Proceedings of the 2013 ACM Workshop on Security, Privacy &Amp; Dependability for Cyber Vehicles 2013
DOI: 10.1145/2517968.2517969
|View full text |Cite
|
Sign up to set email alerts
|

Practical information-flow aware middleware for in-car communication

Abstract: Today's vehicles are increasingly connected to Internet, devices and integrate more and more electronic components. More than just ensuring their passengers' safety, which remains nevertheless one of their main objectives, cars have to deal with private information and encounters the same security issues as traditional computers. Until recently, automotive technologies allowed very little space for security, but the transition towards full Ethernet-based on-board network will change this situation. In this pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
5
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(5 citation statements)
references
References 8 publications
0
5
0
Order By: Relevance
“…However, it required a strict timing synchronization to inject and launch the attack. Authentication and encryption for in-vehicle communication were also proposed [22], [23]. However, the overhead of such mechanisms hindered the practical adoption.…”
Section: ) Safety and Security Of Autonomous Driving Vehiclesmentioning
confidence: 99%
“…However, it required a strict timing synchronization to inject and launch the attack. Authentication and encryption for in-vehicle communication were also proposed [22], [23]. However, the overhead of such mechanisms hindered the practical adoption.…”
Section: ) Safety and Security Of Autonomous Driving Vehiclesmentioning
confidence: 99%
“…Implementations of a decentralised model akin to Myers' include a sensitive embedded system for BMW cars [12] and XBook [13] in a social media context. Our own model is described in §3.…”
Section: Ifc Modelsmentioning
confidence: 99%
“…In a cloud context, we believe that it is a reasonable assumption that the cloud service provider is more trusted and trustworthy than the many tenants' applications. 2 This means that when parties need to collaborate they do not need mutual trust, but only a shared trust in the underlying IFC enforcement mechanism.…”
Section: Information Flow Control (Ifc)mentioning
confidence: 99%
“…IFC can be integrated into a distributed system environment [38], and can run on a variety of devices including cars [2], while the trust in the enforcement mechanism can be assured through the use of 'trusted hardware' [25].…”
Section: Usage Controlmentioning
confidence: 99%