Please login to view the entire Verification Horizons article.
Please register or login to view.
The number one priority in vehicle security is to harden the root-of-trust; from which everything else—the hardware, firmware, OS, and application layer’s security—is derived. If the root-of-trust can be compromised, then the whole system is vulnerable. In the near future the root-of-trust will effectively be an encryption key—a digital signature for each vehicle—that will be stored in a secure memory element inside all vehicles. In this article we will show how a mathematical, formal analysis technique can be applied to ensure that this secure storage cannot (A) be read by an unauthorized party or accidentally “leak” to the outputs or (B) be altered, overwritten, or erased by unauthorized entities. We will include a real-world case study
...