2011
DOI: 10.1007/978-3-642-19786-4_20
|View full text |Cite
|
Sign up to set email alerts
|

Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
13
0

Year Published

2013
2013
2021
2021

Publication Types

Select...
5
3
2

Relationship

0
10

Authors

Journals

citations
Cited by 38 publications
(13 citation statements)
references
References 7 publications
0
13
0
Order By: Relevance
“…Researchers has proposed different techniques such as: (i) use of hardware security modules (HSMs) for secure boot, processing and storage [152]; (ii) various isolation mechanisms (e.g., by using virtualization, container, microkernel, etc.) [153], [154]; (iii) hardware/software architecture for over-the-air (OTA) updates [155]; (iv) statistical analysis of ECU firmware images by reverse engineering to detect misbehaving ECUs [156], etc. to name but a few.…”
Section: Threats To Intra-vehicle Components and Countermeasuresmentioning
confidence: 99%
“…Researchers has proposed different techniques such as: (i) use of hardware security modules (HSMs) for secure boot, processing and storage [152]; (ii) various isolation mechanisms (e.g., by using virtualization, container, microkernel, etc.) [153], [154]; (iii) hardware/software architecture for over-the-air (OTA) updates [155]; (iv) statistical analysis of ECU firmware images by reverse engineering to detect misbehaving ECUs [156], etc. to name but a few.…”
Section: Threats To Intra-vehicle Components and Countermeasuresmentioning
confidence: 99%
“…The binary goes through a series of communication channels (including Internet, wireless communication, and in-car buses) and entities, which possess a large attack surface from a security point of view. Following the guideline in [38] and based on existing work [39,37,36], several misuse cases are identified in the CHASSIS security assessment. The threats and threat scenarios are identified using the information security Confidentiality, Integrity, and Availability (CIA) model in a brainstorming session.…”
Section: Chassismentioning
confidence: 99%
“…In 2011, Idrees et al proposed a protocol which guaranteed a secured FOTA in wireless vehicles [7]. They mainly focussed on hardware security mechanism.…”
Section: Firmware Updates Over the Air (Fota) And Wireless Diagnosticsmentioning
confidence: 99%