Sökning: "In-Vehicle Network"

Visar resultat 1 - 5 av 24 avhandlingar innehållade orden In-Vehicle Network.

  1. 1. On Cyber-Security for In-Vehicle Software

    Författare :Aljoscha Lautenbach; Chalmers tekniska högskola; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Vehicular Security; Memory Protection; Automotive Security; Memory Exploitation; In-Vehicle Network; Risk Assessment; CAN authentication; Secure Software Development;

    Sammanfattning : We live in a highly connected world, which brings many opportunities, but which also makes us vulnerable to attacks. Security in regular IT systems, such as desktop and server systems, has decades of active research behind it, whereas security in the automotive domain is still a relatively new topic. LÄS MER

  2. 2. Automotive Communication Security Methods and Recommendations for Securing In-vehicle and V2X Communications

    Författare :Nasser Nowdehi; Chalmers tekniska högskola; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; V2X; security; automotive; vehicular communication; in-vehicle network;

    Sammanfattning : Today’s vehicles contain approximately more than 100 interconnected computers (ECUs), several of which will be connected to the Internet or external devices and networks around the vehicle. In the near future vehicles will extensively communicate with their environment via Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I), together called V2X communications. LÄS MER

  3. 3. On Securing Vehicular Communications: Methods and Recommendations for Secure In-vehicle and Car2X Communications

    Författare :Nasser Nowdehi; Chalmers tekniska högskola; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; V2X; in-vehicle network; vehicular communication; security; ETSI;

    Sammanfattning : Today's vehicles contain approximately more than 100 interconnected computers (ECUs), several of which will be connected to the Internet or external devices and networks around the vehicle. In the near future vehicles will extensively communicate with their environment via Vehicle to Vehicle and Vehicle to Infrastructure (together called V2X) communications. LÄS MER

  4. 4. On the Secure and Resilient Design of Connected Vehicles: Methods and Guidelines

    Författare :Thomas Rosenstatter; Chalmers tekniska högskola; []
    Nyckelord :TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; security; secure communication; V2X; cyber-physical systems; resilience; in-vehicle network; automotive;

    Sammanfattning : Vehicles have come a long way from being purely mechanical systems to systems that consist of an internal network of more than 100 microcontrollers and systems that communicate with external entities, such as other vehicles, road infrastructure, the manufacturer’s cloud and external applications. This combination of resource constraints, safety-criticality, large attack surface and the fact that millions of people own and use them each day, makes securing vehicles particularly challenging as security practices and methods need to be tailored to meet these requirements. LÄS MER

  5. 5. On Adapting Data Collection to Intrusion Detection

    Författare :Ulf Larson; Chalmers tekniska högskola; []
    Nyckelord :NATURVETENSKAP; NATURAL SCIENCES; attack manifestation; data reduction; in-vehicle network; attack analysis; adaptation; intrusion detection; computer security; data collection; forensic investigation;

    Sammanfattning : Intrusion detection systems (IDSs) are capable of detecting both suspicious insider activity and attacks from external penetrators. They can also detect both known and previously unknown attacks. These capabilities make them valuableassets in the protection of computer systems and networks. LÄS MER