Desay's Cyber 输入您的封面 Autonomous Vehicle Development...

24
点击此处 输入您的封面 标题 Confidential Desay's Cyber Security Initiative & Autonomous Vehicle Development Ewe TeikEng 29 March 2018 DESAY SV AUTOMOTIVE

Transcript of Desay's Cyber 输入您的封面 Autonomous Vehicle Development...

Page 1: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

点击此处输入您的封面

标题

Confidential

Desay's CyberSecurity Initiative &

Autonomous VehicleDevelopment

E w e Te i k E n g

2 9 M a r c h 2 0 1 8

D E S AY S VA U T O M O T I V E

Page 2: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 2

Contents l INTRODUCTION

l DESAY’S CYBER SECURITY INITIATIVE

l DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT

l CHALLENGES

l FUTURE TREND

Page 3: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 3

Contents l INTRODUCTION

Ø DESAY SV AUTOMOTIVE IN A GLANCE

Ø DEVELOPMENT OF CAR INDUSTRY IN CHINA

Ø EVOLUTION OF AUTOMOTIVE ELECTRONICS

Ø AUTONOMOUS DRIVING IN CHINA

Page 4: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 4

DESAY SV AUTOMOTIVE IN A GLANCE

Mission: To provide innovative, competitive and smartautomotive products and services to our customers.

30%Navigation in OEM marketshare reaches 30%

10Production quantity in2015 exceeded 10million sets

million

1986Founded in 1986

车载信息娱乐系统77%

车身信息与控制16%

T/O in 2015

Page 5: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 5

PRODUCT PORTFOLIO

Display Module & System

Driver InformationDisplay

Climate Control

Radio & Navigation

Advanced Driver AssistanceSystem

Page 6: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 6

DEVELOPMENT OF CAR INDUSTRY IN CHINA

The Beginning(1952)• Military Needs• FAW JieFang

CA-30• Russian

Technology

Market Liberation(1984)• JV with the West• Toyota, Nissan,

Daihatsu AMC,Chrysler, VW,Citroen,Hyundai,Peugeot

Local Branding(1994)• Originated from

defense industry• Geely, Great

Wall, ChanganMotors,Changhe, Hafei

New EnergyVehicle (2011)• Initiated in 10th 5

year plan• SOP at 2011,

>500k unit on2016

• 1.7 million uniton Dec 2017

Becoming worldNo.1 vehicleproducer since 2009

Page 7: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 7

EVOLUTION OF AUTOMOTIVE ELECTRONICS

Page 8: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 8

AV TECHNOLOGY DEVELOPMENT IN CHINA

1992 2003 2009 2015 2016 2017

CITAVT-I developed byNUDT

NUDT and FAW jointdeveloped AutomaticOvertaking on HongQi

CA-7460

NSFC rolled out IVFC challenge throughits through its major research plan,“Cognitive Computing of Visual and

Auditory Information.”

The State Council published“Made in China 2025”, listed AVas future automotive industry

transformation direction

Major player like BAIC,FAW and SAIC triggered

its AV program

Baidu debuts Apollo

Page 9: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 9

Policy Drive for ICV in China

Event Date Impact

<Made in China 2025> May2015

The first government policy that clearly defined ICV as futuretransformation direction for automotive industry

<Equipment ManufacturingStandardization and QualityImprovement Plan>

April2016

Commencement of standardization work on ICV industry

<National AutomotiveIndustry Medium-Long TermDevelopment Plan>

Jun2017

Increase support for R&D, push for broadband infrastructuredevelopment and cross industrial development of big data sharingplatform for automotive, accelerate the construction of cybersecurity & traffic safety system development

<National Standards Systemof Telematics Industry(Intelligent & ConnectedVehicles)> – draft

Jun2017

Establish intelligent & connected vehicle industry based on “Car asthe core, integration of intelligent capability as main aim, secondedby connectivity effort”

<Development Plan on theNew Generation of ArtificialIntelligence>

July2017

Advocate open and coordinated innovative AI system, elevate AIindustry into the global high-end value chain, Research coordinationsensing and interaction aimed at autonomous unmanned systems

Page 10: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 10

Contents l INTRODUCTION

l DESAY’S CYBER SECURITY INITIATIVE

Ø APPROACHES TAKEN

Ø ORGANIZATION STRUCTURE

Page 11: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 11

DESAY’S CYBER SECURITY INITIATIVE

Desay SV initiates cyber security efforts in 2 prong approach:

Security by design• Product design with security in mind• SPDLC (Secured Product Development Life Cycle)• Introduction of VAPT (Vulnerability Assessment & Penetration Test) as part of

product verification process• Research on countermeasures

Operational & Incident Response Architecture• Regular firmware update through FOTA (Firmware Over The Air)• Shared intelligence on threat and vulnerabilities with OEMs• Formation of Incident Response Team

