Proceedings of the 49th Annual Design Automation Conference 2012
DOI: 10.1145/2228360.2228402
|View full text |Cite
|
Sign up to set email alerts
|

EDA for secure and dependable cybercars

Abstract: Modern vehicles integrate a multitude of embedded hard realtime control functionalities, and a host of advanced information and entertainment (infotainment) features. The true paradigm shift for future vehicles (cybercars) is not only a result of this increasing plurality of subsystems and functions, but is also driven by the unprecedented levels of intra-and inter-car connections and communications as well as networking with external entities.Several new cybercar security and safety challenges simultaneously … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
18
0

Year Published

2013
2013
2019
2019

Publication Types

Select...
5
2
1

Relationship

0
8

Authors

Journals

citations
Cited by 37 publications
(18 citation statements)
references
References 33 publications
0
18
0
Order By: Relevance
“…We apply our security-aware mapping algorithm with the accelerated SA and the two optimization techniques (OPT1 and OPT2). In addition to algorithm scalability, we are also interested in the impact of resource availability (specifically the network utilization 5 ) on the system performance and feasibility. Table II lists the objectives and runtimes under different signal periods and therefore different network utilizations (all settings are run with the same number of iterations).…”
Section: Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…We apply our security-aware mapping algorithm with the accelerated SA and the two optimization techniques (OPT1 and OPT2). In addition to algorithm scalability, we are also interested in the impact of resource availability (specifically the network utilization 5 ) on the system performance and feasibility. Table II lists the objectives and runtimes under different signal periods and therefore different network utilizations (all settings are run with the same number of iterations).…”
Section: Resultsmentioning
confidence: 99%
“…Once part of the system is compromised by attackers, other sub-systems or even the entire system might be affected. For instance, in automotive domain, researchers demonstrated that modern vehicles can be attacked from a variety of interfaces including physical access, shortrange wireless, and long-range wireless channels [2], [4], [5]. They also showed that by compromising one Electronic Control Unit (ECU) through those interfaces, the attacker may gain access to other ECUs via communication buses such as Controller Area Network (CAN) buses, and attack safety critical sub-systems such as engine and brake systems [2].…”
Section: Introductionmentioning
confidence: 99%
“…Attacks can have major consequences, ranging from significant social and economic losses to instabilities and service disruption [1]- [6]. Ensuring security is increasingly challenging in cyber-physical systems, where information security methods such as key management, secure communication, and code execution may guarantee the integrity of the cyber components and data, but are ineffective against insider and physical attacks.…”
Section: Introductionmentioning
confidence: 99%
“…In particular, assume that the measurement channels , with , are mutually independent and protected by the same encryption method (the measurement channels are not protected). The expected information retrieved by an attacker is defined as (6) where is the attacker probability to access encrypted channels, is the information obtained from the decrypted channels (together with the unprotected channels), contains all possible subsets of encrypted channels, is the cardinality of , and is the -th element of . Specifically, is the ordered set…”
Section: Introductionmentioning
confidence: 99%
“…It has been the most attractive protocol for attackers [6], [10], [12]. There is no direct support for secure communication in CAN, and the limitations on bus bandwidths and message lengths make it very challenging to embed security in CAN without hindering the safety applications [18].…”
Section: Introductionmentioning
confidence: 99%