No abstract available.
Proceeding Downloads
Monitoring Automotive Software Security Health through Trustworthiness Score
- Etienne Sapin,
- Suraj Menon,
- Jingquan Ge,
- Sheikh Mahbub Habib,
- Maurice Heymann,
- Yuekang Li,
- Rene Palige,
- Gabriel Byman,
- Yang Liu
The automotive industry is drastically moving towards autonomous. This trend constitutes in a fundamental change of going from mechanical and electrical engineering towards software-driven approaches. Modern vehicles can embed more than hundred ...
Security Analysis and Challenges of a Modular Vehicle Fleet
The advent of autonomous vehicles continuously fosters innovative concepts in the context of smart cities. One such concept is the City Bot infrastructure, where an autonomous and modular vehicle fleet can be configured depending on the tasks, required ...
Evaluation of Free and Open Source Tools for Automated Software Composition Analysis
Vulnerable or malicious third-party components introduce vulnerabilities into the software supply chain. Software Composition Analysis (SCA) is a method to identify direct and transitive dependencies in software projects and assess their security risks ...
Computing an Automotive Cybersecurity Maturity Level Assessment Programme
Cybersecurity is key for the new and future vehicles that heavily rely on IT systems and depend on data exchange. These vehicles will bring countless new features and are potentially capable of autonomous driving. This paper studies and details a ...
From TARA to Test: Automated Automotive Cybersecurity Test Generation Out of Threat Modeling
- Stefan F Marksteiner,
- Christoph Schmittner,
- Korbinian Christl,
- Dejan Nickovic,
- Mikael Sjödin,
- Marjan Sirjani
The United Nations Economic Commission for Europe (UNECE) demands the management of cyber security risks in vehicle design and that the effectiveness of these measures is verified by testing. Generally, with rising complexity and openness of systems via ...
VALERIE22 - A photorealistic, richly metadata annotated dataset of urban environments
The VALERIE tool pipeline is a synthetic data generator [14] developed with the goal to contribute to the understanding of domain-specific factors that influence perception performance of DNNs (deep neural networks). This work was carried out under the ...
A Systematic Approach for Automotive Privacy Management
- Sebastian Pape,
- Sarah Syed-Winkler,
- Armando Miguel Garcia,
- Badreddine Chah,
- Anis Bkakria,
- Matthias Hiller,
- Tobias Walcher,
- Alexandre Lombard,
- Abdeljalil Abbas-Turki,
- Reda Yaich
As of today, car manufacturers are currently addressing privacy goals primarily from a legal perspective. However, with the common acceptance of privacy by design, it is important to also address the technical perspective. As of today there is no ...
VATT&EK: Formalization of Cyber Attacks on Intelligent Transport Systems - a TTP based approach for Automotive and Rail
The rapid evolution of Intelligent Transport Systems (ITS) has heightened the cyber vulnerability of modern vehicles, transforming them from isolated mechanical entities to complex interconnected systems. This paper bridges the existing gaps in the ...
Enabling Secure Communication for Automotive Endpoint-ECUs through Lightweight-Cryptography
Enabling secure communication to and from endpoint-ECUs in automotive E/E architectures is crucial, as e.g. shown by recent attacks such as CAN injection. Cost-efficient and resource-saving in-vehicle solutions are currently missing. Emerging network ...
Index Terms
- Proceedings of the 7th ACM Computer Science in Cars Symposium