A blog by Oleg Shilovitsky
Information & Comments about Engineering and Manufacturing Software

How PLM can simulate a potential hardware hack

How PLM can simulate a potential hardware hack
Oleg
Oleg
5 August, 2015 | 3 min for reading

hack-hardware-plm-simulation

Products are getting more complex. Sensors, connected devices, cloud software – you can see these elements in almost every hardware product nowadays. Which brings an additional level of vulnerability into products we use. The story about hacking Jeep vehicle on a highway), made me think about how PLM software can prevent this situation. If you missed that, navigate to read – How PLM can prevent a car from being hacked. It generated an interesting discussion. In a nutshell – current incarnation of PLM systems are not capable to do so. Moreover, PLM considered as a tool that helps to document design and related data, but not the tool can help engineers to find a potential product flaw.

Meantime, another article about hardware product hack caught my attention this morning. Again, WIRED magazine published – Hackers Can Seize Control of Electric Skateboards and Toss Riders. The story is fascinating and the reason of a problem was actually not a hack, but Bluetooth communication problem. Here is an interesting passage:

It didn’t take long to determine that Bluetooth noise in the neighborhood was the likely culprit. The intersection, near Federation Square, was notorious for being saturated with radio frequency noise. Healey was controlling his board with a handheld remote that sent drive commands to the board via Bluetooth. It was clear he hadn’t been hacked; instead, he concluded, a flood of Bluetooth traffic from devices around him had interfered with his remote’s connection to the board.

You can say – this is a problem of design and PLM system has nothing to do with that. But what if we can look at this problem with a bit different angle. Any product is vulnerable via list of components and systems involved into this product. It is possible to identify potential ways to hack these elements. I think, it is not very complicated task to find and document potential hacking behavior. By matching the list of potential hacks with bill of materials, software can simulate potential ways to hack a product you are designing. Add some predictive analytic to the story and it can be useful for hardware companies.

It made me think about PLM platforms we have today. Is it possible to use them as a foundation to simulate a potential hardware hack? Probably yes, but here is the thing… If you have PLM system up and running in your company, you might have enough information to find a potential hack. But, when most of companies are using DIY PLM Spreadsheetware, it could be a problem.

What is my conclusion? Product data is a fundamental requirement to get any type of simulation done. Similar to the fact you need geometrical data to run FEA, you need to have a complete set of information about product, components and systems in your product to simulate a potential hack. PLM system is supposed to provide a solution to manage this data sets, but it requires expensive and complex implementation. Which makes it out of reach for many hardware companies these days. A note to think about for PLM strategists cracking down a way to connect PLM and IoT. Just my thoughts…

Best, Oleg

Picture credit to WIRED article

Recent Posts

Also on BeyondPLM

4 6
5 August, 2010

Six months ago, I posted “Collaboration Trends or Why I Stopped Using Google Wave?“. After Google’s announcement about Google Wave termination...

28 November, 2024

Product Lifecycle Management (PLM) is a concept that has been around for decades. Being in this business for the last...

27 February, 2018

The last article inspired by presentations and discussions at PI PLMx last week is about integration and collaboration. That was...

21 June, 2010

My post “How To Manage ECO Without Paying $1’500 Per Seat” raised a very interesting discussion on Zero-Waite State blog...

11 March, 2014

For the last few years, I’ve been chatting about the opportunity to use Google infrastructure and tools to innovate in...

25 July, 2014

SaaS, PaaS, IaaS, DMaaS, … I’m sure marketing folks are having lots fun of new xaaS acronyms. The amount of...

16 December, 2012

The simplicity of DropBox and similar cloud based file storage makes it very attractive to many people. Engineers are not...

18 March, 2010

The online space influence on the enterprise systems and processes is increasing. During the last year and half, we have...

23 January, 2009

The issue of information overload is growing in importance. People are getting more and more information via different sources –...

Blogroll

To the top