SW implementation:
· created the Freshness Value Manager SWC
· updated code in other SWCs and BSW components
· added Crypto Stack and HSM integration in the existing project
· updated Memory Stack, Crypto Stack, Communication Stack, Diagnostic Stack
· updated Communication Matrix
· updated E2E configuration
· added SecOC configuration to the FAW E variant project
· RTE and OS updates and support for colleagues
· helped with the implementation of the Variant Configuration in ISOLAR A/B (Autosar config tool)
· System Description updates (SWCs description)
· MISRA and unit test implementation plus updates
SW tooling support:
· Update/created python build part of the build script for signing the hex file after build
· Update/created Restbus CANoe Simulation
· Created automatic tests for SecOC
· Helping with check-in process in Windchill
Bootloader:
· support and testing with BOSCH
· support Schaeffler colleagues with information about how the BL is working, how to flash the SW
· support with the Security Flashing (signature verification)
· support with the downgrade protection
· Debugging
Tools
Used:
· Windchil (SW repositories, requitements, and tasks)
· AbsInt Astree (MISRA and sound check tool)
· Parasoft (Unit tests)
· Vector CANoe
· Isolar A/B (Autosar config tool)
· dSpace SystemDesk (SWCs description tool)
· Vector CANdela (updated SDD file for UDS)
· Lauterbach Trace32 (debug)
· OpenSSL, Hexview, srecord
· Vector vFlash
· GHS (compiler)
Additional:
· hold SecOC presentation
· CANoe Simulation support
· China team support
· Several persons explained and helped with SecOC and CANoe simulation
· support with the bootloader, bootloader updater, HSM and SW flashing
Requirements:
· Analyzed security requirements and supporting CPO with all the information about the project
· Updated with the architect the information in the architecture about the SecOC and Freshness
· linked requirements and test to the implementation
Testing:
· SW testing on almost all levels
· Unit testing (done with Parasoft)
· Communication testing (CANoe configuration)
· SecOC manual and automatic testing
· System testing team support
· Performed Security testing on all the Customer requirement
Customer Project Support:
FAW:
· involved in discussion with customer (explained the implementation and the tests done)
· involved in discussion with suppliers:
· ETAS: BSW Isolar and HSM supplier, involved in debugging and testing
· BOSCH: HW library and Bootloader supplier, involved in debuging and testing
· discussion about the bootloader and application start-up issues
· participated in the meeting for the Memory Map update to decide where to set up the signature in the SW
· gave sample code to Bootloader BOSCH team to update HSM
· dSPACE: discussed about the SecOC implementation and how is working in CANoe
NIO:
· security features based on FAW, supporting colleagues
JAC:
· supporting colleagues for the Security Access
implementation
Customer Projects: BMW, Daimler, VW, Geely, Internal Base Development
SW implementation:
· created the Freshness Value Manager SWC
· updated code in other SWCs and BSW components
· added Crypto Stack and HSM integration in the existing project
· updated Memory Stack, Crypto Stack, Communication Stack, Diagnostic Stack
· updated Communication Matrix
· updated E2E configuration
· added SecOC configuration to the FAW E variant project
· RTE and OS updates and support for colleagues
· helped with the implementation of the Variant Configuration in ISOLAR A/B (Autosar config tool)
· System Description updates (SWCs description)
· MISRA and unit test implementation plus updates
SW tooling support:
· Update/created python build part of the build script for signing the hex file after build
· Update/created Restbus CANoe Simulation
· Created automatic tests for SecOC
· Helping with check-in process in Windchill
Bootloader:
· support and testing with BOSCH
· support Schaeffler colleagues with information about how the BL is working, how to flash the SW
· support with the Security Flashing (signature verification)
· support with the downgrade protection
· Debugging
Tools
Used:
· Windchil (SW repositories, requitements, and tasks)
· AbsInt Astree (MISRA and sound check tool)
· Parasoft (Unit tests)
· Vector CANoe
· Isolar A/B (Autosar config tool)
· dSpace SystemDesk (SWCs description tool)
· Vector CANdela (updated SDD file for UDS)
· Lauterbach Trace32 (debug)
· OpenSSL, Hexview, srecord
· Vector vFlash
· GHS (compiler)
Additional:
· hold SecOC presentation
· CANoe Simulation support
· China team support
· Several persons explained and helped with SecOC and CANoe simulation
· support with the bootloader, bootloader updater, HSM and SW flashing
Requirements:
· Analyzed security requirements and supporting CPO with all the information about the project
· Updated with the architect the information in the architecture about the SecOC and Freshness
· linked requirements and test to the implementation
Testing:
· SW testing on almost all levels
· Unit testing (done with Parasoft)
· Communication testing (CANoe configuration)
· SecOC manual and automatic testing
· System testing team support
· Performed Security testing on all the Customer requirement
Customer Project Support:
FAW:
· involved in discussion with customer (explained the implementation and the tests done)
· involved in discussion with suppliers:
· ETAS: BSW Isolar and HSM supplier, involved in debugging and testing
· BOSCH: HW library and Bootloader supplier, involved in debuging and testing
· discussion about the bootloader and application start-up issues
· participated in the meeting for the Memory Map update to decide where to set up the signature in the SW
· gave sample code to Bootloader BOSCH team to update HSM
· dSPACE: discussed about the SecOC implementation and how is working in CANoe
NIO:
· security features based on FAW, supporting colleagues
JAC:
· supporting colleagues for the Security Access
implementation
Customer Projects: BMW, Daimler, VW, Geely, Internal Base Development