2017
DOI: 10.1109/ms.2017.78
|View full text |Cite
|
Sign up to set email alerts
|

Secure Automotive Software: The Next Steps

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 17 publications
(6 citation statements)
references
References 11 publications
0
5
0
Order By: Relevance
“…Lee et al [12] discussed how compile-time assurance, runtime protection, automated testing and architectural security could be used in automotive software. Seshia et al [13] discussed the major challenges in applying formal methods in the specification, design and verification of semi-autonomous vehicles.…”
Section: ) Safety and Security Of Autonomous Driving Vehiclesmentioning
confidence: 99%
“…Lee et al [12] discussed how compile-time assurance, runtime protection, automated testing and architectural security could be used in automotive software. Seshia et al [13] discussed the major challenges in applying formal methods in the specification, design and verification of semi-autonomous vehicles.…”
Section: ) Safety and Security Of Autonomous Driving Vehiclesmentioning
confidence: 99%
“…Although common IT security concepts can be used to design car electronics, there are some specific constraints to consider both in the hardware and the software side, as summarised by Studnia et al [26] and Pike et al [18]:…”
Section: A Constraintsmentioning
confidence: 99%
“…Finally, we conducted the full-text reading and excluded 40 more publications. As a result, the set of 28 publications remained ( [28], [35], [52], [40], [27], [57], [63], [51], [50], [65], [42], [38], [31], [47], [62], [46], [30], [34], [37], [61], [36], [44], [53], [39], [32], [45], [29]), which was used for executing the snowballing iterations. Finally, 11 new publications were identified with the snowballing methodology: ( [48], [49], [55], [43], [64], [33], [41], [60], [56], [58], [54]), which were added to the final set of 39 papers.…”
Section: Selection Processmentioning
confidence: 99%
“…One may question the fact that we code-based techniques applying attacks on the privacy, availability and authentication. A reason might be that code-based techniques were paired together with penetration testing and dynamic analysis approaches as demonstrated in [29] and [53].…”
Section: Key Findings and Interpretationmentioning
confidence: 99%