Pike et al., 2017 - Google Patents
Secure automotive software: The next stepsPike et al., 2017
- Document ID
- 3438081390720703074
- Author
- Pike L
- Sharp J
- Tullsen M
- Hickey P
- Bielman J
- Publication year
- Publication venue
- IEEE Software
External Links
Snippet
Previous research revealed pervasive software vulnerabilities in modern automobiles. This article presents a rejoinder to that research, discussing four general approaches to secure automotive software systems: compile-time assurance, runtime protection, automated …
- 238000011160 research 0 abstract description 15
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/44—Arrangements for executing specific programmes
- G06F9/455—Emulation; Software simulation, i.e. virtualisation or emulation of application or operating system execution engines
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/572—Secure firmware programming, e.g. of basic input output system [BIOS]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
- G06F9/06—Arrangements for programme control, e.g. control unit using stored programme, i.e. using internal store of processing equipment to receive and retain programme
- G06F9/46—Multiprogramming arrangements
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/50—Computer-aided design
- G06F17/5009—Computer-aided design using simulation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F8/00—Arrangements for software engineering
- G06F8/60—Software deployment
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Fisher et al. | The HACMS program: using formal methods to eliminate exploitable bugs | |
US9792440B1 (en) | Secure boot for vehicular systems | |
Pike et al. | Secure automotive software: The next steps | |
Dürrwang et al. | Enhancement of automotive penetration testing with threat analyses results | |
Schmittner et al. | A case study of fmvea and chassis as safety and security co-analysis method for automotive cyber-physical systems | |
CN112840341B (en) | Method for detecting a security-related data stream | |
Cheah et al. | Formalising systematic security evaluations using attack trees for automotive applications | |
Mahmoodi et al. | Attack surface modeling and assessment for penetration testing of IoT system designs | |
Siu et al. | Architectural and behavioral analysis for cyber security | |
US9459840B1 (en) | Timing-oriented and architecture-centric system design using contracts | |
Pese et al. | Security analysis of android automotive | |
CN113810446A (en) | Safety upgrading management method for ECU of vehicle-mounted network | |
Ruchkin et al. | Eliminating inter-domain vulnerabilities in cyber-physical systems: An analysis contracts approach | |
US20160224456A1 (en) | Method for verifying generated software, and verifying device for carrying out such a method | |
Roudier et al. | Towards the model-driven engineering of security requirements for embedded systems | |
Li | Safe and secure model-driven design for embedded systems | |
Pike et al. | Securing the automobile: A comprehensive approach | |
Heneghan et al. | Enabling security checking of automotive ECUs with formal CSP models | |
Hugues et al. | Model-based design and automated validation of ARINC653 architectures using the AADL | |
Pike | Hints for high-assurance cyber-physical system design | |
Pike et al. | Secure Automotive Software | |
CN213186571U (en) | ECU security upgrading system applied to vehicle-mounted network | |
Bernardeschi et al. | Verifying data secure flow in AUTOSAR models | |
KR102827476B1 (en) | Method for detecting security-related data streams | |
US12045602B2 (en) | Correctness verification system, method, device, and program |