Proceedings of the 3rd International Conference on Networking, Information Systems &Amp; Security 2020
DOI: 10.1145/3386723.3387883
|View full text |Cite
|
Sign up to set email alerts
|

Verification of Integrity in Vehicle Architectures

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(4 citation statements)
references
References 7 publications
0
4
0
Order By: Relevance
“…This method demands a verification approach on the architectural level refined throughout the complete development process. For that, preliminary work exists [19] [20] [21], which we now want to develop further.…”
Section: Discussionmentioning
confidence: 99%
“…This method demands a verification approach on the architectural level refined throughout the complete development process. For that, preliminary work exists [19] [20] [21], which we now want to develop further.…”
Section: Discussionmentioning
confidence: 99%
“…Verification of security properties is also demonstrated by Jakobs et al [14], in which an approach for integrity verification of vehicle architectures is presented. The authors view integrity as an information flow problem and discuss existing security measures, such as secure and authenticated boot, Hardware Security Modules (HSMs), or message authentication, to ensure this property.…”
Section: Approaches Based On Testing/verifying Security Mechanisms Pr...mentioning
confidence: 98%
“…Jakobs et al present an extension in [193]. The authors use the same architecture as in [14] to illustrate their approach. The architecture includes two ECUs and a gateway connected by Ethernet via a router.…”
Section: Approaches Based On Testing/verifying Security Mechanisms Pr...mentioning
confidence: 99%
See 1 more Smart Citation