Please use this identifier to cite or link to this item:
Title: Security challenges in automotive hardware/software architecture design
Authors: Sagstetter, Florian
Lukasiewycz, Martin
Steinhorst, Sebastian
Wolf, Marko
Bouard, Alexandre
Peyrin, Thomas
Poschmann, Axel
Chakraborty, Samarjit
Harris, William R.
Jha, Somesh.
Keywords: DRNTU::Engineering::Computer science and engineering::Mathematics of computing::Mathematical software
Issue Date: 2013
Source: Sagstetter, F., Lukasiewycz, M., Steinhorst, S., Wolf, M., Bouard, A., Harris, W. R., et al. (2013). Security Challenges in Automotive Hardware/Software Architecture Design. Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013, pp.458-463.
Abstract: This paper is an introduction to security challenges for the design of automotive hardware/software architectures. State-of-the-art automotive architectures are highly heterogeneous and complex systems that rely on distributed functions based on electronics and software. As cars are getting more connected with their environment, the vulnerability to attacks is rapidly growing. Examples for such wireless communication are keyless entry systems, WiFi, or Bluetooth. Despite this increasing vulnerability, the design of automotive architectures is still mainly driven by safety and cost issues rather than security. In this paper, we present potential threats and vulnerabilities, and outline upcoming security challenges in automotive architectures. In particular, we discuss the challenges arising in electric vehicles, like the vulnerability to attacks involving tampering with the battery safety. Finally, we discuss future automotive architectures based on Ethernet/IP and how formal verification methods might be used to increase their security.
DOI: 10.7873/DATE.2013.102
Rights: © 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [].
Fulltext Permission: open
Fulltext Availability: With Fulltext
Appears in Collections:SPMS Conference Papers

Files in This Item:
File Description SizeFormat 
2013.DATE.SpecialSession.pdf150.8 kBAdobe PDFThumbnail

Citations 5

Updated on Jan 24, 2023

Page view(s) 20

Updated on Feb 7, 2023

Download(s) 1

Updated on Feb 7, 2023

Google ScholarTM




Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.