How does car compasses chip make information install entire new defense line

How does car compasses chip make information install entire new defense line

[introduction]As the flying development of car of intelligent network couplet, truckload electric framework is experiencing the electron from distributed ECU framework to region / the heavy revolution of framework of Chinese style of the collect central, in the meantime, the plan of unifinication of cloud road car that is based on V2X also is in progressively be born. However, couplet technology is in intelligent network to be brought to people life convenient while, also brought more complex with problem of severe car network safety.

As the flying development of car of intelligent network couplet, truckload electric framework is experiencing the electron from distributed ECU framework to region / the heavy revolution of framework of Chinese style of the collect central, in the meantime, the plan of unifinication of cloud road car that is based on V2X also is in progressively be born. However, couplet technology is in intelligent network to be brought to people life convenient while, also brought more complex with problem of severe car network safety.

In recent years, accident frequency sends car network safety: 2015, jeep cuts Nuo radical to be held remotely to accuse by the hacker greatly, the apply the brake that controls a car through ill will of CAN bus line, change direction, motivation, for this FCA recall 1.4 million cars; 2018, tesla Autopilot system is atttacked; 2021, model3 is inbreaked to extract by the hacker those who resemble a head is photograph to film inside the car picture. . . . . . These case, highlighted the pressing sex of problem of car network safety.

Below the big setting of car of intelligent network couplet, the car hour that receives a network has the risk that is atttacked by the hacker, data is the privacy safety of car user, safe even life safety is browbeaten. Accordingly, plant of each old lead plane (OEM) and one class supplier (fill of Tier1) pressing hope the safety of this respect is blank, in order to ensure the car is complete the safety of lifecycle.

Car compasses chip regards a car as the cornerstone that each software function realizes, its information safety design is crucial.

One.  The information safety design of car compasses chip thinks

The information safety design of car compasses chip is complex and multidimensional spent process, the information security service that need defends from the information safety of chip itself ability, chip is offerred accords with current requirement, and the design technological process of chip information safety accords with a country / these 3 respects undertake international standard think in the round.

Safety of 1. chip hardware defends ability

Car compasses chip regards a car as the cornerstone that each software function realizes, must have resist the ability of foreign charge. This basically involves two aspects: Hardware safety problem and hardware accredit problem.

Above all, be aimed at hardware safety problem. We need to consider hardware to be below different layer class (Chip or the attack that PCB) may suffer, if trojan of side channel charge, hardware is atttacked,wait. To answer these charge, need atttacks method proceed with from familiar hardware, establish relevant preventive measure. For example, introduce promiscuous technology to reduce a letter comparing of a confusion of voices, increase specific sensor to wait to voltage undertake monitoring, introduce PUF technology to come true right given the input arises cannot the only facility of clone is answered etc.

ECU board level is common attack method

Converse project: Through tearing open a lid to ECU, converse answer the quarter hardware framework that recombines a PCB level and communication framework.

Bus line bougie: Hang a needle through embarking on systematic bus line, through physics the visit collects sensitive information (close key, firmware) etc.

Hardware physics distorts: Distort through hardware the function that gets protection, the famousest is Modchip distorts astral catenary.

Chip level is common attack method

Hardware trojan: The intended and embedded special module when design or making chip or the blemish module that the architect leaves innocently, spark in special condition below, this module can be used to be opposite by aggressor chip is caused destroy.

Side channel atttacks: Also call edge channel attack (Side Channel Attack) , the physical quantity of channel of of all kinds side when through collecting the analysis adds close software or hardware is working will undertake defeating solving. Have commonly: SPA (Simple Power Analysis) , DPA(Differential Power Analysis) , SEMA (Simple Electromagnetic Analysis) , DEMA(Differential Electromagnetic Attack) , Timing Attacks, DFA(Differential Fault Analysis) .
Breakdown infuse atttacks: The error is caused intentionally in the system, endanger the attack of systematic safety. Common method has voltage of change chip power supply, infuse irregular clock signal, introduce radiation or electromagnetism (EM) interference, heating installation.

In car compasses MCU, one of the most significant preventive measure introduce HTA(Hardware Trust Anchor) when chip is designed namely. HTA provided a kind of segregation environment that is based on hardware safety mechanism, OK and effective protection is safe and sensitive data, serve to apply control algorithm to offer all sorts of passwords. The HTA sort with at present common market has SHE, HSM and TPM to wait.

Next, be aimed at hardware accredit problem, we need to build safety of hauling sth resembling a net to run a system from enterprise interior, had done supply catenary to give letter government, in order to ensure the information of product complete lifecycle is safe. This includes to be in the complete lifecycle of hardware system, all have from the process such as design, production, test strict supplier manages and award letter mechanism, avoid occurrence accredit problem.
The information security service of 2. chip accords with current requirement

The core of car information safety is the confidential sex that assures use main body, integrality and authenticity (CIA) . Accordingly, car compasses chip needs to offer a series of information security service will satisfy these current requirement.

Above all, safe memory is one of core functions of car compasses chip. It needs to provide an authentic environment, use at memory sensitive information, wait like close key, certificate. For example Secure NVM (safe blame breaks sexual memory easily) it is environment of such an authentic memory, can ensure the security of sensitive information and dependability.

