Security Challenges in Automotive Hardware/Software Architecture Design

被引:0
作者
Sagstetter, Florian [1 ]
Lukasiewycz, Martin [1 ]
Steinhorst, Sebastian [1 ]
Wolf, Marko [2 ]
Bouard, Alexandre [3 ]
Harris, William R. [4 ]
Jha, Somesh [4 ]
Peyrin, Thomas [5 ]
Poschmann, Axel [5 ]
Chakraborty, Samarjit [6 ]
机构
[1] TUM CREATE, Singapore, Singapore
[2] Escrypt Embedded Secur GmbH, Bochum, Germany
[3] BMW Grp, Bavaria, Germany
[4] Univ Wisconsin, Madison, WI USA
[5] Nanyang Technol Univ, Singapore, Singapore
[6] Tech Univ Munich, Munich, Germany
来源
DESIGN, AUTOMATION & TEST IN EUROPE | 2013年
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper is an introduction to security challenges for the design of automotive hardware/software architectures. State-of-the-art automotive architectures are highly heterogeneous and complex systems that rely on distributed functions based on electronics and software. As cars are getting more connected with their environment, the vulnerability to attacks is rapidly growing. Examples for such wireless communication are keyless entry systems, WiFi, or Bluetooth. Despite this increasing vulnerability, the design of automotive architectures is still mainly driven by safety and cost issues rather than security. In this paper, we present potential threats and vulnerabilities, and outline upcoming security challenges in automotive architectures. In particular, we discuss the challenges arising in electric vehicles, like the vulnerability to attacks involving tampering with the battery safety. Finally, we discuss future automotive architectures based on Ethernet/IP and how formal verification methods might be used to increase their security.
引用
收藏
页码:458 / 463
页数:6
相关论文
共 50 条
  • [21] Design and Implementation of Embedded Hardware and Software Architecture in an Unmanned Airship
    Tuan Anh Nguyen
    Lee, Seulki
    Park, Jong Sou
    2012 IEEE 14TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS & 2012 IEEE 9TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (HPCC-ICESS), 2012, : 1730 - 1735
  • [22] A Hybrid Hardware and Software Component Architecture for Embedded System Design
    Marcondes, Hugo
    Froehlich, Antonio Augusto
    ANALYSIS, ARCHITECTURES AND MODELLING OF EMBEDDED SYSTEMS, 2009, 310 : 259 - 270
  • [23] Implementation of Memristor Towards Better Hardware/Software Security Design
    Singh, Jeetendra
    TRANSACTIONS ON ELECTRICAL AND ELECTRONIC MATERIALS, 2021, 22 (01) : 10 - 22
  • [24] Tradeoff analysis and architecture design of a hybrid hardware/software sorter
    Bednara, M
    Beyer, O
    Teich, J
    Wanka, R
    IEEE INTERNATIONAL CONFERENCE ON APPLICATION-SPECIFIC SYSTEMS, ARCHITECTURES, AND PROCESSORS, PROCEEDINGS, 2000, : 299 - 308
  • [25] A Hardware/Software Co-design Architecture for Packet Classification
    Ahmed, O.
    Chattha, K.
    Areibi, S.
    2010 INTERNATIONAL CONFERENCE ON MICROELECTRONICS, 2010, : 96 - 99
  • [26] Hardware architecture for Java']Java in a hardware/software co-design of the virtual machine
    Kent, KB
    Serra, M
    EUROMICRO SYMPOSIUM ON DIGITAL SYSTEM DESIGN, PROCEEDINGS: ARCHITECTURES, METHODS AND TOOLS, 2002, : 20 - 27
  • [27] Hardware/Software Isolation and Protection Architecture for Transparent Security Enforcement in Networked Devices
    Hategekimana, Festus
    Nardin, Pierre
    Bobda, Christophe
    2016 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI), 2016, : 140 - 145
  • [28] Hardware-and-software-based security architecture for broadband router (short paper)
    Gu Xiaozhuo
    Li Yufeng
    Yang Jianzu
    Lan Julong
    Information and Communications Security, Proceedings, 2006, 4307 : 546 - 555
  • [29] Software and Hardware Security of IoT
    Singh, Ashwini Kumar
    Kushwaha, Nagendra
    2021 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS), 2021, : 436 - 440
  • [30] On the Design and Implementation of a Security Architecture for Software Defined Networks
    Karmakar, Kallol Krishna
    Varadharajan, Vijay
    Tupakula, Udaya
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 671 - 678