desay s cyber security initiative autonomous vehicle
play

Desay's Cyber Security Initiative & Autonomous Vehicle - PowerPoint PPT Presentation

Desay's Cyber Security Initiative & Autonomous Vehicle Development D E S AY S V A U T O M O T I V E E w e Te i k E n g 2 9 M a r c h 2 0 1 8 Confidential Contents l INTRODUCTION l


  1. 点击此处 Desay's Cyber Security Initiative & 输入您的封面 Autonomous Vehicle 标题 Development D E S AY S V A U T O M O T I V E E w e Te i k E n g 2 9 M a r c h 2 0 1 8 Confidential

  2. Contents l INTRODUCTION l DESAY’S CYBER SECURITY INITIATIVE l DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT l CHALLENGES l FUTURE TREND No photos Confidential 2

  3. Contents l INTRODUCTION Ø DESAY SV AUTOMOTIVE IN A GLANCE Ø DEVELOPMENT OF CAR INDUSTRY IN CHINA Ø EVOLUTION OF AUTOMOTIVE ELECTRONICS Ø AUTONOMOUS DRIVING IN CHINA No photos Confidential 3

  4. DESAY SV AUTOMOTIVE IN A GLANCE M ission: To provide innovative, competitive and smart automotive products and services to our customers. 1986 Founded in 1986 车身信息与控制 million 10 16% Production quantity in 2015 exceeded 10 million sets 车载信息娱乐系统 30% 77% T/O in 2015 Navigation in OEM market share reaches 30% No photos Confidential 4

  5. PRODUCT PORTFOLIO Radio & Navigation Climate Control Driver Information Display Display M odule & System Advanced Driver Assistance System No photos Confidential 5

  6. DEVELOPMENT OF CAR INDUSTRY IN CHINA The Beginning M arket Liberation Local Branding New Energy (1952) (1984) (1994) Vehicle (2011) • Initiated in 10 th 5 • Military Needs • JV with the West • Originated from defense industry year plan • FAW JieFang • Toyota, Nissan, CA-30 Daihatsu AMC, • Geely, Great • SOP at 2011, Chrysler, VW, Wall, Changan >500k unit on • Russian Citroen, Motors, 2016 Technology Hyundai, Changhe, Hafei • 1.7 million unit Peugeot on Dec 2017 Becoming world No.1 vehicle producer since 2009 No photos Confidential 6

  7. EVOLUTION OF AUTOMOTIVE ELECTRONICS No photos Confidential 7

  8. AV TECHNOLOGY DEVELOPMENT IN CHINA NSFC rolled out IVFC challenge through its through its major research plan, Major player like BAIC, CITAVT-I developed by “Cognitive Computing of Visual and F AW and SAIC triggered Auditory Information.” NUDT its AV program 1992 2003 2009 2015 2016 2017 NUDT and F AW joint developed Automatic The State Council published Baidu debuts Apollo Overtaking on HongQi “Made in China 2025”, listed AV CA-7460 as future automotive industry transformation direction No photos Confidential 8

  9. Policy Drive for ICV in China Event Date Impact <Made in China 2025> May The first government policy that clearly defined ICV as future 2015 transformation direction for automotive industry <Equipment Manufacturing April Commencement of standardization work on ICV industry Standardization and Quality 2016 Improvement Plan> <National Automotive Jun Increase support for R&D, push for broadband infrastructure Industry Medium-Long T erm 2017 development and cross industrial development of big data sharing Development Plan> platform for automotive, accelerate the construction of cyber security & traffic safety system development <National Standards S ystem Jun Establish intelligent & connected vehicle industry based on “ Car as of T elematics Industry 2017 the core, integration of intelligent capability as main aim, seconded (Intelligent & Connected by connectivity effort” Vehicles)> – draft <Development Plan on the July Advocate open and coordinated innovative AI system, elevate AI New Generation of Artificial 2017 industry into the global high-end value chain, Research coordination Intelligence> sensing and interaction aimed at autonomous unmanned systems No photos Confidential 9

  10. Contents l INTRODUCTION l DESAY’S CYBER SECURITY INITIATIVE Ø APPROACHES TAKEN Ø ORGANIZATION STRUCTURE No photos Confidential 10

  11. DESAY’S CYBER SECURITY INITIATIVE Desay SV initiates cyber security efforts in 2 prong approach: Security by design • Product design with security in mind • SPDLC (Secured Product Development Life Cycle) • Introduction of VAPT (Vulnerability Assessment & Penetration T est) as part of product verification process • Research on countermeasures Operational & Incident Response Architecture • Regular firmware update through FOTA (Firmware Over The Air) • Shared intelligence on threat and vulnerabilities with OEMs • Formation of Incident Response T eam No photos Confidential 11

