scholarly journals Survey and Classification of Automotive Security Attacks

Information ◽  
2019 ◽  
Vol 10 (4) ◽  
pp. 148 ◽  
Author(s):  
Florian Sommer ◽  
Jürgen Dürrwang ◽  
Reiner Kriesten

Due to current development trends in the automotive industry towards stronger connected and autonomous driving, the attack surface of vehicles is growing which increases the risk of security attacks. This has been confirmed by several research projects in which vehicles were attacked in order to trigger various functions. In some cases these functions were critical to operational safety. To make automotive systems more secure, concepts must be developed that take existing attacks into account. Several taxonomies were proposed to analyze and classify security attacks. However, in this paper we show that the existing taxonomies were not designed for application in the automotive development process and therefore do not provide enough degree of detail for supporting development phases such as threat analysis or security testing. In order to be able to use the information that security attacks can provide for the development of security concepts and for testing automotive systems, we propose a comprehensive taxonomy with degrees of detail which addresses these tasks. In particular, our proposed taxonomy is designed in such a wa, that each step in the vehicle development process can leverage it.

2018 ◽  
Vol 885 ◽  
pp. 88-101
Author(s):  
Philipp Hedrich ◽  
Nicolas Brötz ◽  
Peter F. Pelz

By combining the established development method according to VDI guideline 2206 and the new approach of resilience, resilient product development makes it possible to control uncertainty in the early development phases. Based on the uncertainty that can occur in a classical product development process, such as uncertainty due to (i) the transition from function to building structure, (ii) interaction of modules and (iii) planning uncertainty, we first discuss the limits of existing product development guidelines and introduce the concept of resilience. The basic idea is that a resilient process can control uncertainty through the four resilience functions (i) monitoring, (ii) responding, (iii) learning and (iv) anticipating. We apply this new approach to the product development of the actuators of the active airspring of the TU Darmstadt. The active air spring can be used to increase driving comfort in a vehicle or, for example, to minimize kinetosis during autonomous driving.


2021 ◽  
Vol 1 ◽  
pp. 51-60
Author(s):  
Peter Welzbacher ◽  
Gunnar Vorwerk-Handing ◽  
Eckhard Kirchner

AbstractThe importance of considering disturbance factors in the product development process is often emphasized as one of the key factors to a functional and secure product. However, there is only a small number of tools to support the developer in the identification of disturbance factors and none of them yet ensures that the majority of occurring disturbance factors is considered. Thus, it is the aim of this contribution to provide a tool in form of a control list for the systematic identification of disturbance factors. At the beginning of this contribution, the terms “disturbance factor” and “uncertainty” are defined based on a literature review and different approaches for the classification of uncertainty are presented. Subsequently, the fundamentals of multipole based model theory are outlined. Moreover, a first approach in terms of a control list for a systematic identification of disturbance factors is discussed. Based on the discussed approach and taking the identified weaknesses as a starting point, a control list is presented that combines the existing basic concept of the control list with the fundamentals of multipole based model theory.


Author(s):  
Kumar Srinivasan ◽  
Z. J. Wang ◽  
Wei Yuan ◽  
Richard Sun

CFD simulation of vehicle under-hood and under-body poses several challenges. Specifically, the complexity of the geometry involved makes the use of traditional mesh generation approaches, based on the boundary-to-interior methodology, impractical and time consuming. The current work presents the use of an interior-to-boundary method wherein the need for creating a ‘water-tight’ surface mesh is not a pre-requisite for volume mesh generation. The application of the new method is demonstrated for an actual passenger vehicle under-hood model with nearly a hundred components. Coupled radiation/convection simulations are performed to obtain the complete airflow and thermal map of the engine compartment. Results are validated with test data. The new method results in significant gains in efficiency over traditional approaches allowing the simulation tool to be used effectively in the vehicle development process.


2021 ◽  
Vol 7 (1) ◽  
pp. 16-19
Author(s):  
Owes Khan ◽  
Geri Shahini ◽  
Wolfram Hardt

Automotive technologies are ever-increasinglybecoming digital. Highly autonomous driving togetherwith digital E/E control mechanisms include thousandsof software applications which are called as software components. Together with the industry requirements, and rigorous software development processes, mappingof components as a software pool becomes very difficult.This article analyses and discusses the integration possiblilities of machine learning approaches to our previously introduced concept of mapping of software components through a common software pool.


2021 ◽  
Vol 11 (22) ◽  
pp. 10713
Author(s):  
Dong-Gyu Lee

Autonomous driving is a safety-critical application that requires a high-level understanding of computer vision with real-time inference. In this study, we focus on the computational efficiency of an important factor by improving the running time and performing multiple tasks simultaneously for practical applications. We propose a fast and accurate multi-task learning-based architecture for joint segmentation of drivable area, lane line, and classification of the scene. An encoder-decoder architecture efficiently handles input frames through shared representation. A comprehensive understanding of the driving environment is improved by generalization and regularization from different tasks. The proposed method learns end-to-end through multi-task learning on a very challenging Berkeley Deep Drive dataset and shows its robustness for three tasks in autonomous driving. Experimental results show that the proposed method outperforms other multi-task learning approaches in both speed and accuracy. The computational efficiency of the method was over 93.81 fps at inference, enabling execution in real-time.


2021 ◽  
Author(s):  
Matthias Ludwig ◽  
Alexander Hepp ◽  
Michaela Brunner ◽  
Johanna Baehr

Trust and security of microelectronic systems are a major driver for game-changing trends like autonomous driving or the internet of things. These trends are endangered by threats like soft- and hardware attacks or IP tampering -- wherein often hardware reverse engineering (RE) is involved for efficient attack planning. The constant publication of new RE-related scenarios and countermeasures renders a profound rating of these extremely difficult. Researchers and practitioners have no tools or framework which aid a common, consistent classification of these scenarios. In this work, this rating framework is introduced: the common reverse engineering scoring system (CRESS). The framework allows a general classification of published settings and renders them comparable. We introduce three metrics: exploitability, impact, and a timestamp. For these metrics, attributes are defined which allow a granular assessment of RE on the one hand, and attack requirements, consequences, and potential remediation strategies on the other. The system is demonstrated in detail via five case studies and common implications are discussed. We anticipate CRESS to evaluate possible vulnerabilities and to safeguard targets more proactively.


2019 ◽  
pp. 71-82
Author(s):  
O. Ur-Rehman ◽  
G. Wallraf ◽  
G. Keßler ◽  
M. Jentges

Author(s):  
Naveed Ahmed ◽  
Christian Damsgaard Jensen

Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very much needed. There are many pressing challenges however; here, we address some of them. Firstly, security for dependable systems is a broad concept and traditional view of security, e.g., in terms of confidentiality, integrity and availability, does not suffice. Secondly, a clear definition of security in the dependability context is not agreed upon. Thirdly, security attacks cannot be modeled as a stochastic process, because the adversary’s strategy is often carefully planned. In this chapter, we explore these challenges and provide some directions toward their solutions.


Sign in / Sign up

Export Citation Format

Share Document