2016
DOI: 10.1007/978-3-319-44817-6_12
|View full text |Cite
|
Sign up to set email alerts
|

Supporting Cyber-Security Based on Hardware-Software Interface Definition

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
2
1

Relationship

3
5

Authors

Journals

citations
Cited by 35 publications
(15 citation statements)
references
References 8 publications
0
15
0
Order By: Relevance
“…And in cybersecurity, an additional view of a cybersecurity related defence model with static and dynamic design will be needed (Figures and ).…”
Section: Integrating Automotive Spice Functional Safety and Cybersementioning
confidence: 99%
“…And in cybersecurity, an additional view of a cybersecurity related defence model with static and dynamic design will be needed (Figures and ).…”
Section: Integrating Automotive Spice Functional Safety and Cybersementioning
confidence: 99%
“…In our work [9] we described the linking of such a HSI based attack vectors identification in relation to the afore mentioned Automotive SPICE reference model and also in relation to the ISO 26262 -road vehicle functional safety standard. Other works postulate the problematic of defining HW/SW interfaces are part of an emerging domainindependent paradigm for contract-based design.…”
Section: Related Workmentioning
confidence: 99%
“…This follows the concept of a layered cybersecurity defense approach mentioned before. [4], AutomotiveSPICE [5], and SAE J3061 [3]), scientific papers like [8,14], and the authors' experiences [9]. Security related information have been added (marked in coloured text) to support identification of attack vectors via their signal interfaces of the systems.…”
Section: Security Extensionmentioning
confidence: 99%
“…This follows the concept of a layered cybersecurity defense approach mentioned before. Table 2 itemizes essential HSI attributes extracted from standards (ISO 26262 [4], AutomotiveSPICE [5], and SAE J3061 [3]), scientific papers like [8,14], and the authors' experiences [9]. Security related information have been added (marked in coloured text) to support identification of attack vectors via their signal interfaces of the systems.…”
Section: Security Extensionmentioning
confidence: 99%