Summary
In this ninth and final chapter, we looked at the most commonly used security controls applied to the hardware, software, and physical layers of the ECU. With this layered approach, we continued with the theme of DiD, which started at the vehicle interface level in Chapter 8. We showed the role that hardware plays in establishing the foundation of a secure system. Hardware security controls included the hardware RoT, secure memory, and authenticated debug ports. Then, we looked at security controls in the software domain that build upon the hardware security controls, such as multi-stage secure boot, virtualization through hypervisors, and process and temporal isolation through OSs. Finally, we looked at controls applied at the physical layer to reduce the feasibility of attacks by agents who have gained physical access to the ECU. While exploring the various security layers, we highlighted areas in which competing priorities emerge between security on one hand and the need...