• Home
  • About Carota
    • Company
    • Milestones
    • Team
    • Honors
  • Solutions
    • OTA Updates
    • Remote Diagnostics
    • VSOC Security
    • Fleet Management
    • AIoT
  • News
    • Enterprise
    • Industry
  • Partners
    • Case studies
    • Partners
  • Contact
    • Contact us
    • Join us
    • Cooperative Consultation
    • Common Problem
English 简体 繁體 日本語
  • English
  • 简体
  • 繁體
  • 日本語
  • Home
  • About Carota
    • Company
    • Milestones
    • Team
    • Honors
  • Solutions
    • OTA Updates
    • Remote Diagnostics
    • VSOC Security
    • Fleet Management
    • AIoT
  • News
    • Enterprise
    • Industry
  • Partners
    • Case studies
    • Partners
  • Contact
    • Contact us
    • Join us
    • Cooperative Consultation
    • Common Problem
  • Best moments
Homepage > News > Corporate news

System Vulnerabilities Should Not Be Underestimated: Information Security Software Enhances Vehicle Anti-Hacking

  • 新電子 Micro-Electronics
  • 2023-02-14

Author: 吳心予

 

With the increasing popularity of electric and smart vehicles, the introduction of advanced self-driving functions, and the use of car networking and OTA updates, hackers have more opportunities to attack automotive systems. A successful hack can result in the compromise of personal information and even control over the vehicle, putting the safety of drivers and passengers at risk. To combat this, international regulations have been strengthened, with the WP.29 R155 standard set to become mandatory in 2024. This has prompted automotive suppliers to keep pace with information security requirements by adhering to the ISO 21434 standard.

 

Information Security is the Foundation of Automotive Safety

 

In the past, the automotive industry primarily focused on functional safety, using specifications such as ISO 26262 to ensure the proper operation of software and hardware. However, with the increased use of connected and intelligent vehicles, the industry must now consider information security as the foundation of automotive safety. This is because even if a vehicle's software and hardware are functioning normally, it can still be vulnerable to hacking and loss of control. Kevin Huang, Manager Functional Safety/Cyber Security at DEKRA, stresses that as the trend towards software-defined vehicles evolves, it is critical for the automotive supply chain to prioritize information security to safeguard functional safety. Without it, even if a vehicle's hardware and software are confirmed to be functioning properly, hackers could still exploit vulnerabilities, causing the vehicle's systems to fail, putting drivers at serious risk.

 

Kevin Huang, Manager Functional Safety/Cyber Security at DEKRA

 

Four Main Automotive Security Threats

 

The information security risks associated with vehicles can be divided into four key areas: the car's own networking and control system, mobile phone control, back-end cloud services, and the supply chain management of automakers. Ziv, Vice President of VicOne's Automotive Cyber Threat Research Lab, explains that the first security threat comes from the car's networking and keyless functions. This vulnerability can be exploited by hackers who gain access to the car system during the connection process or remotely monitor, replay, or forge the car key, enabling them to control the car or steal the owner's personal information.

 

Ziv, Vice President of VicOne's Automotive Cyber Threat Research Lab

 

The second security threat is the connection between the mobile phone and the vehicle, or the app used to control the vehicle's functions. For instance, if a mobile phone is hacked during internet access, the hacker could control the vehicle through the phone or the app used to control the vehicle, impacting the door, window, engine, and automatic driving functions.

The third risk is related to back-end cloud services. If there is a security vulnerability in the app's back-end provided by the car manufacturer, the hacker could gain access and directly instruct the vehicle supplier, which would then be transmitted to the customer's vehicle. This could result in the hacker controlling the vehicle through the cloud service or stealing the owner's personal data. The fourth and final threat is from the supply chain, where production line/product data may be leaked in the supply chain of the vehicle manufacturer, potentially leading to the exposure of the owner's personal information.

 

Ensuring Information Security is Key for Personal Safety

 

The strategy for protecting automotive information security must start with identifying vulnerabilities early on and fixing them promptly. Edward Tsai, Vice President of Strategic Partnership at VicOne, states that personal safety is the top priority for information security protection in vehicles. While in the past, international automotive regulations focused on functional safety, it has become clear that automotive safety affects functional safety, leading to the inclusion of new information safety-related specifications in the regulations. The goal of vehicle information security protection is, after personal safety, to ensure the vehicle operates normally and protect the owner's personal information.

