Enabling Safe and Trusted Mobility 

Trillium Secure provides a platform for end-to-end protection of connected vehicles through vSEC (in-vehicle network (IVN) intrusion detection and prevention system (IDPS) and vehicle to everything (V2X) protection) & SKYE (multi-layer IDPS and CyberHealth monitoring). Trillium’s end-to-end 100% cryptography based IDPS solution generates zero false-positives and false-negatives, because it is not based on behavioral models that are highly subject to human error, i.e., it is a deterministic architecture. The marketplace is void of this today, despite the growing need as indicated by OEMs. Our focus is on providing IDPS technology to connected vehicles based on authentication-encryption and firmware authentication, and augmented by cloud-based CyberHealth monitoring. 

vSEC

IVN Message Authentication Encryption

Ensures valid and confidential IVN messages between all safety and mission critical IVN nodes with Trillium’s industry leading authentication-encryption functionality. Designed for optimal performance over resource constrained IVN it operates on all vehicle hardware, operating systems and network topologies. Using a unique patented approach, it provides foundational data trust and vehicle security with deterministic features without rules. This translates into a failsafe IDPS solution without the worries of false-positives or false-negatives.

Firmware Authentication

Provides firmware authentication via a hardware root of trust for all firmware and software layers of the domain controller, gateway, electronic control unit (ECU), in-vehicle infotainment (IVI) and telematics control unit (TCU) architectures. This includes another layer of IDPS functionality against malicious software with the detection of any changes to the code image being protected and multiple intrusion prevention handling options. Establishes fundamental secure boot feature support as well as on-the-fly integrity checking for all additional critical firmware / software features.

V2X Authentication 

Establishing a trusted enclave for vehicle-to-everything (V2X) authentication on the TCU gateway. It is based on public key infrastructure and ideally suited for a variety of V2X applications, including electric vehicle charging environments utilizing International Organization for Standardization (ISO) 15118. Security is essential to V2X technology, and privacy is an integral element of V2X security, so it facilitates both through privacy preserving anonymous authentication.

Trusted V2C Data Transport

Provides a trusted vehicle-to-cloud (V2C) bi-directional data communication link. Features include over-the-air delivery of vehicle firmware, software and application data updates, as well as a trusted full lifecycle data transport for vehicle data to the cloud. Specific to updates to the vehicle, Trillium’s patent-pending embedded dynamic link library (DLL) technology does not require updating of the full binary software stack in the ECU. Instead, only changes to Trillium’s embedded DLL are updated.

SKYE

Provides an end-to-end and full lifecycle trusted mobility services solution which supports Amazon Web Services and Microsoft Azure Connected Vehicle Platform. Highly flexible and configurable APIs provide a method for assuring the delivery of trusted data from the vehicle to cloud-based applications and services. Critically, trust is assured via a permission engine that prevents data from being accessed by anyone other than the intended recipient. The delivery mechanism may be optimized for either cost or timing critical requirements. General Data Protection Regulation (GDPR)-compliant data anonymization techniques also guarantee the highest level of personal and fleet data protection.

SecureSKYE delivers near-real-time vehicle awareness as well as the ability to record vehicle behaviors for post-use analysis.

SecureSKYE provides role-, use-case- and actor-based cybersecurity situational awareness and management of security modules and data.

Trillium offers cybersecurity consulting services that include cyber-attack modeling, automotive penetration testing, cybersecurity training and custom projects based on customer’s requirements. Starting from the design phase of development, experts from Trillium draw on their experience and expertise to identify threat-vulnerabilities in customers’ cyber-critical systems.

Cybersecurity Development & Testing Tool

The BrainBOX™ and Secure SDK package provide a complete environment for testing and development of automotive cybersecurity. It enables OEM’s and Tier1’s to test and build cyber-protected applications – from specification to design and development, including retrofit projects.

The BrainBOX hardware environment emulates the in-vehicle network. It contains a CAN, CAN FD and Auto Ethernet bus built in a configuration consisting of electronic control units, gateways (GW) and telematics control units (TCU) to simulate most vehicle environments. The BrainBOX allows for the evaluation of cybersecurity architecture options before being deployed in vehicle. Test in a lab, shorten development cycle time and deploy with confidence with Trillium BrainBOX.

Penetration Testing Services

Trillium provides penetration-testing services of customer cyber-critical components. Trillium’s experienced red team carries out tests on individual embedded components, tests on entire vehicles, software analysis and examination of aftermarket automotive products. By analyzing products for cybersecurity vulnerabilities throughout the development process, Trillium mitigates the risk of costly post-deployment faults that can result in a massive recall and a severe loss in brand value.

Cybersecurity Training

To compound the development of cyber secure products, Trillium engages with its partners in cyber security training. Cyber security is a field filled with ever-evolving challenges, and nurturing of an able cyber security team is crucial for any entity’s sustained success. Trillium’s engineers work to educate and train our partners’ employees on best-practices and critical skills such as threat modeling, incident response and legislation compliance. By engraining the seeds of cyber literacy in our partners, we enable them to remain protected from exploits and data breaches throughout the lifecycle of their operation.

© 2018 Trillium Secure, Inc. All Rights Reserved. Trillium SecureGO, SecureFAST, SecureLINK and SecureSKYE are trademarks and servicemarks of Trillium Secure, Inc.
Thanks!