Monday, September 24, 2012

Inside Information


After some interesting blog posts about technical stuff, it is now time to give you some inside information in the everyday proceedings at InMotion! What has happened in the mean time?

The team has recruited a couple of new team members; you can find them at our website (www.inmotion.tue.nl) where they explain their tasks in the team.  Because of these fresh recruits our old place became too small. Therefore, at the beginning of this month we moved to a new location. We received the key of a fine office space for ourselves. The office is located in the ‘Multi Media Paviljoen’, a building where several spin-off companies from the university are located.


A large number of people immediately (accidentally or not) walked into our new office and were curious about what this group of young people were up to. After a brief explanation and showing our models, they all were very enthusiastic about the project; the first meeting with the neighbors was a fact! After a number of these spontaneous visits, soon the idea of an ‘office warming’ was suggested. It will take place quickly enough! But first our office needs to be furnished.





Now, a few weeks later, we are already quite settled. Everyone has their place secured (sometimes literally). The desktops and laptops are installed and everyone has a nice place for its own. Two team member birthdays have been celebrated and the first team meetings have already taken place.

About these team meetings; quite some time of the first meetings has been spend on furnishing our crib. The place where the magic happens is already reasonably and well-furnished and we can get started, but... some people are still working to get the furnishing fit together, to make it a whole. For this, our initiator takes the initiative. The problem is that he will spend quite a lot of time to get what he wants, and he wants a lot! You can call it quite a lot of time when first a 3D model of the building is made after which also the furniture is modeled to get some idea about how to decorate the place… You can imagine that this takes some time. But nevertheless, in the Netherlands they say: "A good job needs time ', but then in Dutch of course…

Furthermore we went with our team to the Automechanika fair in Frankfurt, it began as an interesting hunt for potential partners, but ultimately it felt more like a fun team outing. The ’fun’ began with a 3.5 hour trip to Frankfurt. Every hour the initiator initiated a stop because of his back problems. This gave us the chance to have breakfast and lunch at the ‘yellow bows’ restaurants. 

After expanding our networks at the fair to the max, we went home, satisfied. Not only satisfied about our day but also in the knowledge that we are driving back at the German Autobahn: ‘Sie kÓ§nnen TAUSEND fahren!’

Thanks for reading our blog posts and do not forget to visit us some time at our new office! (http://inmotion.tue.nl/contact)

Monday, September 10, 2012

Software Challenges in Automotive



In 1978, General Motors used a Motorola 6802 CPU in the Cadillac Seville to calculate trip information (average speed\fuel usage\engine information). This is one of the first software controlled systems used within an automobile. The application calculating this information consisted of less than 10,000 lines of code. 

A few years later, the first software controlled engines were introduced. This software contained about 50,000 lines of code. Since the introduction of software solutions within automotive, the number as well as the size of these solutions grew exponentially.

These days, high end cars contain up to a hundred electronic control units running about a hundred million lines of code connected by multiple in-car computer networks. To emphasize the huge size of these solutions: the complete package of software controlling the Joint Strike Fighter (JSF) contains about 5.7 million lines of code (almost a factor 20 less)! This shift from purely mechanical to electronic solutions introduced comfort and safety increasing functions on one hand, but on the other hand it made automobiles more complex to design, test and maintain.

What about security?

The control units running this software are connected via (unsecure) computer networks, enabling them to send messages across and thereby adjusting each other’s settings. Recent research has shown the vulnerability of these networks by taking over control of the speed dial and even more important, the car's brakes. Since these interventions require a physical connection to the network, at first this doesn’t sound as an important security issue. But, additional research has shown several ways to access this network. For example by adding software to a digital music file, which while being played by the car's audio system, gets access to the car's network. This attack still requires a user of the car to connect the file to the audio system, but these days downloading mp3-files from the internet and playing them in our cars is common practice.
Another way of gaining access to the network is, through the emerging communication interfaces in a car, for example Bluetooth interfaces and internet access enabling real time traffic information. Furthermore, there exist cars that can be controlled by smartphone apps enabling users to remotely open doors and start the car’s engine to preheat it before driving. These connections can be used to gain access to the car’s network and take over control of the car. If these vulnerabilities are exploited by malicious persons, harmful situation could occur. It is interesting to note that these security issues not only apply to the automotive industry, but also to for example power plants. In June 2010 Stuxnet (a computer virus) was spread, infecting PLCs of nuclear power plants.

Protection

To be able to protect our cars from similar attacks, it is important to take security issues into account while designing the architecture of the complete electronically system of a car. Using this approach, it will be possible to identify weaknesses during design time and resolve them. For example the interfaces that somehow enable remote access to the car’s network will need to have proper authentication systems and communication needs to be encrypted. This will help solving these security issues and thereby allowing users to securely enjoy nowadays multifunctional cars.