desay's cyber 输入您的封面 autonomous vehicle development...
TRANSCRIPT
点击此处输入您的封面
标题
Confidential
Desay's CyberSecurity Initiative &
Autonomous VehicleDevelopment
E w e Te i k E n g
2 9 M a r c h 2 0 1 8
D E S AY S VA U T O M O T I V E
No photos Confidential 2
Contents l INTRODUCTION
l DESAY’S CYBER SECURITY INITIATIVE
l DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT
l CHALLENGES
l FUTURE TREND
No photos Confidential 3
Contents l INTRODUCTION
Ø DESAY SV AUTOMOTIVE IN A GLANCE
Ø DEVELOPMENT OF CAR INDUSTRY IN CHINA
Ø EVOLUTION OF AUTOMOTIVE ELECTRONICS
Ø AUTONOMOUS DRIVING IN CHINA
No photos Confidential 4
DESAY SV AUTOMOTIVE IN A GLANCE
Mission: To provide innovative, competitive and smartautomotive products and services to our customers.
30%Navigation in OEM marketshare reaches 30%
10Production quantity in2015 exceeded 10million sets
million
1986Founded in 1986
车载信息娱乐系统77%
车身信息与控制16%
T/O in 2015
No photos Confidential 5
PRODUCT PORTFOLIO
Display Module & System
Driver InformationDisplay
Climate Control
Radio & Navigation
Advanced Driver AssistanceSystem
No photos Confidential 6
DEVELOPMENT OF CAR INDUSTRY IN CHINA
The Beginning(1952)• Military Needs• FAW JieFang
CA-30• Russian
Technology
Market Liberation(1984)• JV with the West• Toyota, Nissan,
Daihatsu AMC,Chrysler, VW,Citroen,Hyundai,Peugeot
Local Branding(1994)• Originated from
defense industry• Geely, Great
Wall, ChanganMotors,Changhe, Hafei
New EnergyVehicle (2011)• Initiated in 10th 5
year plan• SOP at 2011,
>500k unit on2016
• 1.7 million uniton Dec 2017
Becoming worldNo.1 vehicleproducer since 2009
No photos Confidential 7
EVOLUTION OF AUTOMOTIVE ELECTRONICS
No photos Confidential 8
AV TECHNOLOGY DEVELOPMENT IN CHINA
1992 2003 2009 2015 2016 2017
CITAVT-I developed byNUDT
NUDT and FAW jointdeveloped AutomaticOvertaking on HongQi
CA-7460
NSFC rolled out IVFC challenge throughits through its major research plan,“Cognitive Computing of Visual and
Auditory Information.”
The State Council published“Made in China 2025”, listed AVas future automotive industry
transformation direction
Major player like BAIC,FAW and SAIC triggered
its AV program
Baidu debuts Apollo
No photos Confidential 9
Policy Drive for ICV in China
Event Date Impact
<Made in China 2025> May2015
The first government policy that clearly defined ICV as futuretransformation direction for automotive industry
<Equipment ManufacturingStandardization and QualityImprovement Plan>
April2016
Commencement of standardization work on ICV industry
<National AutomotiveIndustry Medium-Long TermDevelopment Plan>
Jun2017
Increase support for R&D, push for broadband infrastructuredevelopment and cross industrial development of big data sharingplatform for automotive, accelerate the construction of cybersecurity & traffic safety system development
<National Standards Systemof Telematics Industry(Intelligent & ConnectedVehicles)> – draft
Jun2017
Establish intelligent & connected vehicle industry based on “Car asthe core, integration of intelligent capability as main aim, secondedby connectivity effort”
<Development Plan on theNew Generation of ArtificialIntelligence>
July2017
Advocate open and coordinated innovative AI system, elevate AIindustry into the global high-end value chain, Research coordinationsensing and interaction aimed at autonomous unmanned systems
No photos Confidential 10
Contents l INTRODUCTION
l DESAY’S CYBER SECURITY INITIATIVE
Ø APPROACHES TAKEN
Ø ORGANIZATION STRUCTURE
No photos Confidential 11
DESAY’S CYBER SECURITY INITIATIVE
Desay SV initiates cyber security efforts in 2 prong approach:
Security by design• Product design with security in mind• SPDLC (Secured Product Development Life Cycle)• Introduction of VAPT (Vulnerability Assessment & Penetration Test) as part of
product verification process• Research on countermeasures
Operational & Incident Response Architecture• Regular firmware update through FOTA (Firmware Over The Air)• Shared intelligence on threat and vulnerabilities with OEMs• Formation of Incident Response Team
No photos Confidential 12
Countermeasure Research &Application
Incident Response
Cyber-physical System Security
Vulnerability Assessment &Penetration Testing
ORGANIZATION STRUCTURE
No photos Confidential 13
Contents l INTRODUCTION
l DESAY’S CYBER SECURITY INITIATIVE
l DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT
Ø PRODUCT PORTFOLIO
Ø PRODUCT ROADMAP
Ø SYSTEM ARCHITECTURE
14
Hardware
Desay SV Products
NetworkCommunication
· GPS Positioning· Telematics Communication· E-Call
EmbeddedComputing Unit
· Autonomous DrivingAlgorithm
Front ViewCamera
· Augmented Navigation· Object Detection· Lane Change Assistance
· Parking Assistance· All Surround View· Blind Spot Detection
Surround ViewCamera
Radar
· Advance DriverAssistance· Anti-collision· Active Cruise Control
Ti TDA2X
IPC
Nvidia Drive PX2
Ultrasonic
Lidar
No photos Confidential 15
Autonomous Driving Product Roadmap
No photos Confidential 16
Development & Implementation
PerceptionPerception LocalizationLocalization MotionPlanningMotion
PlanningTrajectory
ControlTrajectory
ControlDriving
StrategyDriving
Strategy HD MapHD Map V2XV2X
SVMSVM LDWLDW
BSDBSD FCWFCW
ACCACC AEBAEB
APAAPA LKALKA
Highway PilotSystem
Highway PilotSystem
Traffic JamAssist
Traffic JamAssist
ConditionalAutonomous
Driving System
ConditionalAutonomous
Driving SystemFull AutonomousDriving System
Full AutonomousDriving System
Development of Autonomous Driving Vehicle Technologies
Development of ADAS Products
Development of ADAS Systems
Front View Camera 24G Hz Radar 77G Hz Radar Surrounding View Module T-box
…..
