Combining Third Party Components Securely in Automotive Systems (original) (raw)
Related papers
A review of Bluetooth security in the automotive environment
Irish Signals and Systems Conference 2004, 2004
Securing the Connected Car: A Security-Enhancement Methodology
IEEE Vehicular Technology Magazine, 2018
Understanding Common Automotive Security Issues and Their Implications
2018
Comprehensive Experimental Analyses of Automotive Attack Surfaces
Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms
2018 21st International Conference on Intelligent Transportation Systems (ITSC), 2018
CASCADE: An Asset-driven Approach to Build Security Assurance Cases for Automotive Systems
ACM Transactions on Cyber-Physical Systems
Formalising Systematic Security Evaluations Using Attack Trees for Automotive Applications
Information Security Theory and Practice, 2018
Secure Integration of Mobile Devices for Automotive Services
Technology Innovation Management Review
An Approach for the Identification of Information Leakage in Automotive Infotainment systems
2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM), 2020
VulCAN: Efficient Component Authentication and Software Isolation for Automotive Control Networks
A Secure-by-Design Framework for Automotive On-board Network Risk Analysis
2019 IEEE Vehicular Networking Conference (VNC), 2019
Open Problems when Mapping Automotive Security Levels to System Requirements
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems
Experimental Security Analysis of a Modern Automobile
2010 IEEE Symposium on Security and Privacy, 2010
Security as a New Dimension in Embedded System Design
CAD support for Security and Robustness Analysis of Safety-Critical Automotive Software
ACM Transactions on Cyber-Physical Systems
A Simple Way to Improve the Security of Bluetooth Devices
… on Applications and the Internet, 2008. …, 2008
Security requirements for automotive on-board networks
… ,(ITST), 2009 9th …, 2009
BlueLock a tool to prevent Bluetooth attacks
Gerardo Alberto Castang Montiel
Visión electrónica, 2020
A tour of secure software engineering solutions for connected vehicles
Software Quality Journal, 2017
Embedded Systems Security: Threats, Vulnerabilities, and Attack Taxonomy
Implementation of Complex Strategies of Security Insecure Embedded Systems
2011
Security in Embedded Systems : Vulnerabilities , Pigeonholing of Attacks and Countermeasures
2016
Survey on security threats and protection mechanisms in embedded automotive networks
2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), 2013
Using software-based attestation for verifying embedded systems in cars
2004
A security-enhanced design methodology for embedded systems
2013
Security engineering for embedded systems
Proceedings of the International Workshop on Security and Dependability for Resource Constrained Embedded Systems - S&D4RCES '10, 2010
On security issues in embedded systems: challenges and solutions
International Journal of Information and Computer Security, 2008
Lecture Notes in Computer Science, 2016
Policy-Based Security Modelling and Enforcement Approach for Emerging Embedded Architectures
2018 31st IEEE International System-on-Chip Conference (SOCC), 2018