Design, Automation &Amp; Test in Europe Conference &Amp; Exhibition (DATE), 2013 2013
DOI: 10.7873/date.2013.102
|View full text |Cite
|
Sign up to set email alerts
|

Security Challenges in Automotive Hardware/Software Architecture Design

Abstract: This paper gives an introduction to security challenges arising during the design of automotive hardware/software architectures. State-of-the-art automotive architectures are highly heterogeneous and complex systems that rely on distributed functions based on electronics and software as well as various bus systems and protocols. With the growing connectivity of vehicles, including wireless communication like WiFi or Bluetooth, the vulnerability to attacks infiltrating the system is rapidly growing. Despite thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
31
0
2

Year Published

2015
2015
2024
2024

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 91 publications
(33 citation statements)
references
References 13 publications
0
31
0
2
Order By: Relevance
“…It makes the BMS a powerful tool, which if vulnerable, could be used by adversaries to attain valuable information and control all BMS functions, including ignoring critical battery conditions and tolerating high voltages and currents, to damage the battery and even to ignite a fire [41]. Actually, without proper protection on the safety and security of the BMS, the more functional a BMS is, the more vulnerable a battery system could be, as the adversary can manipulate more behavior of the battery and get more information.…”
Section: Attack Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…It makes the BMS a powerful tool, which if vulnerable, could be used by adversaries to attain valuable information and control all BMS functions, including ignoring critical battery conditions and tolerating high voltages and currents, to damage the battery and even to ignite a fire [41]. Actually, without proper protection on the safety and security of the BMS, the more functional a BMS is, the more vulnerable a battery system could be, as the adversary can manipulate more behavior of the battery and get more information.…”
Section: Attack Modelmentioning
confidence: 99%
“…It goes without saying, but future autonomous vehicles may experience similar security vulnerabilities as EVs, especially with high levels of autonomous processing units and interconnectivity in the application layer (see software-defined batteries for heterogenous battery systems such as EVs and mobile systems proposed by Microsoft, Tesla, University of Massachusetts Amherst, and Columbia University [5]). Already, researchers have expressed their concerns over the importance of securing EV battery systems [42].…”
Section: Attacks Targeting Availabilitymentioning
confidence: 99%
“…The system is a combination of integrated software and hardware system, beidou navigation satellite system, mass data fast access technology, data classification technology, remote vehicle data collection and problemsolving mode and message push technology [3].…”
Section: Technical Researchmentioning
confidence: 99%
“…As regards the storage of a BMS, data that defines the history of the battery has to be stored for a sufficient period of time. An important observation is that while data storage prices are decreasing, storage space in embedded systems is still very costly, especially in automotive applications, because of high safety standards and cost pressure [28]. In these scenarios, data on selected parameters, such as cycle life or the maximum remaining capacity [29], might be saved as histograms.…”
Section: Extending Bmss For Making Decisions On Battery Reusementioning
confidence: 99%