[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Pike et al., 2017 - Google Patents

Secure automotive software: The next steps

Pike et al., 2017

Document ID
3438081390720703074
Author
Pike L
Sharp J
Tullsen M
Hickey P
Bielman J
Publication year
Publication venue
IEEE Software

External Links

Snippet

Previous research revealed pervasive software vulnerabilities in modern automobiles. This article presents a rejoinder to that research, discussing four general approaches to secure automotive software systems: compile-time assurance, runtime protection, automated …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/44Arrangements for executing specific programmes
    • G06F9/455Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for programme control, e.g. control unit
    • G06F9/06Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
    • G06F9/46Multiprogramming arrangements
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/50Computer-aided design
    • G06F17/5009Computer-aided design using simulation
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/60Software deployment
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software

Similar Documents

Publication Publication Date Title
Fisher et al. The HACMS program: using formal methods to eliminate exploitable bugs
US9792440B1 (en) Secure boot for vehicular systems
Pike et al. Secure automotive software: The next steps
Dürrwang et al. Enhancement of automotive penetration testing with threat analyses results
Schmittner et al. A case study of fmvea and chassis as safety and security co-analysis method for automotive cyber-physical systems
CN112840341B (en) Method for detecting a security-related data stream
Cheah et al. Formalising systematic security evaluations using attack trees for automotive applications
Mahmoodi et al. Attack surface modeling and assessment for penetration testing of IoT system designs
Siu et al. Architectural and behavioral analysis for cyber security
US9459840B1 (en) Timing-oriented and architecture-centric system design using contracts
Pese et al. Security analysis of android automotive
CN113810446A (en) Safety upgrading management method for ECU of vehicle-mounted network
Ruchkin et al. Eliminating inter-domain vulnerabilities in cyber-physical systems: An analysis contracts approach
US20160224456A1 (en) Method for verifying generated software, and verifying device for carrying out such a method
Roudier et al. Towards the model-driven engineering of security requirements for embedded systems
Li Safe and secure model-driven design for embedded systems
Pike et al. Securing the automobile: A comprehensive approach
Heneghan et al. Enabling security checking of automotive ECUs with formal CSP models
Hugues et al. Model-based design and automated validation of ARINC653 architectures using the AADL
Pike Hints for high-assurance cyber-physical system design
Pike et al. Secure Automotive Software
CN213186571U (en) ECU security upgrading system applied to vehicle-mounted network
Bernardeschi et al. Verifying data secure flow in AUTOSAR models
KR102827476B1 (en) Method for detecting security-related data streams
US12045602B2 (en) Correctness verification system, method, device, and program