Uptane

Last updated

Uptane is a Linux Foundation / Joint Development Foundation hosted software framework designed to ensure that valid, current software updates are installed in adversarial environments. [1] [2] It establishes a process of checks and balances on these electronic control units (ECUs) that can ensure the authenticity of incoming software updates. [3] Uptane is designed for "compromise-resilience," or to limit the impact of a compromised repository, an insider attack, a leaked signing key, or similar attacks. [4] [5] It can be incorporated into most existing software update technologies, but offers particular support for over-the-air programming or OTA programming strategies originating from The Update Framework. [6]

Contents

History

Uptane was developed by a team of engineers at New York University Tandon School of Engineering in Brooklyn, NY, the University of Michigan Transportation Research Institute in Ann Arbor, MI, and the Southwest Research Institute in San Antonio, TX. [7] [8] It was developed as open source software under a grant from the U.S. Department of Homeland Security. [9]

In 2018, the Uptane Alliance, a non-profit organization, was formed under the aegis of IEEE-ISTO [10] [11] to oversee the first formal release of a standard. The first standard volume, entitled IEEE-ISTO 6100.1.0.0 Uptane Standard for Design and Implementation, was released on July 31, 2019. [12] Uptane was recognized in 2017 by Popular Science as one of that year’s top security innovations. [13]

As of 2020, multiple implementations of Uptane are available, both through open source projects such as the Linux Foundation’s Automotive Grade Linux, [14] [15] and through third party commercial suppliers, such as Advanced Telematic Systems (ATS), now part of Here Technologies, [16] [17] and Airbiquity. [18] [19] There is also a reference implementation meant to aid adopters implementing Uptane. [20]

Related Research Articles

L4 is a family of second-generation microkernels, used to implement a variety of types of operating systems (OS), though mostly for Unix-like, Portable Operating System Interface (POSIX) compliant types.

<span class="mw-page-title-main">FOSDEM</span> Annual event in Brussels centered on free and open source software development

Free and Open source Software Developers' European Meeting (FOSDEM) is a non-commercial, volunteer-organized European event centered on free and open-source software development. It is aimed at developers and anyone interested in the free and open-source software movement. It aims to enable developers to meet and to promote the awareness and use of free and open-source software.

An over-the-air update, also known as over-the-air programming, is an update to an embedded system that is delivered through a wireless network, such as Wi-Fi or a cellular network. These embedded systems include mobile phones, tablets, set-top boxes, cars and telecommunications equipment. OTA updates for cars and internet of things devices can also be called firmware over-the-air (FOTA). Various components may be updated OTA, including the device's operating system, applications, configuration settings, or parameters like encryption keys.

AUTomotive Open System ARchitecture (AUTOSAR) is a development partnership of automotive interested parties founded in 2003. It pursues the objective to create and establish an open and standardized software architecture for automotive electronic control units (ECUs). Goals include the scalability to different vehicle and platform variants, transferability of software, the consideration of availability and safety requirements, a collaboration between various partners, sustainable use of natural resources, and maintainability during the product lifecycle.

<span class="mw-page-title-main">Trusted Platform Module</span> Standard for secure cryptoprocessors

Trusted Platform Module is an international standard for a secure cryptoprocessor, a dedicated microcontroller designed to secure hardware through integrated cryptographic keys. The term can also refer to a chip conforming to the standard.

<span class="mw-page-title-main">ClamTk</span> Computer antivirus software for Linux

ClamTk is a free software graphical interface for the ClamAV command line antivirus software program, for Linux desktop users. It provides both on-demand and scheduled scanning. The project was started by Dave Mauroni in February 2004 and remains under development.

<span class="mw-page-title-main">Linux Foundation</span> Non-profit technology consortium to develop the Linux operating system

The Linux Foundation (LF) is a non-profit organization established in 2000 to support Linux development and open-source software projects. In addition to providing a neutral home where Linux kernel development can be protected and accelerated, the LF is dedicated to building sustainable ecosystems around open-source projects to accelerate technology development and commercial adoption.