VicOne monitors the vehicle system through the cloud to detect potential security vulnerabilities ahead of hackers and quickly patches any abnormal information connections. If the vehicle has already been hacked, VicOne's Virtual Patch technology is used to resolve the attack, and relevant information is then provided to the vehicle manufacturer to fix the information security vulnerability.

 

Edward Tsai, Vice President of Strategic Partnership at VicOne

 

Ziv said that in the future, the need for automotive security will continue to grow, and the information security function of software has the potential to develop into a single chip. There are already hardware security modules (HSMs) for vehicles available on the market, used for authentication, keys, storage, and other tasks. In the long run, VicOne may develop exclusive automotive security chips designed to meet all automotive cybersecurity needs.

 

Ensuring the Security of OTA Updates with Encrypted Packets

 

With the increasing number of automotive features updated through over-the-air (OTA) technology, the risk of security attacks targeting the OTA update process has become a concern. To maintain the security of vehicles, it is crucial to ensure the security of OTA updates. According to Paul Wu, CEO of Carota, the complexity of software in consumer electronics and smart cars varies greatly. The code of a mobile phone has about 10 million lines, while self-driving software at Level 2+ has about 150 million to 200 million lines, and the code for Level 3 self-driving software can reach up to 300 million lines, which is 20 to 30 times more than a mobile phone. Hence, securing automotive OTA updates is much more challenging compared to securing consumer electronics.

 

Paul Wu, CEO of Carota

 

To ensure the security of automotive OTA updates, Carota uses encryption to secure the transmission between the cloud and the vehicle. This ensures that the public and private keys match, allowing for the update package to be unlocked. The differential upgrade process compares the new and old versions of the file before upgrading, only changing the parts that are different. Carota also compresses the content to be updated by 20-30 times, speeding up the overall download and upgrade time, increasing the success rate of the new version download, and reducing transmission costs for the owner.

 

Challenges in Meeting Security Regulations

 

In addition to the need for comprehensive security for the automotive supply chain, Taiwan's automotive suppliers face challenges due to a lack of familiarity with automotive standards and changes in the automotive product supply model. Kevin Huang notes that European automakers will require suppliers to meet R155 specifications starting in 2024. However, some automotive component suppliers in Taiwan, who were originally supplying consumer electronics, are not familiar with automotive safety standards. These manufacturers may have passed ASPICE and ISO 26262 but not ISO 27001 and TISAX, and they may not be familiar with the V Model development project for automobiles. Even if the suppliers meet the above specifications, ISO 21434 is a new standard for product information security, making it difficult for car manufacturers to implement in practice.

Kevin Huang further explains that in traditional product supply, suppliers develop products for vehicle manufacturers, checking requirements, architecture, code, and testing/verification to ensure the products can be used in the vehicle system. However, in the automotive information security standard, the V Model adds an extended process, requiring suppliers to monitor product application in the vehicle after development. This monitoring is necessary because the product is vulnerable to hacking after it is used, and suppliers need to continuously monitor the product even after it is sold.

 

Original article: https://www.mem.com.tw/系統漏洞不可輕忽%E3%80%80資安軟體強化車輛防駭/

分享渠道
  • Enterprise (86)
  • Industry (9)

Latest recommendation

  • MediaTek, Murata and the leading OTA provider Carota jointly launch a NB-IoT solution

    2021-06-30

  • STMicroelectronics cooperates with Carota to achieve fast and safe FOTA updates

    2020-06-23

  • Alliance between Carota and Taiwan Mobile to help companies efficiently update their IoT devices

    2020-06-01

Hot Search Terms

  • Internet of Vehicles
  • Remote Diagnosis
  • Autonomous Driving
  • OTA Upgrade

Simple Connect Simple Life

Become a core software service provider in the field of OTA over-the-air upgrade and remote diagnostic

Contact us
Footer Logo
Privacy
Terms of Use

PRIVACY

This privacy statement is to inform you what kind of information we gather when you visit our website, and what measures are taken to protect your personal information.

 

DISCLAIMER

If this website provides links to third-party websites, they are not covered by this Privacy Policy. When you link to any other website, you are subject to the privacy policy of that website. Visitors linking to another website are encouraged to examine the privacy policy of that website.