…..
No photos Confidential 17
Middleware
Data Logging
Simulation
System Level
V2X
Security
Localization
GPS+IMU+Encoder
3D Map-Based Matching
2D map + Local Correction
HD Map
Data Capturewith veh Team
Manual Labeling Semi-Auto/ Autolabeling
Cloud-SourceData Capture
Sensor Fusion
Lidar+Camera
Radar+Camera
Lidar+ Radar+Camera
Perception
Radar
Traditionalimage
High-res radar
Traditionalmoving-obj
detect
Lidar(2.5D/3D/SS)
TraditionalPointCloud
Deep LearningPointCloud
Camera(Mono/Stereo)
Deep LearningImage
Navigation
Path Planning
Rules-based Behaviour Decision
Control (Model-based)
Learning-based Behavior Decision
SYSTEM ARCHITECTURE
No photos Confidential 18
Contents l INTRODUCTION
l DESAY’S CYBER SECURITY INITIATIVE
l DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT
l CHALLENGES
No photos Confidential 19
DESAY’S CHALLENGES AS FIRST TIER SUPPLIER
• ~38.5DMIPS, Quad Core, V2X, Vehicle Ethernet, Linux, Android
Ever-more sophisticated systems & massive software components
• No detailed guideline on design, verification and acceptance criteria
No single comprehensive legislative framework for subsystem
• “Wait-and-see” approach by carmaker• Node ID assignment / Network configuration is held by system integrator• Underestimate the potential threat, assuming that external pentest and patching is sufficient to cover the
vulnerabilities• Only basic cyber security requirement, e.g. secure boot, TEE, etc.
No clear guideline from automobile manufacturers (as final systemintegrator), particularly Chinese carmaker
• Japan vs German vs US vs China
Huge gap in cyber security requirements amongst automobilemanufacturers
No photos Confidential 20
DESAY’S CHALLENGES AS FIRST TIER SUPPLIER
•Careless, no culture of cybersecurity•Not well-informed of latest threats
Awareness on end-user (car driver)
•OEMs reluctant to absorb cost incur by secured design•Additional ~USD2-5/unit for secured design
Cost
•Most major car manufacturers do not allow first tier to perform FOTA due to functional safety concern
Acceptance of FOTA by car manufacturers
•In event of hacked car, who shall be held accountable?
Vague Accountability
•Most of the security expert lack of interest/knowledge in embedded systems
Talent gap in cyber-physical security
No photos Confidential 21
Contents l INTRODUCTION
l DESAY’S CYBER SECURITY INITIATIVE
l DESAY’S AUTONOMOUS VEHICLE DEVELOPMENT
l CHALLENGES
l FUTURE TREND
No photos Confidential 22
FUTURE OF CYBER SECURITY IN AUTOMOTIVE
• Impose fine on non-compliance systems (SPY Car Act 2017, US)• Isolation of critical software systems from noncritical (SPY Car Act 2017, US)• Liability on car manufacturers and First-Tier supplier
Legislative trend
• Discount on security enabled system (similar to dash cam discount)
Auto Insurance
• Monthly payment on firewall, patches and vulnerability updates (similar to antivirus software)provided by tripartite partnership (Carmaker, chipmaker and big tech co.)
Subscription-Based Model
• OTA will be a “must have” for ICV
Automotive cyber security no longer static
No photos Confidential 23
FUTURE OF CYBER SECURITY IN AUTOMOTIVE
• Sharing of threats and vulnerability data amongst OEMs, supplier or evenauthorities
Alliance
• Physical isolation of infotainment/telematics from powertrain/vehicle controldomain
Design (Air gaps)
• Reintroduction of basic analog control path and mechanical control asredundancy
• Activated during recovery mode, or “limp home mode”
“Manual” Mode
Official Website WeChat public account
THANK YOU