Page 12: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 12

Countermeasure Research &Application

Incident Response

Cyber-physical System Security

Vulnerability Assessment &Penetration Testing

ORGANIZATION STRUCTURE

Page 13: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 13

Contents l INTRODUCTION

l DESAY’S CYBER SECURITY INITIATIVE

l DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT

Ø PRODUCT PORTFOLIO

Ø PRODUCT ROADMAP

Ø SYSTEM ARCHITECTURE

Page 14: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

14

Hardware

Desay SV Products

NetworkCommunication

· GPS Positioning· Telematics Communication· E-Call

EmbeddedComputing Unit

· Autonomous DrivingAlgorithm

Front ViewCamera

· Augmented Navigation· Object Detection· Lane Change Assistance

· Parking Assistance· All Surround View· Blind Spot Detection

Surround ViewCamera

Radar

· Advance DriverAssistance· Anti-collision· Active Cruise Control

Ti TDA2X

IPC

Nvidia Drive PX2

Ultrasonic

Lidar

Page 15: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 15

Autonomous Driving Product Roadmap

Page 16: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 16

Development & Implementation

PerceptionPerception LocalizationLocalization MotionPlanningMotion

PlanningTrajectory

ControlTrajectory

ControlDriving

StrategyDriving

Strategy HD MapHD Map V2XV2X

SVMSVM LDWLDW

BSDBSD FCWFCW

ACCACC AEBAEB

APAAPA LKALKA

Highway PilotSystem

Highway PilotSystem

Traffic JamAssist

Traffic JamAssist

ConditionalAutonomous

Driving System

ConditionalAutonomous

Driving SystemFull AutonomousDriving System

Full AutonomousDriving System

Development of Autonomous Driving Vehicle Technologies

Development of ADAS Products

Development of ADAS Systems

Front View Camera 24G Hz Radar 77G Hz Radar Surrounding View Module T-box

…..

…..

Page 17: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 17

Middleware

Data Logging

Simulation

System Level

V2X

Security

Localization

GPS+IMU+Encoder

3D Map-Based Matching

2D map + Local Correction

HD Map

Data Capturewith veh Team

Manual Labeling Semi-Auto/ Autolabeling

Cloud-SourceData Capture

Sensor Fusion

Lidar+Camera

Radar+Camera

Lidar+ Radar+Camera

Perception

Radar

Traditionalimage

High-res radar

Traditionalmoving-obj

detect

Lidar(2.5D/3D/SS)

TraditionalPointCloud

Deep LearningPointCloud

Camera(Mono/Stereo)

Deep LearningImage

Navigation

Path Planning

Rules-based Behaviour Decision

Control (Model-based)

Learning-based Behavior Decision

SYSTEM ARCHITECTURE

Page 18: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 18

Contents l INTRODUCTION

l DESAY’S CYBER SECURITY INITIATIVE

l DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT

l CHALLENGES

Page 19: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 19

DESAY’S CHALLENGES AS FIRST TIER SUPPLIER

• ~38.5DMIPS, Quad Core, V2X, Vehicle Ethernet, Linux, Android

Ever-more sophisticated systems & massive software components

• No detailed guideline on design, verification and acceptance criteria

No single comprehensive legislative framework for subsystem

• “Wait-and-see” approach by carmaker• Node ID assignment / Network configuration is held by system integrator• Underestimate the potential threat, assuming that external pentest and patching is sufficient to cover the

vulnerabilities• Only basic cyber security requirement, e.g. secure boot, TEE, etc.

No clear guideline from automobile manufacturers (as final systemintegrator), particularly Chinese carmaker

• Japan vs German vs US vs China

Huge gap in cyber security requirements amongst automobilemanufacturers

Page 20: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 20

DESAY’S CHALLENGES AS FIRST TIER SUPPLIER

•Careless, no culture of cybersecurity•Not well-informed of latest threats

Awareness on end-user (car driver)

•OEMs reluctant to absorb cost incur by secured design•Additional ~USD2-5/unit for secured design

Cost

•Most major car manufacturers do not allow first tier to perform FOTA due to functional safety concern

Acceptance of FOTA by car manufacturers

•In event of hacked car, who shall be held accountable?

Vague Accountability

•Most of the security expert lack of interest/knowledge in embedded systems

Talent gap in cyber-physical security

Page 21: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 21

Contents l INTRODUCTION

l DESAY’S CYBER SECURITY INITIATIVE

l DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT

l CHALLENGES

l FUTURE TREND

Page 22: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 22

FUTURE OF CYBER SECURITY IN AUTOMOTIVE

• Impose fine on non-compliance systems (SPY Car Act 2017, US)• Isolation of critical software systems from noncritical (SPY Car Act 2017, US)• Liability on car manufacturers and First-Tier supplier

Legislative trend

• Discount on security enabled system (similar to dash cam discount)

Auto Insurance

• Monthly payment on firewall, patches and vulnerability updates (similar to antivirus software)provided by tripartite partnership (Carmaker, chipmaker and big tech co.)

Subscription-Based Model

• OTA will be a “must have” for ICV

Automotive cyber security no longer static

Page 23: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

No photos Confidential 23

FUTURE OF CYBER SECURITY IN AUTOMOTIVE

• Sharing of threats and vulnerability data amongst OEMs, supplier or evenauthorities

Alliance

• Physical isolation of infotainment/telematics from powertrain/vehicle controldomain

Design (Air gaps)

• Reintroduction of basic analog control path and mechanical control asredundancy

• Activated during recovery mode, or “limp home mode”

“Manual” Mode

Page 24: Desay's Cyber 输入您的封面 Autonomous Vehicle Development 标题securify.sce.ntu.edu.sg/SGCRC2018/slides/Desay_Cyber_AV.pdf · industry into the global high-end value chain,

Official Website WeChat public account

THANK YOU