Engineering – AIS Home | Assured Information Security https://www.ainfosec.com Thu, 08 Jun 2023 19:36:38 +0000 en-US hourly 1 https://wordpress.org/?v=6.6.2 https://www.ainfosec.com/wp-content/uploads/2022/10/cropped-ais-icon-1-32x32.png Engineering – AIS Home | Assured Information Security https://www.ainfosec.com 32 32 Secure Embedded Systems – The Future of Autonomous Trucking Depends on It https://www.ainfosec.com/secure-embedded-systems-the-future-of-autonomous-trucking-depends-on-it?utm_source=rss&utm_medium=rss&utm_campaign=secure-embedded-systems-the-future-of-autonomous-trucking-depends-on-it Wed, 06 Oct 2021 19:57:01 +0000 https://www.ainfosec.com/?p=13725 ...]]>

Self-driving vehicles are no longer a thing of the future. In fact, they’re here and ready to hit the road. However, experts say that the most likely place for this technology to become commonplace is not in the everyday SUV, but in heavy trucking.

It was recently reported by Pitchbook that in the first half of 2021, $5.6 billion has been invested into Autonomous Trucking (AT). There are a number of reasons autonomous technology makes sense for the trucking industry, including the massive labor shortage it’s been facing for decades. This unique technology has the potential to transform the industry. The majority of autonomous driving is via the highway, where a truck is maintaining speed for many miles making the occasional pass or highway stop. However, the technology will reach a level of maturity where even complex maneuvering won’t be an issue for an AT system, and it’s expected to reach approximately 50 percent of vehicle population on the road.  

With the increased reliance on complex networks of embedded systems, buses, software and protocols, Original Equipment Manufacturers (OEMs) and freight manufacturers need to remain vigilant for the potential threat their systems face to cyber-attacks and adopt a proactive approach to security. Here are a few steps OEMs can take today to ensure their AT systems are ready for the commercial market: 

Undergo a Design and Security Architecture Review 

Before you finalize a vehicle’s system, ensure it’s designed with today’s – and tomorrow’s – emerging threats in mind. This will not only give you peace of mind, but will strengthen your brand’s reputation for safety.  

Evaluate Your System’s Functionality 

It’s important that your system meets defined requirements that ensure standard or malicious inputs are considered.   

Get a Penetration Test 

Every dependency, interaction and subcomponent within your system should be evaluated by a third party in order to identify all possible means in which it could be compromised. 

Take action. Learn more about what AIS can do to ensure your products’ embedded systems remain secure. AIS is a leading cybersecurity partner for several OEMs and other large companies throughout the transportation sector with capabilities that extend from secure system design to testing and implementation. See our expertise in action here 

]]>
Vehicle Cybersecurity – Understand What’s at Stake https://www.ainfosec.com/vehicle-cybersecurity-understand-whats-at-stake?utm_source=rss&utm_medium=rss&utm_campaign=vehicle-cybersecurity-understand-whats-at-stake Mon, 27 Sep 2021 19:36:16 +0000 https://www.ainfosec.com/?p=13683 ...]]>

Organizations all over the world are becoming increasingly susceptible to cyber threats that are constantly evolving and growing in sophistication.

The transportation industry especially is undergoing a complete transformation as the need grows to secure the systems that control operations. Transportation drives the flow of commerce and any disruption could potentially translate to billions of dollars lost.

Bad actors will initially survey a system to determine potential holes in the software, then invest the time necessary to engineer the exploit and attack. Embedded systems need to be secure all the way down to the lowest level of vehicle functionality. This includes reverse engineering binary files, running dynamic analysis on real-time functionalities and wireless frameworks and producing proof of concept results. There are many angles that hackers consider in infiltrating a system and companies should be aware of every single one of them, or risk being the next headline.

New technologies such as V2X communication infrastructures and OTA updates are being adopted by Original Equipment Manufacturers (OEMs), paving the way for attack surfaces within these systems to grow exponentially. Furthermore, autonomous technologies are nearing full adoption for commercial and passenger markets. These systems are the perfect target for hackers regardless of whether they are looking for reward or total disruption in the system. Not addressing the risks appropriately could lead to data theft, liability issues, incompliance with regulatory automotive standards and the massive disruption of supply chains.

The best time to ensure systems are designed with security in mind is before deployment. For the systems already deployed, it’s not too late to consider a comprehensive vulnerability assessment to identify potential threats. Our approach at AIS mirrors the actions an adversary would take to compromise a system.

AIS is a trusted cybersecurity partner in securing transportation systems and associated infrastructures. From secure system design and development to security testing and implementation, AIS works to ensure that the systems within consistently perform in a reliable, safe and secure manner. We do this by following a cyclic assessment process, which can be viewed here.

Much of our work is unable to be publicized but check out what we did for DARPA under the High-Assurance Cyber Military Systems (HACMS) project. Choose security today. Learn more about what AIS can do to ensure your products’ embedded systems remain secure.

]]>
AIS at the 2021 Xen Project Developer & Design Summit https://www.ainfosec.com/2021-xen?utm_source=rss&utm_medium=rss&utm_campaign=ais-at-the-2021-xen-project-developer-design-summit Mon, 14 Jun 2021 19:40:11 +0000 https://www.ainfosec.com/?p=13238 ...]]>

Connor Davis, Software Engineer/Researcher at AIS, presented at the 2021 Xen Developer & Design Summit. This year’s virtual event took place on Tuesday, May 25 through Friday, May 28.

Abstract

The Root VM: A New Xen Domain Species

The Xen scheduler is a complex piece of code responsible for scheduling guest virtual machines and managing platform power. What if this complexity could be avoided by reusing the scheduler in a domU instead? This talk is a case study that discusses the benefits and costs of a scheduler-less Xen, in particular its effect on power, performance, emulation and PCI passthrough. This study is based on the opensource research implementation of the Xen PV interface in the MicroV hypervisor. The goal of this talk to raise awareness of this alternative architecture and to start a discussion on the possibility of bringing this alternative to upstream Xen.

About Connor Davis  

Connor spends most of his time exploring virtualization technologies (in particular VT-x/VT-d), covert communications, embedded systems, secure boot architectures and Clang/LLVM. In his free time, he enjoys hiking, rock climbing and practicing Jiu Jitsu. He is also currently contributing to the port of Xen to RISC-V. 

]]>
ByteRI https://www.ainfosec.com/byteri?utm_source=rss&utm_medium=rss&utm_campaign=byteri Tue, 18 May 2021 19:52:57 +0000 https://www.ainfosec.com/?p=13158 ...]]>

Reverse engineers can finally take a sigh of relief thanks to AIS’s new program, Byte Taint Resonance Imaging, aka ByteRI, which will make a major impact in the practice of dynamic taint analysis.

What is ByteRI?

ByteRI is the solution to a multitude of laborious and inefficient reverse engineering programs.

By individually tainting each byte of an input and tracing the flow of these byte-taints through ByteRI, associations between the input fields and code instructions that depend on them are uncovered.

What problem does ByteRI solve?

Reverse engineers are tasked with discovering what programs do while simultaneously learning how it does it. This is not an easy task and involves the creation of new inputs to drive the program’s execution toward unexplored code.

How Does it Work?

The ByteRI program analysis leverages dynamic taint analysis to discover mappings between input data and code that operates on this data. This allows users to visualize how the choice of input impacts control flow and uncover the syntax of a program’s anticipated inputs, including fields, separators and terminals. Analysis results will be integrated into modern reverse engineering and vulnerability discovery toolsets.

How does this impact reverse engineering and vulnerability tasks?

Simply said, tasks will be easier, more accurate and more efficient. Human reverse engineers will save time by being able to more quickly understand previously unseen code. Vulnerability discovery tools will more quickly discover inputs that trigger bugs representing potentially weaponizable vulnerabilities.

]]>