Sökning: "Vehicle Attacks"
Visar resultat 1 - 5 av 16 avhandlingar innehållade orden Vehicle Attacks.
1. Towards a Secure and Resilient Vehicle Design: Methodologies, Principles and Guidelines
Sammanfattning : The advent of autonomous and connected vehicles has brought new cyber security challenges to the automotive industry. It requires vehicles to be designed to remain dependable in the occurrence of cyber-attacks. LÄS MER
2. Security Aspects of Wireless Vehicle-to-Infrastructure Environments
Sammanfattning : In recent years, information technology has entered the automobile domain. Most of the functionality in a vehicle is controlled by electronics and software. There exist two main administrative functions: diagnostics and software update. Diagnostics is used to identify defective components and faulty software. LÄS MER
3. How to Secure the Connected Car
Sammanfattning : In recent years, information technology has entered the automobile domain. Most of the functionality in a car is now controlled by electronics and software. LÄS MER
4. On Cyber-Security for In-Vehicle Software
Sammanfattning : We live in a highly connected world, which brings many opportunities, but which also makes us vulnerable to attacks. Security in regular IT systems, such as desktop and server systems, has decades of active research behind it, whereas security in the automotive domain is still a relatively new topic. LÄS MER
5. On the Secure and Resilient Design of Connected Vehicles: Methods and Guidelines
Sammanfattning : Vehicles have come a long way from being purely mechanical systems to systems that consist of an internal network of more than 100 microcontrollers and systems that communicate with external entities, such as other vehicles, road infrastructure, the manufacturer’s cloud and external applications. This combination of resource constraints, safety-criticality, large attack surface and the fact that millions of people own and use them each day, makes securing vehicles particularly challenging as security practices and methods need to be tailored to meet these requirements. LÄS MER