2017
DOI: 10.1016/j.procs.2017.05.317
|View full text |Cite
|
Sign up to set email alerts
|

An Automotive Signal-Layer Security and Trust-Boundary Identification Approach

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…In that work, we also provide an evaluation of available analysis methods and a review of recommended threat analysis methods. In Macher et al, 25 we investigate systematic approaches to support the identification of trust boundaries and attack vectors for the safety‐ and cybersecurity‐related aspects of complex automotive systems. In Macher et al and Riel et al, 4,26 we proposed a structured method to integrate security and safety engineering in the existing Automotive SPICE context.…”
Section: Related Workmentioning
confidence: 99%
“…In that work, we also provide an evaluation of available analysis methods and a review of recommended threat analysis methods. In Macher et al, 25 we investigate systematic approaches to support the identification of trust boundaries and attack vectors for the safety‐ and cybersecurity‐related aspects of complex automotive systems. In Macher et al and Riel et al, 4,26 we proposed a structured method to integrate security and safety engineering in the existing Automotive SPICE context.…”
Section: Related Workmentioning
confidence: 99%
“…Although CAN bus can provide reliable communication, it also suffers from some security loopholes. Hackers can use these loopholes to launch attacks to cars, thus affecting the normal driving of them and even endangering the life safety of drivers [ 9 ]. In recent years, cyber attacks on cars have emerged in an endless stream, and there is an increasing trend every year [ 10 ].…”
Section: Introductionmentioning
confidence: 99%
“…To secure vehicular environments, two different approaches have been considered: security countermeasures based on encryption and authentication for data over vehicular networks, and intrusion detection systems that can detect suspicious activities on the networks [ 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 ]. In this work, we focus on the intrusion detection system based on the estimation of the Rényi entropy with multiple orders [ 28 ].…”
Section: Introductionmentioning
confidence: 99%