2019 IEEE 89th Vehicular Technology Conference (VTC2019-Spring) 2019
DOI: 10.1109/vtcspring.2019.8746516
|View full text |Cite
|
Sign up to set email alerts
|

Towards a Security Architecture for Protecting Connected Vehicles from Malware

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 16 publications
(12 citation statements)
references
References 13 publications
0
12
0
Order By: Relevance
“…However, softwares are never perfect. It is commonly assumed the existence of many vulnerabilities that can be exploited to cause unexpected behaviors using malware leading to life-threatening situations [100]. Software vulnerabilities are caused by software errors and flaws introduced during the design or implementation phases.…”
Section: ) Software Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…However, softwares are never perfect. It is commonly assumed the existence of many vulnerabilities that can be exploited to cause unexpected behaviors using malware leading to life-threatening situations [100]. Software vulnerabilities are caused by software errors and flaws introduced during the design or implementation phases.…”
Section: ) Software Vulnerabilitiesmentioning
confidence: 99%
“…For the implementation of communication protocols, hardware drivers, as well as user applications, modern vehicular software could have more than 100 million lines of code exposed to all kinds of software vulnerabilities [100]. This gives opportunities for attackers to design effective malware to gain unauthorized access and disrupt the regular functioning of vehicles.…”
Section: C: Malware Attackmentioning
confidence: 99%
“…The increased internet connectivity offered by vehicles has led to challenges in securing the vehicular network as the attack surface area increases [20]. Modern vehicles allow devices to be connected via infotainment systems, creating a pathway to inject malware compromising ECU leading to unforeseen consequences.…”
Section: Literature Surveymentioning
confidence: 99%
“…Modern vehicles allow devices to be connected via infotainment systems, creating a pathway to inject malware compromising ECU leading to unforeseen consequences. A framework for vehicular malware characterization and protection has been proposed in [20]. The framework uses virtualization to reduce the vehicular attack surface.…”
Section: Literature Surveymentioning
confidence: 99%
“…When the gateway has the proposed IDS module, it can predict and detect malware attacks from external ports. have reported that malware can be detected in the network tra c of devices [18,19]. is paper selected nine features using the IFS method and shows that malware can be detected from the network tra c using a machine learning-based IDS module.…”
Section: Intrusion Detection Modulementioning
confidence: 99%