2008 IEEE Globecom Workshops 2008
DOI: 10.1109/glocomw.2008.ecp.56
|View full text |Cite
|
Sign up to set email alerts
|

A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
28
0

Year Published

2011
2011
2022
2022

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 41 publications
(28 citation statements)
references
References 17 publications
0
28
0
Order By: Relevance
“…This research is related to a number of research studies [4], [17], [18]. For instance, [19] introduces a Secure Firmware updates Over The Air (SFOTA) protocol for intelligent vehicles in order to secure the transmission of the firmware code between the portal and the vehicle. The proposed framework facilitates code verification for firmware updates based on a simple hash chain calculation on memory contents, a challenge-response mechanism, and the inclusion of random numbers to prevent pre-image attacks.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This research is related to a number of research studies [4], [17], [18]. For instance, [19] introduces a Secure Firmware updates Over The Air (SFOTA) protocol for intelligent vehicles in order to secure the transmission of the firmware code between the portal and the vehicle. The proposed framework facilitates code verification for firmware updates based on a simple hash chain calculation on memory contents, a challenge-response mechanism, and the inclusion of random numbers to prevent pre-image attacks.…”
Section: Related Workmentioning
confidence: 99%
“…If the user application receives C6, it can decrypt it using its secret key (refer to (19)) to extract the validity status based on the validity of the received user nonce value (refer to Fig. 3: step 20) as follows:…”
Section: E Security Notationsmentioning
confidence: 99%
“…In a typical FOTA update, a firmware binary is sent from an Original Equipment Manufacturer (OEM) or other party from the backend system via the TCC to the Telematic Control Moduel in the car and then flashed to the ROM of the ECU [37]. The binary goes through a series of communication channels (including Internet, wireless communication, and in-car buses) and entities, which possess a large attack surface from a security point of view.…”
Section: Chassismentioning
confidence: 99%
“…The binary goes through a series of communication channels (including Internet, wireless communication, and in-car buses) and entities, which possess a large attack surface from a security point of view. Following the guideline in [38] and based on existing work [39,37,36], several misuse cases are identified in the CHASSIS security assessment. The threats and threat scenarios are identified using the information security Confidentiality, Integrity, and Availability (CIA) model in a brainstorming session.…”
Section: Chassismentioning
confidence: 99%
“…In this work, we describe both kinds (software and firmware) as SOTA considering firmware as a special case of software. The Over The Air (OTA) approach would minimize the customer inconvenience and allow faster updates, since the software could be downloaded, as soon as the release is ready [5]. Otherwise, it will save important costs compared to the traditional update process in the workshop.…”
Section: Introductionmentioning
confidence: 99%