A Combined Safety-Hazards and Security-Threat Analysis Method for Automotive Systems

Author(s):  
Georg Macher ◽  
Andrea Höller ◽  
Harald Sporer ◽  
Eric Armengaud ◽  
Christian Kreiner
Author(s):  
Munina Yusufu ◽  
Weimin Pan ◽  
Gulina Yusufu

Information ◽  
2019 ◽  
Vol 10 (4) ◽  
pp. 148 ◽  
Author(s):  
Florian Sommer ◽  
Jürgen Dürrwang ◽  
Reiner Kriesten

Due to current development trends in the automotive industry towards stronger connected and autonomous driving, the attack surface of vehicles is growing which increases the risk of security attacks. This has been confirmed by several research projects in which vehicles were attacked in order to trigger various functions. In some cases these functions were critical to operational safety. To make automotive systems more secure, concepts must be developed that take existing attacks into account. Several taxonomies were proposed to analyze and classify security attacks. However, in this paper we show that the existing taxonomies were not designed for application in the automotive development process and therefore do not provide enough degree of detail for supporting development phases such as threat analysis or security testing. In order to be able to use the information that security attacks can provide for the development of security concepts and for testing automotive systems, we propose a comprehensive taxonomy with degrees of detail which addresses these tasks. In particular, our proposed taxonomy is designed in such a wa, that each step in the vehicle development process can leverage it.


2013 ◽  
Vol 706-708 ◽  
pp. 2087-2090
Author(s):  
Chien Chang Chou ◽  
Ji Feng Ding ◽  
Tzu Min Chang ◽  
Chun Pong Wong ◽  
Wen Cheng Lin ◽  
...  

The global supply chain system includes sea, air, and inland transportations. The port logistics plays an important role in the maritime transportation. The aim of this study is to analyze the operation management of the world’s top 20 container ports by using SWOT (Strength, Weakness, Opportunity, and Threat) analysis method. Finally, some conclusions and suggestions are given to the international manufacturers, port managers, and departments of governmental maritime.


2021 ◽  
Author(s):  
Mir Ahsan

Embedded systems are often used to monitor and control various dynamic and complex applications. However, with greater accessibility and added features on many embedded systems, more and more systems are being subject to sophisticated and new types of attacks. As a result, the security aspect of embedded systems has become critical design step. TrustZone has become a popular choice for security design solution in systems where resources such as processing power, battery are limited. In TrustZone, two virtual processors called "secure world" and “normal world” run on the same core in a time sliced manner. These worlds have partitioned hardware and software resources, with different modes of operation, isolated memory regions and interrupts. In this paper, the hardware and software architecture of TrustZone is analyzed from the perspective of embedded system security design. Then a mobile-ticketing system based on TrustZone is presented which incorporates standard cryptographic engineering design practices to demonstrate the feasibility and effectiveness of such system. The ticketing system is then simulated and security threat analysis is performed in terms known vulnerabilities such as Buffer Overflow, Static and dynamic code/data tampering, Return Oriented Programming (ROP) exploits, and Man-in-the middle attacks. After evaluating the analysis results with various open source vulnerability analysis tools, it is conclusive that the system design is an effective solution particularly for embedded systems.


2013 ◽  
Vol 694-697 ◽  
pp. 1139-1145
Author(s):  
Jian Ping Chen ◽  
Li Xin Huo ◽  
Hai Jun Li

Large cooling tower fan mainly used in petroleum, chemical, electric power industry, carries industrial water circulating cooling function and its operational status directly affects the industrial production. The blades are the important parts of the fan. The modal analysis is used to find the distribution of blade vibration frequency, and then the acquisition and analysis of vibration parameters of running large cooling tower fan blades are done using the EMD methods. Finally, compare with the modal analysis to find out safety hazards of fan blades. This method can eliminate the failures of the cooling tower fan blades, shorten the repair cycle, ensure the smooth production of the enterprise and improve economic efficiency.


Sign in / Sign up

Export Citation Format

Share Document