77%

车身信息与控制 16% T/O in 2015

slide-5
SLIDE 5

No photos Confidential

5

PRODUCT PORTFOLIO

Display M odule & System Driver Information Display Climate Control Radio & Navigation Advanced Driver Assistance System

slide-6
SLIDE 6

No photos Confidential

6

DEVELOPMENT OF CAR INDUSTRY IN CHINA

The Beginning (1952)

  • Military Needs
  • FAW JieFang

CA-30

  • Russian

Technology M arket Liberation (1984)

  • JV with the West
  • Toyota, Nissan,

Daihatsu AMC, Chrysler, VW, Citroen, Hyundai, Peugeot Local Branding (1994)

  • Originated from

defense industry

  • Geely, Great

Wall, Changan Motors, Changhe, Hafei New Energy Vehicle (2011)

  • Initiated in 10th 5

year plan

  • SOP at 2011,

>500k unit on 2016

  • 1.7 million unit
  • n Dec 2017

Becoming world No.1 vehicle producer since 2009

slide-7
SLIDE 7

No photos Confidential

7

EVOLUTION OF AUTOMOTIVE ELECTRONICS

slide-8
SLIDE 8

No photos Confidential 8

AV TECHNOLOGY DEVELOPMENT IN CHINA

1992 2003 2009 2015 2016 2017

CITAVT-I developed by NUDT NUDT and F AW joint developed Automatic Overtaking on HongQi CA-7460 NSFC rolled out IVFC challenge through its through its major research plan, “Cognitive Computing of Visual and Auditory Information.” The State Council published “Made in China 2025”, listed AV as future automotive industry transformation direction Major player like BAIC, F AW and SAIC triggered its AV program Baidu debuts Apollo

slide-9
SLIDE 9

No photos Confidential 9

Policy Drive for ICV in China

Event Date Impact

<Made in China 2025> May 2015 The first government policy that clearly defined ICV as future transformation direction for automotive industry <Equipment Manufacturing Standardization and Quality Improvement Plan> April 2016 Commencement of standardization work on ICV industry <National Automotive Industry Medium-Long T erm Development Plan> Jun 2017 Increase support for R&D, push for broadband infrastructure development and cross industrial development of big data sharing platform for automotive, accelerate the construction of cyber security & traffic safety system development <National Standards S ystem

  • f T

elematics Industry (Intelligent & Connected Vehicles)> – draft Jun 2017 Establish intelligent & connected vehicle industry based on “ Car as the core, integration of intelligent capability as main aim, seconded by connectivity effort” <Development Plan on the New Generation of Artificial Intelligence> July 2017 Advocate open and coordinated innovative AI system, elevate AI industry into the global high-end value chain, Research coordination sensing and interaction aimed at autonomous unmanned systems

slide-10
SLIDE 10

No photos Confidential 10

Contents

l

INTRODUCTION

l

DESAY’S CYBER SECURITY INITIATIVE

Ø

APPROACHES TAKEN

Ø

ORGANIZATION STRUCTURE

slide-11
SLIDE 11

No photos Confidential 11

DESAY’S CYBER SECURITY INITIATIVE Desay SV initiates cyber security efforts in 2 prong approach: Security by design

  • Product design with security in mind
  • SPDLC (Secured Product Development Life Cycle)
  • Introduction of VAPT (Vulnerability Assessment & Penetration T

est) as part of product verification process

  • Research on countermeasures

Operational & Incident Response Architecture

  • Regular firmware update through FOTA (Firmware Over The Air)
  • Shared intelligence on threat and vulnerabilities with OEMs
  • Formation of Incident Response T

eam

slide-12
SLIDE 12

No photos Confidential 12

C

  • unt er m

easur e R esear ch & Appl i cat i on I nci dent R esponse

Cyber-physical System Security

Vul ner abi l i t y Assessm ent & Penet r at i on Test i ng

ORGANIZATION STRUCTURE

slide-13
SLIDE 13

No photos Confidential

13

Contents

l

INTRODUCTION

l

DESAY’S CYBER SECURITY INITIATIVE

l

DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT

Ø

PRODUCT PORTFOLIO

Ø

PRODUCT ROADMAP

Ø

SYSTEM ARCHITECTURE

slide-14
SLIDE 14

14

Hardware

Desay SV Products

Network Communication

· GPS Positioning · Telematics Communication · E-Call

Embedded Computing Unit

· Autonomous Driving

Algorithm

Front View Camera

· Augmented Navigation · Object Detection · Lane Change Assistance · Parking Assistance · All Surround View · Blind Spot Detection

