Filters








17,502 Hits in 6.8 sec

Towards a security‐driven automotive development lifecycle

Jürgen Dobaj, Georg Macher, Damjan Ekert, Andreas Riel, Richard Messnarz
2021 Journal of Software: Evolution and Process  
Cybersecurity has become one of the most crucial challenges in the automotive development lifecycle.  ...  The upcoming ISO/SAE 21434 standard provides only a generic framework that is insufficient to derive concrete design methods. This article  ...  The publication reflects only the author's view, and that the funding agency is not responsible for any use that may be made of the information it contains.  ... 
doi:10.1002/smr.2407 fatcat:hmjmqxgmwrcyzdzbbxi7gemvma

Security Patterns for Connected and Automated Automotive Systems*

Betty H. C. Cheng, Bradley Doherty, Nicholas Polanco, Matthew Pasco
2020 Journal of Automotive Software Engineering  
While these security patterns, along with security solutions such as encryption and secure network protocols, have helped to harden many software systems, the unique architecture of automotive systems  ...  This paper introduces a collection of security design patterns targeted for automotive cybersecurity needs.  ...  ACKNOWLEDGMENTS We greatly appreciate the feedback provided by the anonymous reviewers, which has greatly helped to improve the paper.  ... 
doi:10.2991/jase.d.200826.001 fatcat:yruvzyg2avbvvbmb2nolgdad64

Security in Automotive Networks

Philipp Mundhenk, Andrew Paverd, Artur Mrowca, Sebastian Steinhorst, Martin Lukasiewycz, Suhaib A. Fahmy, Samarjit Chakraborty
2017 ACM Transactions on Design Automation of Electronic Systems  
Unlike previous work, we also explain how this framework can be integrated into all aspects of the automotive lifecycle, including manufacturing, vehicle maintenance, and software updates.  ...  We present Lightweight Authentication for Secure Automotive Networks (LASAN), a full lifecycle authentication approach.  ...  This step is crucial, as insufficient claims would lead to security flaws being ignored by Scyther.  ... 
doi:10.1145/2960407 fatcat:uczublsdiraixpdffjjcwonidy

Automotive Security Testing—The Digital Crash Test [chapter]

Stephanie Bayer, Thomas Enderle, Dennis-Kengo Oka, Marko Wolf
2015 Lecture Notes in Mobility  
Facing this challenge, the paper at hand will first introduce some potential automotive security attacks and some important automotive security threats.  ...  However, in contrast to safety testing systematic testing against potential security gaps is not yet a common procedure within the automotive domain.  ...  The next step, vulnerability scanning, tests the system for already known common security vulnerabilities, for instance, known security exploits or (security) configurations with known weaknesses.  ... 
doi:10.1007/978-3-319-19818-7_2 fatcat:smb34xbe4beu3lrzyymkjqyg6u

Survey and Classification of Automotive Security Attacks

Florian Sommer, Jürgen Dürrwang, Reiner Kriesten
2019 Information  
Due to current development trends in the automotive industry towards stronger connected and autonomous driving, the attack surface of vehicles is growing which increases the risk of security attacks.  ...  In order to be able to use the information that security attacks can provide for the development of security concepts and for testing automotive systems, we propose a comprehensive taxonomy with degrees  ...  Acknowledgments: We thank the reviewers for their inspiring comments. Conflicts of Interest: The authors declare no conflict of interest.  ... 
doi:10.3390/info10040148 fatcat:5t6rytnmgjc6hnylaq5rcia474

BlockChain: A distributed solution to automotive security and privacy [article]

Ali Dorri, Marco Steger, Salil S. Kanhere, Raja Jurdak
2017 arXiv   pre-print
Wireless remote software updates and other emerging services such as dynamic vehicle insurance fees, are used to illustrate the efficacy of the proposed security architecture.  ...  We propose a BC-based architecture to protect the privacy of the users and to increase the security of the vehicular ecosystem.  ...  His research interests encompass dependable wireless and automotive communication networks, security in wireless/mobile/automotive networks, dependable wireless sensor networks, automotive software and  ... 
arXiv:1704.00073v2 fatcat:w7eltqzjxne5to3duytbkyi5ka

Research on automotive ECU remote update and it's security

Ji Zhang, Yu Lv, Zhi Liao
2018 Journal of Physics, Conference Series  
With the rapid development of automotive electronic technology, more ECUs with much complicated control programs are used in automobile, which could cause serious problems in security and sensitivity.  ...  To solve this problem, on-board ECU software program needs to be upgraded.  ...  can accurately determine whether the file is modified, and then determine whether the next step should be in operation or not; By adding the identity authentication mechanism, based on the software package  ... 
doi:10.1088/1742-6596/1074/1/012133 fatcat:s6d3slcuwrc7rpbwk7dqmb6ls4

Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms

Thomas Rosenstatter, Tomas Olovsson
2018 2018 21st International Conference on Intelligent Transportation Systems (ITSC)  
Second, we identify suitable security mechanisms and design rules for automotive system design and associate them with appropriate security levels.  ...  We address this problem first by suggesting that the risk assessment process should result in five security levels, similar to the functional safety standard ISO 26262.  ...  ACKNOWLEDGMENT This research was funded by the HoliSec project (2015-06894) funded by VINNOVA, the Swedish Governmental Agency for Innovation Systems.  ... 
doi:10.1109/itsc.2018.8569679 dblp:conf/itsc/RosenstatterO18 fatcat:p2tjao45kbfgzn4d2gdsjya5he

Securing Automotive Architectures with Named Data Networking [article]

Zachariah Threet, Christos Papadopoulos, William Lambert, Proyash Podder, Spiros Thanasoulas, Alex Afanasyev, Sheikh Ghafoor, Susmit Shannigrahi
2022 arXiv   pre-print
Common characteristics of these architectures include the need for high-bandwidth communication and security, which have been elusive with standard automotive architectures.  ...  Security is achieved through digitally signing all Data packets between these components, preventing unauthorized ECUs from injecting arbitrary data into the network.  ...  dynamically or by software updates from the manufacturer.  ... 
arXiv:2206.08278v1 fatcat:bdumj5nycncajk6nw5thjwqipu

Working consumers: the next step in marketing theory?

Bernard Cova, Daniele Dalli
2009 Marketing Theory  
However, given certain conditions, companies capture such a value when it enters the second level of sociality (the market).  ...  The concept of the working consumer summarises and enriches extant approaches to consumer (co)production, while challenging right-minded developments, such as the service-dominant (S-D) logic in marketing  ...  In the next section, we review the research streams that have addressed this phenomenon from different theoretical perspectives.  ... 
doi:10.1177/1470593109338144 fatcat:kufrlevh3raprio437cpq4ibzm

Open Problems when Mapping Automotive Security Levels to System Requirements

Thomas Rosenstatter, Tomas Olovsson
2018 Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems  
Securing the vehicle has become an important matter in the automotive industry.  ...  Given these areas of application, it is evident that a security standard for the automotive domain that considers security from the beginning of the development phase to the operational and maintenance  ...  Open Problems when Mapping Automotive Security Levels to System Requirements  ... 
doi:10.5220/0006665302510260 dblp:conf/vehits/RosenstatterO18 fatcat:mqbr34svf5aljfzqxnljd7uuvm

Importance of Battery Recycling & Swapping: The Next Inevitable Step in EV Supply Chain

Ajay Serohi
2021 figshare.com  
One of the key obstacles in the way to the speedy adoption of EVs is range anxiety.  ...  VehiThe purpose of this study is to fathom the importance of battery supply chain including battery swapping and recycling as well as the charging infrastructure as nodes in the electric vehicle (EV) supply  ...  will run out of electricity prior to reaching the next available charging station [3] .  ... 
doi:10.6084/m9.figshare.14132261.v2 fatcat:zde4ojrdn5dqnch2h23nhzsehu

Practical Vulnerability-Information-Sharing Architecture for Automotive Security-Risk Analysis

Yousik Lee, Samuel Woo, Yunkeun Song, Jungho Lee, Dong Hoon Lee
2020 IEEE Access  
His research interests include cryptographic protocol, applied cryptography, functional encryption, software protection, mobile security, vehicle security, and ubiquitous sensor network (USN) security.  ...  INDEX TERMS Automotive cybersecurity, automotive CVE, cyber kill chain, information sharing, security risk analysis. DONG HOON LEE (Member, IEEE) received the B.S. degree from the .  ...  This convergence of automotive and ICT has become a new paradigm for the development of next-generation automobiles.  ... 
doi:10.1109/access.2020.3004661 fatcat:2v36acc4y5gbvotbydb2ltotmy

A Formal Model to Facilitate Security Testing in Modern Automotive Systems

Eduardo dos Santos, Andrew Simpson, Dominik Schoop
2018 Electronic Proceedings in Theoretical Computer Science  
While this contribution represents initial steps, we are mindful of the ultimate objective of generating test code to exercise the security of vehicle bus systems.  ...  We provide the starting point for a model-based framework designed to support the security testing of modern cars.  ...  The authors thank the anonymous reviewers for their constructive comments.  ... 
doi:10.4204/eptcs.271.7 fatcat:ghljneclobdshc63amqcraaefu

Randomization for Safer, more Reliable and Secure, High-Performance Automotive Processors

David Trilla, Carles Hernandez, Jaume Abella, Francisco J. Cazorla
2019 IEEE design & test  
The automotive domain is witnessing a relentless transition to autonomous cars demanding high-performance processors to timely execute complex, critical, decision-making software.  ...  The other side of the coin is that high-performance processors include hardware features like shared multilevel caches and multiple cores that expose the system to significant security threats, challenge  ...  ACKNOWLEDGMENTS This work has been partially funded by the Spanish Ministry of Science and Innovation under grant TIN2015-65316-P.  ... 
doi:10.1109/mdat.2019.2927373 fatcat:nsgnc5qup5eiza7imooexyy5ce
« Previous Showing results 1 — 15 out of 17,502 results