Next, differ to satisfy the function requirement that imposes close algorithm, car compasses chip still needs to provide accelerator of corresponding password algorithm hardware and function of close key management. These services include but not be confined to:

Accelerator of hardware of ● symmetrical password: The data that is based on illicit close key is added decode, if AES is algorithmic, can provide high speed, security add close decode a service;

● is asymmetrical password hardware accelerator: Use at autograph of digital sign one’s name, check and data to add decode wait for an operation, ensure the integrality of data and authenticity;

Accelerator of ● summary hardware: Commonly used wait for setting at data integrality examination and identity test and verify, if be based on the HMAC algorithm of the summary, can provide service of fast, accurate identity test and verify;

● close key governs a function: Include close key to guide, close key talks things over, the operation such as close key derive, keep secret the safety of key is generated truly, store and use etc.

In addition, to measure and assure the integrality of whole ECU system and usability, car compasses chip still needs to offer safety is started and start authoritatively wait for a function. These functions can ensure ECU system is in the process that start be not distorted by ill will or destroy, what assure a car thereby is normal move and security.

How does car compasses chip make information install entire new defense line

The information safety solution of chip level

Technological process of design of program of 3. information security accords with a country / international standard

As laws and regulations of car network safety ceaseless and perfect, in July 2022, u.N. Economic Commission Europe (UNECE) rolled out laws and regulations of safety of first car network formally R155 code asks, the model that the requirement appears on the market in the European Union must obtain attestation of specific model type (VTA) , and before this, car look forward to must satisfy contented network safety to run a system (CSMS) requirement, obtain corresponding attestation.

National level ” the car is truckload information security technology asks ” will plan to carry out on January 1, 2026, when the information security technology that designing chip because of this chip industry, must consult these code and standard, ensure the product accords with the requirement of country and international.

Among them the most important one link is a proposal the network safety that builds enterprise interior runs a system (Cyber Security Management System) . This one system can ensure chip industry is in design process, the respect such as safe to information processing, development management, production management, supplier management and risk management, it is the requirement that accords with flow system and legal laws and regulations.

How does car compasses chip make information install entire new defense line

Framework of system of CSMS complete lifecycle

Undertake the design of information security aspect to chip through fastening framework and flow according to this an organic whole, chip industry can make a complete documentation material. These material will conduce to supplier of OEM, Tier1 accelerating R155 or ” the car is truckload information security technology asks ” attestation process, thereby the faster product that asks coincidence method compasses is pushed to the market.

2.  Functional security and information are safe

The security of the car covered two core direction: Functional security and information are safe.

Functional security is main focusing is endangered potentially at what cause because of breakdown of electronic electrical system. Its are main the target is the undeserved risk that prevents this kind of breakdown to bring about. Commonly used analysis method, if the HARA such as fault tree is analysed, can help the only place that identifies a likelihood to cause a harm and be no longer in force of many bits of random hardware, install necessary safety to defend accordingly mechanism.

Information safety emphasizes network of attention ill will to atttack the menace that privacy of safe to personal property, data and car operation constitute. The authenticity that its core looks is to assure data, integrality and confidential sex (CIA) , avoid the undesirable enroach on that accepts the external world thereby. Here, the method such as the TARA analysis such as attack tree becomes the key that identifies preventive measure of safety of information of flaw, aggrandizement.

Functional security and network safety complement each other, build system of integral car security to produce main effect for compose jointly.

The chip that innovates 20 years continuously as classics of an all previous designs a company, core sea science and technology precedes by right of industry ” imitate signal catenary + MCU ” advantage of double platform technology, successful already compose builds the modes of life and relation to their environment of car electron product that a seriation, platform changes. The company passed security of ISO26262 ASIL-D function to manage systematic attestation not only at present, the imitate signal catenary that still rolled out much money to accord with AEC-Q100 attestation and product of car compasses MCU, maintain close cooperation to concern with numerous and banner Tier1 supplier.

Challenge in the light of safety of austere car intelligence network, the overall quality that core sea science and technology is perfected continuously and optimized a company runs a system, can satisfy each requirement of ISO\SAE21434 standard in order to ensure. The solution of complete information safety that the company sets out from chip level, devote oneself to to satisfying R155 code for OEM manufacturer the respect provides strong support.
In content couplet net, car couplet net of swift and violent development current, the information safety that faces nowhere to be absent is minatory, we believe to have powerful message safety to defend the ability of car compasses chip of ability provides true safeguard for car of intelligent network couplet only. Core sea science and technology devotes oneself to the technology of car compasses chip with research and development and more advanced innovation, manufacturer of the OEM that help strength builds hard defense line, become the powerful motive force that urges enterprise and society to develop ahead.

Article origin: Core sea science and technology

Avoid duty statement: The article is reprint an article, reprint this article purpose to depend on passing more information, the person that copyright puts in original work ‘s charge is all. If involve work copyright issue,article place uses video, picture, written language, contact please small make up undertake handling.

Recommend read:

RTC production note and stop brace up theoretical analysis

Use MSO6 fastens oscillograph to undertake annulus road answers a test

Meaning law semiconductor is new car rule is only converter faces a synchronous step-down application of light load, low noise and electric segregation power source

Use Wi – Fi HaLow receives a point, promotion intelligence lives in an experience

One article masters integrated circuit to enclose hot emulation point

Leave a Reply

Your email address will not be published. Required fields are marked *