OnBoard Security InSights

Gene Carter

Gene is OnBoard Security's VP of Products and is responsible for Product Management and Marketing of all products, including Aerolink®, TrustSentinel™ and NTRU. Gene has spent the past 20 years in cybersecurity, embedded and automotive product management roles for NXP Semiconductors, Philips Semiconductors, Security Innovation and Coto Technology. He holds an MBA from the University of Southern California’s Marshall School of Business and a BSc in Electrical Engineering from Tufts University.
Find me on:

Recent Posts

Securing Access to Your Car’s Data

Posted by Gene Carter on Oct 15, 2018 10:22:09 AM

The Onboard Diagnostics Port (OBD) has been required for all cars sold in the US since 1996 and in Europe since 2001. Prompted by the need to simplify the diagnosis of increasingly complex emission control systems, the OBD-II improved on previous implementations by providing standardized condition codes for the auto repair and tuning markets. Standardized access to this data has helped spawn a robust aftermarket of plug-in devices to allow consumers to monitor their teen drivers, earn discounts from insurers, or gain insights into the performance and health of their vehicles. Similar devices allow fleet managers to monitor the condition, performance and behavior of their vehicles. Nearly all of these dongles offer a wireless connection for the convenience of their customers. Unfortunately, a wireless connection also provides a potential path for hackers to gain entry to the car’s internal networks. 

Read More

Topics: Connected Vehicles, Regulation, Cyber Security, Autonomous Vehicles, Embedded Security, Automotive, Privacy

Secure Multiparty Computation

Posted by Gene Carter on Sep 27, 2018 10:14:00 AM

Recently, our customer, Rivetz, announced their Dual Roots of Trust solution to protect private keys in a mobile phone, even if one of the systems is compromised. The Rivetz software generates and distributes the private key between the two roots – the Trusted Execution Environment (TEE) running in ARM TrustZone and the SIM card. This means that both roots would have to be compromised in order to get the user’s private key.  Since the TEE is controlled by the phone manufacturer and the SIM is controlled by the mobile carrier, the user’s data is also protected from insider attacks or a vendor security breach.

Read More

Topics: Blockchain, SCMS, Trusted Computing, Cryptography, Privacy, garbled circuits, secure computation, Cyber Security, Research

Protecting the Electric Vehicle Ecosystems from Cyber-Attacks

Posted by Gene Carter on Sep 20, 2018 11:41:20 AM

Last year Americans purchased slightly less than 200,000 electric vehicles which are supported by approximately 47,000 US charging stations, according to Statista.  The growth rate of electric vehicles is high and shows no signs of slowing down.

Read More

Topics: Navigation, GPS, Connected Vehicles, V2V, Cyber Security, Autonomous Vehicles, Automotive

Secure Crypto Key Management for Automotive

Posted by Gene Carter on Nov 1, 2017 12:21:38 PM

Car makers use cryptographic keys for a variety of purposes, including Over-The-Air (OTA) software updates, security immobilizers, inter-module communications, and Vehicle-to-Everything (V2X) communication security. Key Management Systems (KMS) are very complex, as the manufacturer has to manage dozens of keys for each car model, both at production and when new components are introduced during repairs, and they must maintain these keys over the long lifetime of a car. Key Management is a daunting task.

Read More

Topics: Automotive, Autonomous Vehicles, Connected Vehicles, Cyber Security, Cryptography, Embedded Security, Research, Internet of Things

Why Consumers Need to Start Caring About Secure IoT

Posted by Gene Carter on Oct 27, 2017 10:12:33 AM

On Friday October 21, 2016, Dyn was subjected to two large Distributed Denial of Service (DDoS) attacks against their internet-address lookup Managed DNS infrastructure. The attackers used Mirai botnets launched from over 100,000 endpoints including cameras, DVRs and baby monitors to generate the significant volume of attack traffic. Affected services included Amazon, Spotify, Netflix and the New York Times.

Read More

Topics: Cyber Security, Internet of Things, Privacy, Connected Vehicles, Regulation

Broadening Support of DSRC for V2V Safety

Posted by Gene Carter on Oct 2, 2017 12:10:17 PM

Toyota recently sent a letter to the Federal Communications Commission (FCC) urging them to protect the 5.9 GHz band for Dedicated Short Range Communications (DSRC), the technology behind Vehicle-to-Vehicle (V2V)communications. Toyota noted that “The market leaders in Japan (Toyota), Europe (Volkswagen), and the United States (General Motors) have now either begun deployment of DSRC technology or announced a specific deployment plan for the technology.”

Read More

Topics: Automotive, Connected Vehicles, Cyber Security, Internet of Things, V2V, V2X, DSRC

Why Don’t More Cars Update Their Software Automatically?

Posted by Gene Carter on Sep 20, 2017 3:41:43 PM

Tesla is the only major automaker that offers over the air (OTA) updates of both software and firmware. This allows Tesla to add new features like new voice commands, driver profiles or blind spot warnings that weren’t available when the car was purchased. It also allows them to fix bugs that were either causing the car to not function as intended or to discourage potential hackers by patching vulnerabilities soon after they are discovered.

Read More

Topics: Automotive, Autonomous Vehicles, Cyber Security, Connected Vehicles, Internet of Things, V2X

UK Offers Cyber Security Guidance to Automotive Industry

Posted by Gene Carter on Aug 17, 2017 8:37:00 AM

Recently, the UK government released "The key principles of vehicle cyber security for connected and automated vehicles." This guidance document provides key cyber security principles for use by the automotive industry and its suppliers. This follows the US Government's guidelines that were issued last fall.

Read More

Topics: Automotive, Autonomous Vehicles, Connected Vehicles, Cyber Security, Regulation

Learn About the Latest in IoT Security from Our Team of Experts

 

OnBoard Security's security experts share insights on the latest security topics in:

  • Connected Cars
  • Autonomous Vehicles
  • Internet of Things
  • Quantum Computing

Subscribe to Email Updates

Recent Posts