Combining Third Party Components Securely in Automotive Systems (original) (raw)

A review of Bluetooth security in the automotive environment

Martin Glavin

Irish Signals and Systems Conference 2004, 2004

View PDFchevron_right

Securing the Connected Car: A Security-Enhancement Methodology

Tomas Olovsson

IEEE Vehicular Technology Magazine, 2018

View PDFchevron_right

Understanding Common Automotive Security Issues and Their Implications

Tomas Olovsson

2018

View PDFchevron_right

Comprehensive Experimental Analyses of Automotive Attack Surfaces

Brian Kantor

View PDFchevron_right

Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms

Tomas Olovsson

2018 21st International Conference on Intelligent Transportation Systems (ITSC), 2018

View PDFchevron_right

CASCADE: An Asset-driven Approach to Build Security Assurance Cases for Automotive Systems

Örjan Askerdal

ACM Transactions on Cyber-Physical Systems

View PDFchevron_right

Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications

Madeline Cheah

Information Security Theory and Practice, 2018

View PDFchevron_right

Secure Integration of Mobile Devices for Automotive Services

Stefano Zanero

View PDFchevron_right

Securing the Car: How Intrusive Manufacturer-Supplier Approaches Can Reduce Cybersecurity Vulnerabilities

Mohamed Amin

Technology Innovation Management Review

View PDFchevron_right

An Approach for the Identification of Information Leakage in Automotive Infotainment systems

Abdul Moiz

2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2020

View PDFchevron_right

VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks

Jan Tobias Muehlberg

View PDFchevron_right

A Secure-by-Design Framework for Automotive On-board Network Risk Analysis

Michele Carminati

2019 IEEE Vehicular Networking Conference (VNC), 2019

View PDFchevron_right

Open Problems when Mapping Automotive Security Levels to System Requirements

Tomas Olovsson

Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems

View PDFchevron_right

Experimental Security Analysis of a Modern Automobile

Shwetak Patel

2010 IEEE Symposium on Security and Privacy, 2010

View PDFchevron_right

Security as a New Dimension in Embedded System Design

Ruby B. Lee

View PDFchevron_right

CAD support for Security and Robustness Analysis of Safety-Critical Automotive Software

Ipsita Koley

ACM Transactions on Cyber-Physical Systems

View PDFchevron_right

A Simple Way to Improve the Security of Bluetooth Devices

Peter Dell

… on Applications and the Internet, 2008. …, 2008

View PDFchevron_right

Security requirements for automotive on-board networks

Timo Leimbach

… ,(ITST), 2009 9th …, 2009

View PDFchevron_right

BlueLock a tool to prevent Bluetooth attacks

Gerardo Alberto Castang Montiel

Visión electrónica, 2020

View PDFchevron_right

A tour of secure software engineering solutions for connected vehicles

Giuseppe Lami

Software Quality Journal, 2017

View PDFchevron_right

Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy

Vania Nuraini

View PDFchevron_right

Implementation of Complex Strategies of Security Insecure Embedded Systems

Patrick Soquet

2011

View PDFchevron_right

Security in Embedded Systems : Vulnerabilities , Pigeonholing of Attacks and Countermeasures

Vijeet Meshram

2016

View PDFchevron_right

Survey on security threats and protection mechanisms in embedded automotive networks

Mohamed Kaâniche

2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), 2013

View PDFchevron_right

Using software-based attestation for verifying embedded systems in cars

Pradeep Khosla

2004

View PDFchevron_right

A security-enhanced design methodology for embedded systems

Marija Janjusevic

2013

View PDFchevron_right

Security engineering for embedded systems

Antonio Maña

Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems - S&D4RCES '10, 2010

View PDFchevron_right

On security issues in embedded systems: challenges and solutions

Lyes Khelladi

International Journal of Information and Computer Security, 2008

View PDFchevron_right

Using AUTOSAR High-Level Specifications for the Synthesis of Security Components in Automotive Systems

Gianluca Dini

Lecture Notes in Computer Science, 2016

View PDFchevron_right

Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures

Sakir Sezer

2018 31st IEEE International System-on-Chip Conference (SOCC), 2018

View PDFchevron_right