AutoVisor Protected Mobility

Сybersecurity for MaaS companies

About product

 

Our company provides high-tech solutions and advanced services for MaaS companies (sharing companies and aggregators) We work with two, four, and more wheeled vehicles ( cars, buses). We are well aware of the picture of existing threats for mobility infrastructure including Spoofing, Tampering, Repudiation, Information disclosure (privacy breach or data leak), and Denial of service.

We have unique expertise in both vehicle security and cloud infrastructure security and this allows us to offer our customers the best solutions

Solutions

Vehicle protection

protect vehicle electronics
(ECU etc) from intrusion and G PS spoofing

Cloud protection

protect your cloud infrastructure
from attacks, and enable Cybersecurity
M anagement System via the API

User protection

security analysis and protection
of user applications against leakage and malicious use of personal data

Vehicle Protection

Who needs a solution and why?
N
With physical access to the vehicle, an attacker can install a hidden device on the CAN bus ( buses) and can influence the control of the vehicle. This can lead to road accidents, including the death of road users.
N
Our solution allows fleet owners (a ny vehicle with CAN and LIN b u ses to detect any illegal connections to the vehicle.

Technologies and processes

N
P rovides complete security of the control bus (CAN/ protecting it from unauthorized connections)
N
IDS/IPS device utilizes the following technologies RTOS (in particular FreeRTOS), Secure Boot with flash memory encryption, FOTA Wi-Fi and GSM; encryption and firmware signature ( PKI, with GNSS, LoRaWAN, GSM, IMU, CANbus, LIN, IMMO Bypass sensors for remote control of the vehicle

Benefits

N
The integration of the technology will allow you to reduce the risks of cyber attacks to your customers, protect your reputation and allow you to meet advanced security standards

How to implement?

N
Supplied as equipment, can be supplied as technology ( in addition to vehicle elements ( TCU). The technology is open for integration and adaptation to customer requirements

Anti GPS spoofing protection

Who needs a solution and why?
N
For the fleet owners is important to control the fleet, it is important to have up to time location data. An Adversary can use a GPS jammer or do a spoofing attack to steal or damage a vehicle Such attacks are cheap in execution (equipment can be purchased for 30 on the Internet)
N
In the center of a large city, there can often be anti-drone zones in which there is a deliberate substitution of GPS coordinates by law enforcement agencies. To ensure that this does not disrupt the operation of the fleet, we recommend implementing our GPS spoofing protection technologies

What do we offer?

N
We have developed a special algorithm that can be implemented at the firmware level in the t box on the vehicle

Benifits of use

N
Using this algorithm will allow you to always know exactly where your vehicle is and recognizes theft attempts

How does it solve the problem?

N
A special algorithm will analyze the logic and inertia of changing coordinates, preventing sudden and illogical movements and detects the use of jammers

How to implement?

N
We need to have access to your t box’s firmware in order for us to implement this. Also, this functionality can be implemented at the cloud level

Cloud protection

Who needs a solution and why?
N
The security of the cloud infrastructure is a priority goal in the cybersecurity strategy for any MaaS company. The cloud infrastructure is subject to such attacks as: Spoofing, Tampering, Repudiation, Information disclosure (privacy breach or data leak), Denial of service. In order to monitor the current state of cybersecurity and respond immediately to cyber incidents, we suggest that you use our Cybersecurity Management System.First of all, this system is designed for fleet owners and x sharing platforms

What do we offer?

N
API integrated interface that aggregates data on cybersecurity incidents, attempts to attack a vehicle fleet, the cloud, or user devices

Benifits of use

N
With this tool, you can always know what is happening to your vehicle and respond to cyber threats in a timely manner

How to implement?

N
The system can be connected via API to your existing FMS or any other security ( monitoring system)

Architecture

Data science & processing automatization
N
AutoVisor’s signatures data base
N
Infrastructure adapts to Big Data, machine learning, and automation to meet the needs of the customer and end users
N
Advanced GPU based BI solution that allows you to process and visualize a large amount of data
N
Machine learning algorithms for automating the work of the infrastructure and its users
N
Algorithms are based on Python with hot data storage in Redis and cold data storage in Cassandra and Google Big Query

User protection

Who needs a solution and why?
N
One of the key threats to the user is the vulnerability of the mobile application. By gaining access to the mobile application, an adversary can steal personal data including bank data), block the operation of the MaaS
solution ( or spy on the user). The priority demand for solutions of this type is primarily for x sharing platforms

We identify 4 possible attack paths

  • Interception of data exchanged between the application and the server
  • Selection of automatically issued passwords
  • Overlapping the application interface with a fake window
  • Run on rooted devices and inject malicious code

What do we offer?

N
  • Perform a security analysis of an existing user application
  • Integrate protection mechanisms into the existing offer
  • Connect the application to monitoring via the Cybersecurity Management System

Thus, in the event of an attack attempt on a user device, we will receive information about the incident in the Cybersecurity Management System and will be able to protect the user in a timely manner

How to implement?

N
To implement this solution, we need to work together with you on your application and connect it to the Cybersecurity Management System

How does it solve the problem?

N
The secure by design approach will ensure the protection of the application perimeter. Also, any attempts to attack the user application will be recognized by the system. The system immediately notifies the operator of a cybersecurity incident and the user will remain protected without losing their personal data and without risking losing their account

Benifits of use

N
Protecting the user application will increase the overall level of the client’s location to the company’s product. This will reduce the number of attacks on users and the number of user disputes with the company, thereby reducing the risks of additional costs and reputational damage