2018
DOI: 10.5383/juspn.10.01.001
|View full text |Cite
|
Sign up to set email alerts
|

Signal-Layer Security and Trust-Boundary Identification based on Hardware-Software Interface Definition

Abstract: An important trend in the automotive domain is to adapt established functional safety processes and methods for security engineering. Although functional safety and cyber-security engineering have a considerable overlap, the trend of adapting methods from one domain to the other is often challenged by non-domain experts. Just as safety became a critical part of the development in the late 20th century, modern vehicles are now required to become resilient against cyber-attacks. As vehicle providers gear up for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
6

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…(2) Isolating car interface from the VMN. Macher et al used the signal interface method to identify the attack vector of automobile system, so as to prevent the malicious attack from accessing and invading the system 15 . Although such methods can reduce security risks, they are not effective in preventing internal attacks, and it is increasingly difficult to completely isolate intelligent connected vehicles due to the increasing number of external interfaces.…”
Section: Introductionmentioning
confidence: 99%
“…(2) Isolating car interface from the VMN. Macher et al used the signal interface method to identify the attack vector of automobile system, so as to prevent the malicious attack from accessing and invading the system 15 . Although such methods can reduce security risks, they are not effective in preventing internal attacks, and it is increasingly difficult to completely isolate intelligent connected vehicles due to the increasing number of external interfaces.…”
Section: Introductionmentioning
confidence: 99%
“…To secure vehicular environments, two different approaches have been considered: security countermeasures based on encryption and authentication for data over vehicular networks, and intrusion detection systems that can detect suspicious activities on the networks [ 18 , 19 , 20 , 21 , 22 , 23 , 24 , 25 , 26 , 27 ]. In this work, we focus on the intrusion detection system based on the estimation of the Rényi entropy with multiple orders [ 28 ].…”
Section: Introductionmentioning
confidence: 99%