Surround View Camera

Radar

· Advance Driver

Assistance

· Anti-collision · Active Cruise Control

Ti TDA2X IPC Nvidia Drive PX2 Ultrasonic Lidar

slide-15
SLIDE 15

No photos Confidential

15

Autonomous Driving Product Roadmap

slide-16
SLIDE 16

No photos Confidential

16

Development & Implementation

Perception Perception Localization Localization Motion Planning Motion Planning Trajectory Control Trajectory Control Driving Strategy Driving Strategy HD Map HD Map V2X V2X

SVM SVM LDW LDW BSD BSD FCW FCW ACC ACC AEB AEB APA APA LKA LKA

Highway Pilot System Highway Pilot System Traffic Jam Assist Traffic Jam Assist

Conditional Autonomous Driving System Conditional Autonomous Driving System Full Autonomous Driving System Full Autonomous Driving System

Development of Autonomous Driving Vehicle Technologies Development of ADAS Products Development of ADAS Systems

Front View Camera 24G Hz Radar 77G Hz Radar Surrounding View Module T-box

… .. … ..

slide-17
SLIDE 17

No photos Confidential

17

Middleware Data Logging Simulation System Level V2X Security Localization GPS+IMU+Encoder 3D Map-Based Matching 2D map + Local Correction HD Map Data Capture with veh Team Manual Labeling Semi-Auto/ Auto labeling Cloud-Source Data Capture Sensor Fusion Lidar+ Camera Radar+ Camera Lidar+ Radar+ Camera Perception Radar Traditional image High-res radar Traditional moving-obj detect Lidar (2.5D/3D/SS) Traditional PointCloud Deep Learning PointCloud Camera (Mono/Stereo) Deep Learning Image Navigation Path Planning Rules-based Behaviour Decision Control (Model-based) Learning-based Behavior Decision

SYSTEM ARCHITECTURE

slide-18
SLIDE 18

No photos Confidential 18

Contents

l

INTRODUCTION

l

DESAY’S CYBER SECURITY INITIATIVE

l

DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT

l

CHALLENGES

slide-19
SLIDE 19

No photos Confidential 19

DESAY’S CHALLENGES AS FIRST TIER SUPPLIER

  • ~38.5DMIPS, Quad Core, V2X, Vehicle Ethernet, Linux, Android

Ever-more sophisticated systems & massive software components

  • No detailed guideline on design, verification and acceptance criteria

No single comprehensive legislative framework for subsystem

  • “Wait-and-see” approach by carmaker
  • Node ID assignment / Network configuration is held by system integrator
  • Underestimate the potential threat, assuming that external pentest and patching is sufficient to cover the

vulnerabilities

  • Only basic cyber security requirement, e.g. secure boot, TEE, etc.

No clear guideline from automobile manufacturers (as final system integrator), particularly Chinese carmaker

  • Japan vs German vs US vs China

Huge gap in cyber security requirements amongst automobile manufacturers

slide-20
SLIDE 20

No photos Confidential 20

DESAY’S CHALLENGES AS FIRST TIER SUPPLIER

  • Careless, no culture of cybersecurity
  • Not well-informed of latest threats

Awareness on end-user (car driver)

  • OEMs reluctant to absorb cost incur by secured design
  • Additional ~US

D2-5/ unit for secured design

Cost

  • Most major car manufacturers do not allow first tier to perform FOTA due to functional safety concern

Acceptance of FOTA by car manufacturers

  • In event of hacked car, who shall be held accountable?

Vague Accountability

  • Most of the security expert lack of interest/ knowledge in embedded systems

Talent gap in cyber-physical security

slide-21
SLIDE 21

No photos Confidential 21

Contents

l

INTRODUCTION

l

DESAY’S CYBER SECURITY INITIATIVE

l

DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT

l

CHALLENGES

l

FUTURE TREND

slide-22
SLIDE 22

No photos Confidential 22

FUTURE OF CYBER SECURITY IN AUTOMOTIVE

  • Impose fine on non-compliance systems (SPY Car Act 2017, US)
  • Isolation of critical software systems from noncritical (SPY Car Act 2017, US)
  • Liability on car manufacturers and First-Tier supplier

Legislative trend

  • Discount on security enabled system (similar to dash cam discount)

Auto Insurance

  • Monthly payment on firewall, patches and vulnerability updates (similar to antivirus software)

provided by tripartite partnership (Carmaker, chipmaker and big tech co.)

Subscription-Based M odel

  • OTA will be a “must have” for ICV

Automotive cyber security no longer static

slide-23
SLIDE 23

No photos Confidential 23

FUTURE OF CYBER SECURITY IN AUTOMOTIVE

  • S

haring of threats and vulnerability data amongst OEMs, supplier or even authorities Alliance

  • Physical isolation of infotainment/ telematics from powertrain/ vehicle control

domain Design (Air gaps)

  • Reintroduction of basic analog control path and mechanical control as

redundancy

  • Activated during recovery mode, or “limp home mode”

“M anual” M ode

slide-24
SLIDE 24

Official Website WeChat public account

THANK YOU