This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Secure Boot Revisited: Challenges for Secure Implementations in the Automotive Domain
Journal Article
11-02-02-0008
ISSN: 2572-1046, e-ISSN: 2572-1054
Sector:
Citation:
Sanwald, S., Kaneti, L., Stöttinger, M., and Böhner, M., "Secure Boot Revisited: Challenges for Secure Implementations in the Automotive Domain," SAE Int. J. Transp. Cyber. & Privacy 2(2):69-81, 2019, https://doi.org/10.4271/11-02-02-0008.
Language:
English
References
- Davis , D.L. 1999
- Löhr , H. , Sadeghi , A. , and Winandy , M. Patterns for Secure Boot and Secure Storage in Computer Systems ARES IEEE Computer Society 2010 https://doi.org/10.1109/ARES.2010.110
- de Haas , J. 2013
- Kelly , S.G. Mar 2017 https://cansecwest.com/slides/2017/CSW2017_ScottKelly_SecureBoot.pdf
- TCG 2019
- BSI 2018
- Safety vehicle intrusion protected applications (EVITA) 2010
- AUTOSAR 2019
- Khalid , O. , Rolfes , C. , and Ibing , A. On Implementing Trusted Boot for Embedded Systems Proceedings of International Symposium on Hardware-Oriented Security and Trust IEEE Computer Society 2013 https://doi.org/10.1109/HST.2013.6581569
- Profentzas , C. and Günes , M. 2017
- TCG 2018
- Arbaugh , W.A. , Farber , D.J. , Smith , J.M. A Secure and Reliable Bootstrap Architecture Proceedings of Symposium on Security and Privacy Oakland, CA, USA IEEE Computer Society 1997 https://doi.org/10.1109/SECPRI.1997.601317
- LWN.net https://lwn.net/Articles/571031/
- Paar , C. , and Pelzl , J. Understanding Cryptography - A Textbook for Students and Practitioners Heidelberg Springer 2010 https://doi.org/10.1007/978-3-642-04101-3
- Zimmer , V.J. , Kumar , M. , Natu , M. , Long , Q. , Cui , L. , and Yao , J. 2011
- Morais , D. , Lange , J. , Simon , D.R. , Chen , L.T. , and Benaloh , J.D. 2005
- Song , J. , Poovendran , R. , Lee , J. , and Iwata , T. 2006
- Diluoffo , V.V. , Dumarot , D.P. , and Risi , E.B. 2014
- Safety Vehicle Intrusion Protected Applications (EVITA) 2010
- Wolf , M. and Weimerskirch , A. 2015
- Kallenberg , C. , Cornwell , S. , Kovah , X. , and Butterworth , J. Setup for Failure: Defeating Secure Boot Proceedings of the Symposium on Security for Asia Network 2014
- Delugré , G. and Arce , I. July 2017 https://blog.quarkslab.com/vulnerabilities-in-high-assurance-boot-of-nxp-imx-microprocessors.html
- TCG 2017
- Spitz , S. 2011 http://www.ldv.ei.tum.de/fileadmin/w00bfa/www/AppIT/9_EncryptionSignaturesInApplications.pdf
- Salowey , J. , Choudhury , A. , and McGrew , D. 2008
Cited By
Recommended Content
Technical Paper | Test Method for the SAE J3138 Automotive Cyber Security Standard |
Technical Paper | Model-Based Software Development: Functional Safety Compliance via Built-In Tool Intelligence |
Technical Paper | Tool Integration from Design to Test |