<span class="mw-page-title-main">Intel Active Management Technology</span> Out-of-band management platform by Intel

Intel Active Management Technology (AMT) is hardware and firmware for remote out-of-band management of select business computers, running on the Intel Management Engine, a microprocessor subsystem not exposed to the user, intended for monitoring, maintenance, updating, and repairing systems. Out-of-band (OOB) or hardware-based management is different from software-based management and software management agents.

Lynx Software Technologies, Inc. is a San Jose, California software company founded in 1988. Lynx specializes in secure virtualization and open, reliable, certifiable real-time operating systems (RTOSes). Originally known as Lynx Real-Time Systems, the company changed its name to LynuxWorks in 2000 after acquiring, and merging with, ISDCorp, an embedded systems company with a strong Linux background. In May 2014, the company changed its name to Lynx Software Technologies.

<span class="mw-page-title-main">API</span> Software interface between computer programs

An application programming interface (API) is a way for two or more computer programs to communicate with each other. It is a type of software interface, offering a service to other pieces of software. A document or standard that describes how to build or use such a connection or interface is called an API specification. A computer system that meets this standard is said to implement or expose an API. The term API may refer either to the specification or to the implementation.

RDRAND is an instruction for returning random numbers from an Intel on-chip hardware random number generator which has been seeded by an on-chip entropy source. Intel introduced the feature around 2012, and AMD added support for the instruction in June 2015.

<span class="mw-page-title-main">Smack (software)</span> Linux kernel security module

Smack is a Linux kernel security module that protects data and process interaction from malicious manipulation using a set of custom mandatory access control (MAC) rules, with simplicity as its main design goal. It has been officially merged since the Linux 2.6.25 release, it was the main access control mechanism for the MeeGo mobile Operating System. It is also used to sandbox HTML5 web applications in the Tizen architecture, in the commercial Wind River Linux solutions for embedded device development, in Philips Digital TV products., and in Intel's Ostro OS for IoT devices.

Privacy engineering is an emerging field of engineering which aims to provide methodologies, tools, and techniques to ensure systems provide acceptable levels of privacy.

Justin Cappos is a computer scientist and cybersecurity expert whose data-security software has been adopted by a number of widely used open-source projects. His research centers on software update systems, security, and virtualization, with a focus on real-world security problems.

<span class="mw-page-title-main">Link Motion</span>

Link Motion is an automotive software and hardware company developing embedded automotive systems that have been used in the Lamborghini Huracán. Their main product is the Motion T carputer which can implement a connected vehicle gateway as a separate unit or as a part of the cockpit solution (eCockpit). The Motion T carputer runs on NXP's i.MX8 multi-OS platform, supports four in-car HD displays and hosts connectivity features on Microsoft’s connected vehicle platform, a set of services built on the Microsoft Azure cloud, such as over-the-air software and firmware updates, telemetry and diagnostics data and secure remote access.

The Update Framework (TUF) is a software framework designed to protect mechanisms that automatically identify and download updates to software. TUF uses a series of roles and keys to provide a means to retain security, even when some keys or servers are compromised. It does this with a stated goal of requiring minimal changes and effort from repository administrators, software developers, and end users. In this way, it protects software repositories, which are an increasingly desirable target for hackers.

William "Chuck" Easttom II is an American computer scientist specializing in cyber security, cryptography, quantum computing, and systems engineering.

Microsoft, a technology company historically known for its opposition to the open source software paradigm, turned to embrace the approach in the 2010s. From the 1970s through 2000s under CEOs Bill Gates and Steve Ballmer, Microsoft viewed the community creation and sharing of communal code, later to be known as free and open source software, as a threat to its business, and both executives spoke negatively against it. In the 2010s, as the industry turned towards cloud, embedded, and mobile computing—technologies powered by open source advances—CEO Satya Nadella led Microsoft towards open source adoption although Microsoft's traditional Windows business continued to grow throughout this period generating revenues of 26.8 billion in the third quarter of 2018, while Microsoft's Azure cloud revenues nearly doubled.

<span class="mw-page-title-main">Automotive security</span> Branch of computer security related to the automotive context

Automotive security refers to the branch of computer security focused on the cyber risks related to the automotive context. The increasingly high number of ECUs in vehicles and, alongside, the implementation of multiple different means of communication from and towards the vehicle in a remote and wireless manner led to the necessity of a branch of cybersecurity dedicated to the threats associated with vehicles. Not to be confused with automotive safety.