 

COLLECTION OF INFORMATION

No personally identifiable information is collected about visitors who simply browse this website or who download information from it. If you participate in a survey, sign up for a newsletter, purchase something, or send an e-mail, then mailing address, name, account information, and the contents of the e-mail and information volunteered in response to the survey or newsletter will be collected. Submitting voluntary information constitutes your consent to the use of the information for the stated purpose. Visitors who request services available through this website may be required to furnish additional information which may be required by law or which is necessary to provide the service requested. We use the personal information we collect about you on the site to provide you with the services you request and to process the transactions you authorize. We may use the information about your use of the site to improve the site and its functionality. We do not sell any of the information we collect for any purpose.

We automatically collect and store only the following information about your visit: The Internet domain and IP address from which you access our website; the type of browser and operating system used to access our site; the date and time you access our site; the pages you visit; and if you linked to our website from another website, the address of that website.

Unless it is for any of the purposes set out in the sections above, CAROTA will not disclose your personal information to any third party, except (a) with your consent; (b) as may be required by law or court order; (c) to persons or companies with whom CAROTA has contracts to carry out the internal operations of the Site or our business, or (d) we reasonably believe that they are subject to law, binding scheme, or contract which upholds principles for fair handling and adequate level of protection of personal data.

TERMS OF USE

These terms of use (hereinafter referred to as “Terms of Use”) are only applicable to the website www.carota.ai (hereinafter referred to as the “Website”) of CAROTA and its affiliates (hereinafter referred to as “CAROTA”). Please kindly note that individual pages or materials on this Website may have their own individual terms and conditions. Use of such pages or materials on the Website is subject to the aforementioned individual terms and conditions as well as the Terms of Use. In the event of any conflict between any conditions of Terms of Use and the aforementioned individual terms and conditions, such individual terms and conditions shall prevail.

 

ACCESSING THE WEBSITE

When accessing and using this Website, you are requested to comply with the following Terms of Use and all terms and conditions contained herein or any individual terms and conditions set forth on this Website and all such terms shall be deemed accepted by you. If you do not agree to all these Terms of Use, you should not use this website.

These Terms of Use may be amended by CAROTA at any time. Such amended Terms of Use shall be effective upon publication on this Website. Please kindly check the Terms of Use published on this Website regularly to ensure that you are aware of all terms governing your access and use of this Website. Other CAROTA websites may have their own Terms of Use which apply to such web sites.

 

LEGAL DISCLAIMER AND LIMITATION OF LIABILITY

ALL CONTENT AND OTHER INFORMATION MENTIONED ON THIS WEBSITE ARE PROVIDED ON AN “AS IS” BASIS. CAROTA HEREBY EXPRESSLY DISCLAIMS ANY REPRESENTATIONS OR WARRANTIES OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING WITHOUT LIMITATION WARRANTIES OF MERCHANTABILITY, FITNESS FOR ANY PARTICULAR PURPOSE, NON-INFRINGEMENT, OR AS TO THE OPERATION OF THIS WEBSITE OR THE CONTENT OR OTHER INFORMATION. CAROTA DOES NOT WARRANT OR MAKE ANY REPRESENTATIONS AS TO THE SECURITY OF THIS WEBSITE. YOU ACKNOWLEDGE ANY INFORMATION SENT MAY BE INTERCEPTED. CAROTA DOES NOT WARRANT THAT THE WEBSITE OR THE SERVERS WHICH MAKE THIS WEBSITE AVAILABLE OR ELECTRONIC COMMUNICATIONS SENT BY CAROTA ARE FREE FROM VIRUSES OR ANY OTHER HARMFUL ELEMENTS.

CAROTA does not warrant the accuracy, reliability or timeliness of any information published on the Website, nor does it endorse any content, viewpoints, products, or services linked from this Website, and shall not be held liable for any losses caused by reliance on the accuracy, reliability, or timeliness of such information. Portions of such information may be incorrect or not current. Any person or entity that relies on any information obtained from this Website does so at his or her own risk.

CAROTA reserves the right to change or update any and all content or information of the Website or the format thereof at any time without prior notice. CAROTA, at its sole discretion, reserves the right to terminate or restrict your access to the Website for any reason.

