Multi-Layered Cybersecurity Suite for Lifecycle Protection of Connected Vehicles

Trillium Secure provides a platform for end-to-end protection of connected vehicles through vSEC (In-Vehicle Network (IVN) intrusion detection and prevention system (IDPS) and vehicle to everything (V2X) protection) & SKYE (multi-layer IDPS and cyber health monitoring). Trillium’s end-to-end IDPS solution has zero false-positives and false-negatives due to its deterministic architecture which leverages the latest in advanced cryptography. Our focus is on IVN authentication-encryption and firmware authentication, IDPS technology for connected vehicles and supporting cloud based cyber health monitoring.

vSEC

IVN Message Authentication Encryption

Ensures valid and confidential IVN messages between all safety and mission critical IVN nodes with Trillium’s industry leading authentication-encryption functionality. Designed for optimal performance over resource constrained IVN it operates on all vehicle hardware, operating systems and network topologies. Using a unique patented approach, it provides foundational data trust and vehicle security with deterministic IDPS features without rules. This translates into a failsafe IDPS solution without the worries of false positives or negatives.

Firmware Authentication

Provides firmware authentication via a hardware root of trust for all firmware and software layers of the telematics control unit (TCU), gateway, domain controller, in-vehicle infotainment (IVI), and electronic control unit (ECU) architectures. This includes another layer of IDPS functionality against malicious software with the detection of any changes to the code image being protected and multiple intrusion prevention handling options. Establishes fundamental Secure Boot feature support as well as on-the-fly integrity checking for all additional critical firmware / software features.

V2X Authentication 

Establishing a trusted enclave for vehicle-to-everything (V2X) authentication on the TCU gateway. It is based on public key infrastructure and ideally suited for a variety of V2X applications, including electric vehicle charging environments utilizing International Organization for Standardization (ISO) 15118. Security is essential to V2X technology, and privacy is an integral element of V2X security, so it facilitates both through privacy preserving anonymous authentication.

Trusted V2C Data Transport

Provides a trusted vehicle-to-cloud (V2C) bi-directional data communication link. Features include over-the-air delivery of vehicle firmware, software, and application data updates as well as a trusted full lifecycle data transport for vehicle data to the cloud. Specific to updates to the vehicle, Trillium’s patent-pending embedded dynamic link library (DLL) technology does not require the updating of the full binary software stack in the ECU – only changes to the cyber library are delivered. The Trillium embedded DLL makes updates compact, fast to execute, easy to implement and inexpensive to deliver.

SKYE

Provides an end-to-end and full lifecycle trusted mobility services solution which supports Amazon Web Services and Microsoft Azure Connected Vehicle cloud. Highly flexible and configurable APIs provide a method for assuring the delivery of trusted data from the vehicle to cloud-based applications and services. Critically, trust is assured via a permission engine that prevents data from being accessed by anyone other than the intended recipient. The delivery mechanism may be optimized for either cost or timing critical requirements. General Data Protection Regulation (GDPR)-compliant data anonymization techniques also guarantee the highest level of personal and fleet data protection.

SecureSKYE delivers near-real-time vehicle awareness as well as the ability to record vehicle behaviors for post-use analysis.

SecureSKYE provides role-, use-case- and actor-based cybersecurity situational awareness and management of security modules and data.

Trillium offers cybersecurity consulting services that include cyber-attack modeling, automotive penetration testing, cybersecurity training and custom projects based on customer’s requirements. Starting from the design phase of development, experts from Trillium draw on their experience and expertise to identify threat-vulnerabilities in customers’ cyber-critical systems.

Cybersecurity Development & Testing Tool

The BrainBOX™ and Secure SDK package provide a complete environment for testing and development of automotive cybersecurity. It enables OEM’s and Tier1’s to test and build cyber-protected applications – from specification to design and development, including retrofit projects.

The BrainBOX hardware environment emulates the in-vehicle network. It contains a CAN, CAN FD and Auto Ethernet bus built in a configuration consisting of electronic control units, gateways (GW) and telematics control units (TCU) to simulate most vehicle environments. The BrainBOX allows for the evaluation of cybersecurity architecture options before being deployed in vehicle. Test in a lab, shorten development cycle time and deploy with confidence with Trillium BrainBOX.

Penetration Testing Services

Trillium provides penetration-testing services of customer cyber-critical components. Trillium’s experienced red team carries out tests on individual embedded components, tests on entire vehicles, software analysis and examination of aftermarket automotive products. By analyzing products for cybersecurity vulnerabilities throughout the development process, Trillium mitigates the risk of costly post-deployment faults that can result in a massive recall and a severe loss in brand value.

Cybersecurity Training

To compound the development of cyber secure products, Trillium engages with its partners in cyber security training. Cyber security is a field filled with ever-evolving challenges, and nurturing of an able cyber security team is crucial for any entity’s sustained success. Trillium’s engineers work to educate and train our partners’ employees on best-practices and critical skills such as threat modeling, incident response and legislation compliance. By engraining the seeds of cyber literacy in our partners, we enable them to remain protected from exploits and data breaches throughout the lifecycle of their operation.

© 2018 Trillium Secure, Inc. All Rights Reserved. Trillium SecureGO, SecureFAST, SecureLINK and SecureSKYE are trademarks and servicemarks of Trillium Secure, Inc.
Thanks!