This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Secure Boot Revisited: Challenges for Secure Implementations in the Automotive Domain

Journal Article
11-02-02-0008
ISSN: 2572-1046, e-ISSN: 2572-1054
Published August 13, 2020 by SAE International in United States
Secure Boot Revisited: Challenges for Secure Implementations in the Automotive Domain
Sector:
Citation: Sanwald, S., Kaneti, L., Stöttinger, M., and Böhner, M., "Secure Boot Revisited: Challenges for Secure Implementations in the Automotive Domain," SAE Int. J. Transp. Cyber. & Privacy 2(2):69-81, 2019, https://doi.org/10.4271/11-02-02-0008.
Language: English

References

  1. Davis , D.L. 1999
  2. Löhr , H. , Sadeghi , A. , and Winandy , M. Patterns for Secure Boot and Secure Storage in Computer Systems ARES IEEE Computer Society 2010 https://doi.org/10.1109/ARES.2010.110
  3. de Haas , J. 2013
  4. Kelly , S.G. Mar 2017 https://cansecwest.com/slides/2017/CSW2017_ScottKelly_SecureBoot.pdf
  5. TCG 2019
  6. BSI 2018
  7. Safety vehicle intrusion protected applications (EVITA) 2010
  8. AUTOSAR 2019
  9. Khalid , O. , Rolfes , C. , and Ibing , A. On Implementing Trusted Boot for Embedded Systems Proceedings of International Symposium on Hardware-Oriented Security and Trust IEEE Computer Society 2013 https://doi.org/10.1109/HST.2013.6581569
  10. Profentzas , C. and Günes , M. 2017
  11. TCG 2018
  12. Arbaugh , W.A. , Farber , D.J. , Smith , J.M. A Secure and Reliable Bootstrap Architecture Proceedings of Symposium on Security and Privacy Oakland, CA, USA IEEE Computer Society 1997 https://doi.org/10.1109/SECPRI.1997.601317
  13. LWN.net https://lwn.net/Articles/571031/
  14. Paar , C. , and Pelzl , J. Understanding Cryptography - A Textbook for Students and Practitioners Heidelberg Springer 2010 https://doi.org/10.1007/978-3-642-04101-3
  15. Zimmer , V.J. , Kumar , M. , Natu , M. , Long , Q. , Cui , L. , and Yao , J. 2011
  16. Morais , D. , Lange , J. , Simon , D.R. , Chen , L.T. , and Benaloh , J.D. 2005
  17. Song , J. , Poovendran , R. , Lee , J. , and Iwata , T. 2006
  18. Diluoffo , V.V. , Dumarot , D.P. , and Risi , E.B. 2014
  19. Safety Vehicle Intrusion Protected Applications (EVITA) 2010
  20. Wolf , M. and Weimerskirch , A. 2015
  21. Kallenberg , C. , Cornwell , S. , Kovah , X. , and Butterworth , J. Setup for Failure: Defeating Secure Boot Proceedings of the Symposium on Security for Asia Network 2014
  22. Delugré , G. and Arce , I. July 2017 https://blog.quarkslab.com/vulnerabilities-in-high-assurance-boot-of-nxp-imx-microprocessors.html
  23. TCG 2017
  24. Spitz , S. 2011 http://www.ldv.ei.tum.de/fileadmin/w00bfa/www/AppIT/9_EncryptionSignaturesInApplications.pdf
  25. Salowey , J. , Choudhury , A. , and McGrew , D. 2008

Cited By