Monday 27 March 2017

Technical workshops

09:00 AM - 1:00 PM Legal challenges for automated and autonomous driving

  • “War of Words”: Is an “Autopilot” really an “Auto-Pilot”?
  • Expectations of the driver (consumer) versus distraction and poor skills.
  • Each successful hacker attack provides the prima facie evidence of an unsafe and defective product.
  • The lessons from the NHTSA-Orders to Takata and OEMs.
  • Safety relevance of data selection: Training, testing and validating machine learning models (Patrick Helmig)
  • The challenges of testing and explaining machine learning based systems
  • Risk assessment based on reversed ISO 26262
  • Risk assessment under ISO 9001:2015
  • In the focus: Increased liability of managers and engineers top down

Technical workshops

1:00 PM - 09:00 AM Model-based development of safety-critical systems for ISO 26262 compliance

  • This workshop will look into model-based design as the hopeful solution of managing the increase of safety requirements vs. the decrease of development time for embedded systems
  • Safety cases for model-based development
  • Formal methods in automotive
  • Application of a different design approach
  • Available tools and methods

Cyber Security Stream

09:00 AM - 6:30 PM Cyber Security Training Day: Threat Intelligence for the Automotive Domain & Simulated Automotive Cyber Crisis Exercise

PART 1: Threat intelligence for the automotive domain: This first part of the training day will focus on threat intelligence in the context of on board software systems and connectivity for automotive platforms. Cyber security is an increasingly important factor for the modern vehicle, given the increasing software and digital elements on board, connectivity and surrounding digital infrastructure. The workshop will be divided into three sessions of a total of four hours, each a mix of a brief presentation, smaller group discussions, and feedback into the wider group. The three sessions are:

Threat Assessment
  • What is Threat Intelligence? Why is there a need for systematic assessment?
  • Threat classification: What are the current threats faced in this sector?
Global Trend Monitoring
  • Traditional software: What are current mechanisms for threat reporting?
  • Crowd sourcing vulnerability assessments: What are the benefits and challenges?
Testing and Validation
  • Why Testing? Testing approaches for threat assessment and validation.
  • Design considerations: How do we inform secure modelling and design practices?

PART 2: Simulated Automotive Cyber Crisis Exercise: The Atlantic Council’s Cyber Statecraft Initiative of the Brent
Scowcroft Center on International Security will draw on its substantive expertise and its ability to gather key
stakeholders to evaluate responses to a widespread crisis triggered by cyber security failure. The insights and lessons
learned will be instructional for understanding how various stakeholders and groups, ranging from policymakers,
engineers, public relations, and other stakeholders, are prepared to handle a cyber crisis potentially impacting the
automotive industry in the short and long term:
  • How will policymakers, OEMs, Tier 1s, and other stakeholders work together to respond to immediate threats of an escalating cyber crisis, as well as the sustained impact to revenue, GDP, and policy?
Anticipating security of technological evolution
  • Vehicle-to-vehicle communication, driverless cars, automated traffic flow, and remote control functions are just a few of the evolutions under active development. New technology introduces new classes of accidents and adversaries that must be anticipated and addressed proactively. Security researchers have demonstrated susceptibility to malicious attack. Accidents may pose no less a threat from unanticipated consequences.
  • Public policy, safety engineering, and technical response planning have not kept pace with the rapid changes in threat and risk landscape. Additionally, misunderstandings, miscalculation, and lack of cooperation between relevant stakeholders can add to the escalatory potential of a cyber crisis. To avert a major catastrophe impacting the automotive industry, it is therefore crucial to work through simulations to understand where assumptions, cooperation, and planning hold up, and where they do not.