《以太网安全:效果如何?.pdf》由会员分享,可在线阅读,更多相关《以太网安全:效果如何?.pdf(20页珍藏版)》请在三个皮匠报告上搜索。
1、PUBLICNXP,THE NXP LOGO AND NXP SECURE CONNECTIONS FOR A SMARTER WORLD ARE TRADEMARKS OF NXP B.V.ALL OTHER PRODUCT OR SERVICE NAMES ARE THE PROPERTY OF THEIR RESPECTIVE OWNERS.2023 NXP B.V.Copyrights 2023 Garrett Motion Inc.I E E E E t h e r n e t&I P Te c h D a y s S e p t e m b e r 2 0 2 3Rajeev Ro
2、y,NXPBalaji Arumugam,GarrettEthernet Security-how effective is it?1PUBLICOVERVIEWEvolving network architecture and security challengesHolistic view-setting the contextThe Ethernet AngleSecure InterfacesSecure DomainSecure NetworksSecure Infrastructure(processing)2PUBLICVEHICLE ARCHITECTURE EVOLVING
3、ACROSS DOMAIN AND ZONE AXISDOMAIN BASED VEASDV-OPTIMIZED VEABODY ZONAL VEACROSS-DOMAIN ZONAL VEAGatewayADASChassisBodyIVIDrivetrainADASIVIDrivetrainBody+GatewayBodyZoneBodyZoneBodyZoneBodyZoneADASIVIVehicle ComputerX-domainZoneX-domain zoneX-domain zoneADASIVIVehicle ComputerzoneZoneZoneZonezoneZone
4、X-domain zoneWHY ARE THE SECURITY CHALLENGES INCREASING FOR SDV?3PUBLICSECURITY-WHY ARE THE CHALLENGES INCREASING?Surface area for attacks is increasing-both in-car and out of the carContinuously evolving landscape of attacks and attack types4PUBLICHOLISTIC APPROACH-SETTING THE CONTEXTPREVENTACCESSD
5、ETECTATTACKSREDUCEIMPACTFIX VULNERABILITIESSECURENETWORKSSecure MessagingMessage Filtering&Rate LimitationSECUREPROCESSINGCode/Data Authentication(run-time)Code/Data Authentication(start-up)Resource Control(virtualization)SECUREENGINEERINGThreat Monitoring,Intelligence Sharing,SDLC incl.Security Rev
6、iews&Testing,Incident Management/ResponseSecurity-Aware Organization,Policies,GovernanceSECUREINTERFACESM2M Authentication&FirewallingSecure Ranging(UWB)SECUREDOMAIN ISOLATIONFirewalling,VLAN,Separated Functional DomainsSecure UpdatesNetwork Intrusion Detection Systems(NIDS)5PUBLICSECURE INTERFACES-