Internet of vehicles (IoV) is a network of vehicles equipped with sensors, software, and the technologies that mediate between these with the aim of connecting & exchanging data over the Internet according to agreed standards. IoV evolved from Vehicular Ad Hoc Networks, and is expected to ultimately evolve into an "Internet of autonomous vehicles". It is expected that IoV will be one of the enablers for an autonomous, connected, electric, and shared (ACES) Future Mobility.

References

  1. Detsch, Jack (18 January 2017). "Are Software Updates Key to Stopping Criminal Car Hacks?". Christian Science Monitor. Retrieved 1 May 2020.
  2. Matthews, Lee (19 January 2017). "Uptane will Protect Your Connected Car from Hackers". Forbes. Retrieved 1 May 2020.
  3. Kuppusamy, Trishank Karthik; Brown, Akan; Awwad, Sebastien; McCoy, Damon; Bielawski, Russ; Mott, Cameron; Lauzon, Sam; Weimerskirch, Andre; Cappos, Justin (November 2016). "Uptane: Securing Software Updates for Automobiles" (PDF). escar2016.{{cite journal}}: Cite journal requires |journal= (help)
  4. Kerner, Sean Michael (24 April 2017). "How The Update Framework Improves Security of Software Updates". eWeek. Retrieved 1 May 2020.
  5. Kuppusamy, Trishank Karthik; Torres-Arias, Santiago; Diaz, Vladimir; Cappos, Justin (March 2016). "Diplomat: Using Delegations to Protect Community Repositories" (PDF). NSDI 2016.{{cite journal}}: Cite journal requires |journal= (help)
  6. "Uptane Design". uptane.github.io. April 1, 2022. Retrieved 2023-08-18.
  7. Woods, Tyler (19 January 2017). "NYU Tandon Prof Unveils Homeland Security-funded Framework for Software Security in Cars". Technical.ly. Retrieved 4 January 2019.
  8. Flahive, Paul (26 January 2017). "A Future Car May Be Protected From Hacking By Software Developed In San Antonio". All Things Considered-Texas Public Radio. Retrieved 4 January 2019.
  9. "Cyber Security Division Technology Guide 2018" (PDF). US Department of Homeland Security: 9. Retrieved 4 January 2019.{{cite journal}}: Cite journal requires |journal= (help)
  10. "Uptane Alliance". IEEE/ISTO. 31 July 2018. Retrieved 8 January 2020.
  11. Frost, Adam (29 May 2019). "Here Technologies joins the Uptane Alliance for highly-secure software updates". TrafficTechnologyToday.com. Retrieved 8 January 2020.
  12. "IEEE-ISTO 6100.1.0.0 Uptane Standard for Design and Implementation" (PDF). IEEE/ISTO. 31 July 2019. Retrieved 8 January 2020.
  13. Atherton, Kelsey D.; Feltman, Rachel (17 October 2017). "The year's most important innovations in security". Popular Science. Retrieved 1 May 2020.{{cite journal}}: Cite journal requires |journal= (help)
  14. "About Automotive Grade Linux". AGL. Retrieved 8 January 2020.
  15. "Linux Foundation's Open Source Automotive Software Project Takes Off". Xconomy.com. 7 May 2019. Retrieved 8 January 2020.
  16. "ATS integrates Uptane security framework for OTA updates". IHS Markit/Autotechinsight. 19 June 2017. Retrieved 1 May 2020.
  17. Rajan, Piyush (15 June 2017). "ATS integrates the Uptane security framework for OTA updates". Telematics Wire. Retrieved 1 May 2020.
  18. D’Mello, Anasia (14 December 2018). "Airbiquity reinforces the security and data analysis features of OTAmatic". IoT Now. Retrieved 1 May 2019.
  19. "Airbiquity to showcase latest version of OTAmatic™ over-the-air software and data management offering at CES 2019". Automotive World. 18 December 2018. Retrieved 1 May 2020.
  20. "Uptane: Secure Framework for Automotive Software Updates—Reference Implementation and Demonstration code". GitHub . 23 September 2019. Retrieved 29 April 2020.

Further reading