SAE 2014 Commercial Vehicle Engineering Congress

Technical Session Schedule

Thursday, October 9

Expert Panel Discussion: CyberSecurity and the CV Ecosystem - Part 2 of 2
(Session Code: CVCS)

Room 54/56/58  1:00 p.m.

This session focuses on the critical issues around cyber-security of commercial vehicles, manned and unmanned that are moving on land. While safety is the major concern, also secure theft and asset protection, secure fleet management and protection of business models are in scope. Both connected and unconnected commercial vehicles might be targeted by attackers. so presentations will focus on recent advances, standards, best practices and potential solutions.

Organizers - Gloria D. D'Anna, Tri-Kar Advanced Technology Group, Inc; Andre Weimerskirch, University of Michigan

Time Paper No. Title
1:00 p.m. ORAL ONLY
Are Cybersecurity Vulnerabilities of Automotive Safety-Critical Electronic Control Systems applicable for Commercial Trucks?
Andre Weimerskirch, University of Michigan; Kevin Harnett, DOT/Volpe Center
1:30 p.m. ORAL ONLY
Embedded Security for Commercial Vehicles
Erdenebat Gantumur, Lars Wolleschensky, Escrypt Inc.
2:00 p.m. ORAL ONLY
Embedded Security Things I Didn't Want to Invent
Paul Bierdeman, Caterpillar Inc.
2:30 p.m. ORAL ONLY
Engineering Changes for Security
This discussion will focus on the changes that are taking place at John Deere as products are viewed in the light of embedded security.
Timothy J. Kilworth, John Deere & Co.
3:00 p.m. ORAL ONLY
Attribute Based Encryption for Commercial Vehicles
There are security and privacy concerns related to where and how information is protected with the increasingly connected and automated vehicle. It can be difficult to determine who has access to the information due to mechanics, consumers, and others having physical access to the vehicle. One solution for controlling access to data and message traffic would be to encrypt it. However, in the case of symmetric encryption, this would also involve the requirement to share the secret symmetric key with everyone in the intended audience and a single disclosure of the key could compromise the vehicle or, in the case of traditional asymmetric public key encryption, it would require encrypting multiple copies of the data using the public key of every intended recipient. An alternative to these two encryption methods would be to use functional encryption or, more specifically, attribute-based encryption.
Mark Brooks, Brian Anderson, Southwest Research Institute
3:30 p.m. ORAL ONLY
A Holistic Approach to Securing the Global Supply Chain
The presentation will address the physical security component of scanning and screening cargo coming from various intermodal transport channels, to the software and “cyber” aspect of securing the global supply chain, and the threat posed by criminals targeting carriers, ports, terminals, trucks and other transport operators.
Eileen Parise, Rapiscan Systems Inc.
4:00 p.m. ORAL ONLY
Cyber Vulnerabilities the Human Factors
In this segment we will take a look at the impact of the deviant human mind has on cyber security and how it plays the largest factor in the cyber threat landscape.
Jay C. Grant, APEX Expert Solutions LLC