Please use this identifier to cite or link to this item:
|Title:||Security challenges in automotive hardware/software architecture design||Authors:||Sagstetter, Florian
Harris, William R.
|Keywords:||DRNTU::Engineering::Computer science and engineering::Mathematics of computing::Mathematical software||Issue Date:||2013||Source:||Sagstetter, F., Lukasiewycz, M., Steinhorst, S., Wolf, M., Bouard, A., Harris, W. R., et al. (2013). Security Challenges in Automotive Hardware/Software Architecture Design. Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013, pp.458-463.||Abstract:||This paper is an introduction to security challenges for the design of automotive hardware/software architectures. State-of-the-art automotive architectures are highly heterogeneous and complex systems that rely on distributed functions based on electronics and software. As cars are getting more connected with their environment, the vulnerability to attacks is rapidly growing. Examples for such wireless communication are keyless entry systems, WiFi, or Bluetooth. Despite this increasing vulnerability, the design of automotive architectures is still mainly driven by safety and cost issues rather than security. In this paper, we present potential threats and vulnerabilities, and outline upcoming security challenges in automotive architectures. In particular, we discuss the challenges arising in electric vehicles, like the vulnerability to attacks involving tampering with the battery safety. Finally, we discuss future automotive architectures based on Ethernet/IP and how formal verification methods might be used to increase their security.||URI:||https://hdl.handle.net/10356/99788
|DOI:||10.7873/DATE.2013.102||Rights:||© 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.7873/DATE.2013.102].||Fulltext Permission:||open||Fulltext Availability:||With Fulltext|
|Appears in Collections:||SPMS Conference Papers|
Items in DR-NTU are protected by copyright, with all rights reserved, unless otherwise indicated.