  12. ORGANIZATION STRUCTURE Cyber-physical System Security C ount er m easur e R esear ch & Vul ner abi l i t y Assessm ent & I nci dent R esponse Appl i cat i on Penet r at i on Test i ng No photos Confidential 12

  13. Contents l INTRODUCTION l DESAY’S CYBER SECURITY INITIATIVE l DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT Ø PRODUCT PORTFOLIO Ø PRODUCT ROADMAP Ø SYSTEM ARCHITECTURE No photos Confidential 13

  14. Hardware Network Embedded Communication Computing Unit Lidar · Autonomous Driving · GPS Positioning · Telematics Communication Algorithm · E-Call Nvidia Drive PX2 Desay SV Products Ti TDA2X Surround View Front View Radar Camera Camera Ultrasonic IPC · Advance Driver · Augmented Navigation · Parking Assistance Assistance · Object Detection · All Surround View · Anti-collision · Lane Change Assistance · Blind Spot Detection · Active Cruise Control 14

  15. Autonomous Driving Product Roadmap No photos Confidential 15

  16. Development & Implementation Development of Autonomous Driving Vehicle Technologies … .. Motion Motion Trajectory Trajectory Driving Driving Perception Perception Localization Localization HD Map HD Map V2X V2X Planning Planning Control Control Strategy Strategy Development of ADAS Products … .. Front View Camera 24G Hz Radar 77G Hz Radar Surrounding View Module T-box Development of ADAS Systems Highway Pilot Highway Pilot SVM SVM LDW LDW ACC ACC AEB AEB System System Conditional Conditional Full Autonomous Full Autonomous Autonomous Autonomous Driving System Driving System Driving System Driving System Traffic Jam Traffic Jam BSD BSD FCW FCW APA APA LKA LKA Assist Assist No photos Confidential 16

  17. SYSTEM ARCHITECTURE Perception HD Map Lidar Camera Radar Data Capture Cloud-Source (2.5D/3D/SS) (Mono/Stereo) with veh Team Data Capture System Level Traditional Traditional Traditional Semi-Auto/ Auto moving-obj Manual Labeling PointCloud image labeling Middleware detect Data Logging Deep Learning Deep Learning High-res radar Localization PointCloud Image Simulation GPS+IMU+Encoder V2X Sensor Fusion 3D Map-Based Matching Security Lidar+ Radar+ Lidar+ Radar+ Camera Camera Camera 2D map + Local Correction Navigation Rules-based Behaviour Decision Learning-based Behavior Decision Path Planning Control (Model-based) No photos Confidential 17

  18. Contents l INTRODUCTION l DESAY’S CYBER SECURITY INITIATIVE l DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT l CHALLENGES No photos Confidential 18

  19. DESAY’S CHALLENGES AS FIRST TIER SUPPLIER Ever-more sophisticated systems & massive software components • ~38.5DMIPS, Quad Core, V2X, Vehicle Ethernet, Linux, Android No single comprehensive legislative framework for subsystem • No detailed guideline on design, verification and acceptance criteria No clear guideline from automobile manufacturers (as final system integrator), particularly Chinese carmaker • “Wait-and-see” approach by carmaker • Node ID assignment / Network configuration is held by system integrator • Underestimate the potential threat, assuming that external pentest and patching is sufficient to cover the vulnerabilities • Only basic cyber security requirement, e.g. secure boot, TEE, etc. Huge gap in cyber security requirements amongst automobile manufacturers • Japan vs German vs US vs China No photos Confidential 19

  20. DESAY’S CHALLENGES AS FIRST TIER SUPPLIER Awareness on end-user (car driver) • Careless, no culture of cybersecurity • Not well-informed of latest threats Cost • OEMs reluctant to absorb cost incur by secured design • Additional ~US D2-5/ unit for secured design Acceptance of FOTA by car manufacturers • Most major car manufacturers do not allow first tier to perform FOTA due to functional safety concern Vague Accountability • In event of hacked car, who shall be held accountable? Talent gap in cyber-physical security • Most of the security expert lack of interest/ knowledge in embedded systems No photos Confidential 20

  21. Contents l INTRODUCTION l DESAY’S CYBER SECURITY INITIATIVE l DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT l CHALLENGES l FUTURE TREND No photos Confidential 21

  22. FUTURE OF CYBER SECURITY IN AUTOMOTIVE Legislative trend • Impose fine on non-compliance systems (SPY Car Act 2017, US) • Isolation of critical software systems from noncritical (SPY Car Act 2017, US) • Liability on car manufacturers and First-Tier supplier Auto Insurance • Discount on security enabled system (similar to dash cam discount) Subscription-Based M odel • Monthly payment on firewall, patches and vulnerability updates (similar to antivirus software) provided by tripartite partnership (Carmaker, chipmaker and big tech co.) Automotive cyber security no longer static • OTA will be a “must have” for ICV No photos Confidential 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend