Autonomous Security
for Autonomous Platforms

Connected and Autonomous Cars

By 2020, an estimated 188 million connected vehicles will be on the road according to Navigant Research.

In 2025 partially autonomous cars and completely autonomous cars are expected to account for more than 15% of all cars shipped that year. This number will jump to 70% of all cars shipped in 2025, nearly 72 million cars annually.

This fast growth is fuelled by safety and convenience features that connected and autonomous cars offer. Autonomous cars aren’t distracted by text messages or by other reasons that cause human drivers to take their attention off the road.

They will also dramatically change the economies of car ownership. Partially autonomous taxis and ride sharing cars will mobilize elderly, who can no longer drive themselves, and become the go-to choice as more people decide that owning a car is not cost effective.

Vehicle Sales by Autonomous Driving Level Chart

Cyber Attack Risks

Cyber Attack Risks Image

Connected and autonomous cars can turn dangerous as they may become targets for cyber attacks. Hackers exploit external connectivity capabilities to take control of hundreds of thousands of vehicles, endangering lives during the course of a single attack.

Each car’s externally connected electronic control unit (ECU) represents a separate point of vulnerability to a cyber attack. If one ECU is compromised, it’s a gateway to every other ECU in the vehicle. To protect the lives of drivers, passengers and pedestrians, ECUs must be hardened against cyber attacks at all times.

Autonomous In-Car Security

The biggest cyber security risk in enterprise data centers and servers is data loss. Existing enterprise security solutions are designed to meet the needs of data protection and rely on servers' rich resources to run.

The biggest risk of car cyber attacks is loss of lives. In-car cyber security solutions must be designed to protect cars against risks that may harm lives. In-car security solutions don't have the luxury of over-utilizing ECU's computing resources, as it may harm the car's safety functions in runtime.

Karamba’s Autonomous Security was architected to fulfill cars’ safety requirements using negligible ECU resources and without affecting the ECU operations.

How Does Autonomous Security Work?

Autonomous Security seals connected and autonomous cars’ ECUs according to factory settings to prevent intrusions, including in-memory attacks.

The innovation separating Karamba’s Autonomous Security software derives from three major technological breakthroughs:

  • Automatically locks down the ECU according to its factory settings, identifying and mapping all legitimate binaries and valid function calls.
  • Checks all operations in runtime, blocking droppers and in-memory attacks as they don't comply with the factory settings.
  • Performs runtime checks with negligible performance impact.

Autonomous Security doesn't rely on reactive security updates that must be constantly downloaded or heuristic analysis to detect and prevent cyber attacks.

Exploit Prevention

Autonomous Security Benefits

  • Electronic Control Unit

    Enable the ECU to protect itself

    Connected and autonomous cars may drive in spotty coverage areas with unreliable Internet connectivity.

    With Autonomous Security, decisions whether to block malicious operations are made autonomously and locally on the ECU. No Internet connectivity is needed for the car to remain protected.

  • No False Positives

    No false positives

    Security solutions constantly make decisions whether a call or function is valid or the result of a cyber attack, but they can return a false positive when they read a valid call as a hack and prevent its execution.

    There's no room for false positives in car security, where critical systems, need to operate as intended to keep people safe.

    Autonomous Security automatically generates a security policy based on factory settings, making an instantaneous deterministic decision whether an operation is in compliance. This approach keeps out cyber hacks, including in-memory attacks, while ensuring the vehicle functions as intended.

  • No Malware Signature Updates Required

    No malware signature updates required

    Car security can't be entrusted to any framework that depends on downloading malware signature updates. The constant struggle between developers and hackers leaves vehicles exposed to hackers' new attacks until the ECU software developers catch up.

    Autonomous Security locks down each ECU according to its factory settings, preventing the execution of any calls or operations that aren't defined there. No updates needed, until a new firmware is deployed, which includes its new security policy.

  • Protects All ECUs

    Protects all ECUs, regardless of operating system or hardware

    Hackers love the variety of externally connected ECU hardware components. Each one is a new attack surface into the car, opening up another set of vulnerabilities to exploit.

    Karamba’s Autonomous Security solution is indifferent to any ECU's hardware or software configuration. Whether an ECU runs on an operating system or scheduler, Karamba’s Autonomous Security hardens it.

  • Negligible Performance Impact

    Negligible performance impact

    Security options that consume a lot of the ECU’s processing power suffer from latency that risks the car proper operations. Karamba’s Autonomous Security product suite consumes negligible ECU processing power. It doesn’t require any change to the ECU hardware or software, avoiding any impact on the car’s safe operations.

Get Karamba’s Autonomous Security Whitepaper