DOI: 10.32657/10220/45957
|View full text |Cite
|
Sign up to set email alerts
|

Security for automotive electrical/electronic (E/E) architectures

Abstract: The following people had significant impact on this research and without them, this thesis would not have been possible. I would like to especially thank my advisors from TUM and NTU, Samarjit Chakraborty and Suhaib A. Fahmy for their supervision and advise when undertaking this thesis. Their insights into the processes and feedback helped shape the work leading to the thesis presented here, as well as the thesis itself. Furthermore, I extend my deepest gratitude to Martin Lukasiewycz and Sebastian Steinhorst,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
10
0
1

Publication Types

Select...
5
4

Relationship

0
9

Authors

Journals

citations
Cited by 11 publications
(11 citation statements)
references
References 57 publications
0
10
0
1
Order By: Relevance
“…The modern vehicles are equipped with around 100 Electronic Control Unit (ECU) to control the electrical systems to improve driving comfort and safety [1] [2]. ECUs control most of the car's functions including safety critical engine control, airbag deployment, and anti-lock braking system.…”
Section: Introductionmentioning
confidence: 99%
“…The modern vehicles are equipped with around 100 Electronic Control Unit (ECU) to control the electrical systems to improve driving comfort and safety [1] [2]. ECUs control most of the car's functions including safety critical engine control, airbag deployment, and anti-lock braking system.…”
Section: Introductionmentioning
confidence: 99%
“…The CAN protocol has also gained attention from the industry to its vulnerabilities, and companies are now manufacturing high-end secure ECUs. The Secure Hardware Extension (SHE) [76] specification developed by the Hersteller Initiative (HIS) becomes an open standard and used by many companies in their ECUs like NXP MPC5646C [52] microcontroller. Some commercial ECUs have built-in IDS; the NXP TJA115x [77] series can prevent spoofing attacks and be used as an IDS.…”
Section: Discussion On Can Security Researchmentioning
confidence: 99%
“…Security challenges arise from Vehicle-to-X (V2X) communication with other vehicles, road side units and the Internet, opening the vehicle to remote attackers. Together with the tightened interconnection of internal domains with different security requirements this increases the vulnerability of safetycritical functions and requires versatile measures to secure future vehicles [9]. Current vehicles are vulnerable to manipulation by third parties, which has been shown in cyberattacks in the field [10].…”
Section: Introductionmentioning
confidence: 99%