IN NO EVENT SHALL CAROTA OR ANY OF ITS AFFILIATES BE LIABLE FOR ANY DIRECT, INDIRECT, CONSEQUENTIAL, PUNITIVE, SPECIAL OR INCIDENTAL DAMAGES (INCLUDING, WITHOUT LIMITATION, DAMAGES FOR LOSS OF BUSINESS, CONTRACT, REVENUE, DATA, INFORMATION OR BUSINESS INTERRUPTION) RESULTING FROM, ARISING OUT OF OR IN CONNECTION WITH THE USE OF, OR INABILITY TO USE THIS WEBSITE OR THE CONTENT, EVEN IF CAROTA HAS BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES. ANY ACTION BROUGHT AGAINST CAROTA PERTAINING TO OR IN CONNECTION WITH THIS WEBSITE MUST BE COMMENCED AND NOTIFIED TO CAROTA IN WRITING WITHIN ONE (1) YEAR AFTER THE DATE THE CAUSE FOR ACTION AROSE. IF YOUR USE OF THE CONTENT, INFORMATION OR SERVICES FROM THE WEBSITE RESULTS IN THE NEED FOR SERVICING, REPAIR OR CORRECTION OF EQUIPMENT OR DATA, YOU ASSUME ALL COSTS THEREOF.

This Website may provide links to other websites that are not under the control of CAROTA. CAROTA shall not be responsible for the content of such other websites. CAROTA provides such links only as a convenience to the user of this Website, and the inclusion of any link to any such web sites does not imply endorsement by CAROTA of the content of such websites.

 

COPYRIGHT

Copyright and all other proprietary rights for the Website and all material mentioned on it, including but not limited to software, audio, video, text, image and photographs (hereinafter referred to as “Content”) rests with CAROTA, its affiliates or its licensors. All rights in the Content not expressly granted herein are reserved. Unless otherwise provided, the Content published on this Website may be reproduced or distributed in unmodified form for personal non-commercial use only. Any other use of the Content, including without limitation distribution, reproduction, modification, display or transmission without the prior written consent of CAROTA is strictly prohibited. All copyright and other proprietary notices shall be retained on all reproductions.

 

TRADEMARK, TRADE NAMES, TRADE DRESS, COPYRIGHT AND INTELLECTUAL PROPERTY

CAROTA’s trademarks, trade names, trade dress, copyrights and intellectual property are valuable assets and we work to diligently protect them. Accordingly, no reseller, distributor or integrator may deface or alter any CAROTA product or packaging in any way, in particular, by removing, altering or obscuring the CAROTA mark or other proprietary rights notice contained therein without CAROTA’s prior formal written approval and is strictly prohibited. Any unauthorized re-name or re-label of the Products as well as to cause the disappearance of terms customarily used to identify Products will commit infringement of CAROTA intellectual property and rights.

If you have any questions regarding trademarks, trade names, trade dress, copyrights and intellectual property, please submit your query to CAROTA.

 

GOVERNING LAW AND JURISDICTION

The Terms of Use shall be governed by and construed in accordance with the laws of the Republic of China without regard to its principles of conflict of laws. Any claims or disputes between you and CAROTA arising out of or in connection with this Website shall be subject to the exclusive jurisdiction of the District Court of Taipei, Taiwan, Republic of China.

 

EXPORT COMPLIANCE - PROHIBITED DESTINATIONS

The exportation, re-exportation, sale or supply, directly or indirectly, from the United States, or by a U.S. person wherever located of CAROTA computers, software, technology (including technical data) to Cuba, Iran, Iraq, Iran, North Korea, Libya, Sudan, Syria is strictly prohibited without prior authorization by the U.S. Government.

For more information, visit the Department of Commerce, Bureau of Industry and Security’s web page at http://www.bis.doc.gov/

About Carota
  • Company
  • Milestones
  • Team
  • Honors
Solutions
  • OTA Updates
  • Remote Diagnostics
  • VSOC Security
  • Fleet Management
  • AIoT
News
  • Enterprise
  • Industry
Contact us

  • Phone: +886-2-2712-0896
  • Address: Room 1608, 16F., No. 144, Sec. 3, Minquan E. Rd., Songshan Dist., Taipei City 105
  • E-mail: sales@carota.ai

© 2024 Carota Corp. All Rights Reserved
  • 沪ICP备20004895号-3

What do we use cookies for?

We use cookies and similar technologies to recognize your repeat visits and preferences, as well as to measure the effectiveness of campaigns and analyze traffic. 

To learn more about the information we collect, view our Privacy Policy. 

By clicking “I Accept” on this banner, or using our site, you consent to the use of cookies. 

I Accept