This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Adapted Development Process for Security in Networked Automotive Systems
Journal Article
2014-01-0334
ISSN: 1946-4614, e-ISSN: 1946-4622
Sector:
Citation:
Schmidt, K., Tröger, P., Kroll, H., Bünger, T. et al., "Adapted Development Process for Security in Networked Automotive Systems," SAE Int. J. Passeng. Cars – Electron. Electr. Syst. 7(2):516-526, 2014, https://doi.org/10.4271/2014-01-0334.
Language:
English
References
- Anderson , R. Security Engineering: A Guide to Building Dependable Distributed Systems Wiley 2 2008
- Arkin , B. , Stender , S. , McGraw , G. Software penetration testing Security & Privacy, IEEE 3 84 87 2005
- Avizienis , A. , Laprie , J.-C. , Randell , B. , Landwehr . C. Basic concepts and taxonomy of dependable and secure computing Dependable and Secure Computing, IEEE Transactions on 1 11 33 2004
- Burton , S. , Likkei , J. , Vembar P. , Wolf , M. Automotive functional safety = safety + security First International Conference on Security of Internet of Things 150 159 New York, NY, USA 2012 ACM
- BYD Auto BYD's Two New Models and Three World-Class Technologies to Premiere at 2012 Beijing International Automotive Exhibition http://www.energytrend.com/news/BYD_EV_20120419.html April 2012
- Carlson , C. Effective FMEAs: Achieving Safe, Reliable, and Economical Products and Processes Using Failure Mode and Effects Analysis Quality and Reliability Engineering Series Wiley 2012
- Czerny , B. System Security and System Safety Engineering: Differences and Similarities and a System Security Engineering Process Based on the ISO 26262 Process Framework SAE Int. J. Passeng. Cars - Electron. Electr. Syst. 6 1 349 359 2013 10.4271/2013-01-1419
- Denning , D. A lattice model of secure information flow Communications of the ACM 19 236 243 1976
- Eisenbarth , T. , Kasper , T. , Moradi , A. , Paar , C. , Salmasizadeh , M. , Shalmani , M. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme 5157 Lecture Notes in Computer Science 203 220 Springer Berlin Heidelberg 2008
- Firesmith , D. A taxonomy of security-related requirements International Workshop on High Assurance Systems 2005
- Gansen , T. , Wischhof , L. , Ebner , A. Car-2-X Challenges - Dreams and Nightmares Sevecom Workshop on Workshop on Results and Challenges Ahead for Vehicle Communication Lausanne 2008
- Ericson , C. Fault Tree Analysis - A History 17th International System Safety Conference System Safety Society 1999
- International Organization for Standardization Common Criteria for Information Technology Security Evaluation Technical Report ISO 15408 September 2012
- International Organization for Standardization Road vehicles - Functional safety Technical Report ISO 26262 November 2011
- Jacobson , I. Object-oriented software engineering: a use case driven approach Pearson Education India 1992
- Jajodia , S. , Noel , S. , O'Berry . B. Topological analysis of network attack vulnerability 247 266 Springer 2005
- Jha , S. , Sheyner , O. , Wing , J. Two formal analyses of attack graphs Computer Security Foundations Workshop, 2002. Proceedings. 15th IEEE 49 63 IEEE 2002
- Johnston , R. Being Vulnerable to the Threat of Confusing Threats with Vulnerabilities Journal of Physical Security 4 30 34 2010
- Karimi , R. , Rasmussen , N. , Wolf . L. Qualitative and quantitative reliability analysis of safety systems Technical Report MIT-EL 80-015 Energy Laboratory and Department of Nuclear Engineering, Massachusetts Institute of Technology Cambridge, Massachusetts 02139 May 1980
- Kordy , B. , Mauw , S. , Radomirovic , S. , Schweitzer , P. Attack-Defense Trees Journal of Logic and Computation 2012
- Kroll , H.-M. , Schmidt , K. , Buschardt , B. , Lienkamp , M. Utilization of customer-relevant driving behavior for reliable friction potential estimation by scaling nonlinear tyre models 14th Stuttgart International Symposium Automotive and Engine Technology Stuttgart 2014
- Laprie , J. C. , Avizienis , A. , Kopetz , H. Dependability: Basic Concepts and Terminology Springer-Verlag Secaucus, NJ, USA 1992
- McDermott , J. Attack net penetration testing 2000 workshop on New security paradigms 15 21 ACM 2001
- Meadows , C. An outline of a taxonomy of computer security research and development New Security Paradigms Workshop: Proceedings on the 1992-1993 workshop on New security paradigms 1993 33 35 1993
- Sabelfeld , A. , Myers A.C. Language-based information flow security Selected Areas in Communications, IEEE Journal on 21 5 19 2003
- Schleiffer , C. , Wolf , M. , Weimerskirch , A. , and Wolleschensky , L. Secure Key Management - A Key Feature for Modern Vehicle Electronics SAE Technical Paper 2013-01-1418 2013 10.4271/2013-01-1418
- Schneier , B. Attack trees Dr. Dobb's journal 24 21 29 1999
- Sheyner , O. , Haines , J. , Jha , S. , Lippmann , R. , Wing . J. Automated generation and analysis of attack graphs Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on 273 284 IEEE 2002
- Shostack , A. Experiences threat modeling at Microsoft Modeling Security Workshop Dept. of Computing, Lancaster University UK 2008
- Shostack , A. Experiences Threat Modeling at Microsoft Workshop on Modeling Security Toulouse September 2008
- Sindre , G. , Opdahl , A. Eliciting security requirements with misuse cases Requirements Engineering 10 34 44 2005
- Sutton , M. , Greene , A. , Amini P. Fuzzing: brute force vulnerability discovery Pearson Education 2007
- Ward , D. , Ibarra , I. , and Ruddle , A. Threat Analysis and Risk Assessment in Automotive Cyber Security SAE Int. J. Passeng. Cars - Electron. Electr. Syst. 6 2 507 513 2013 10.4271/2013-01-1415
- Weimerskirch , A. Do Vehicles Need Data Security? SAE Technical Paper 2011-01-0040 2011 10.4271/2011-01-0040
- Weimerskirch , A. , Wolf , M. , and Wollinger , T. Introduction to Vehicular Embedded Security SAE Technical Paper 2009-01-0916 2009 10.4271/2009-01-0916
- Wolf , M. Scheibel , M. A Systematic Approach to a Quantified Security Risk Analysis for Vehicular IT Systems Automotive - Safety & Security 2012 210 195 210 November 2012
Cited By
Recommended Content
Technical Paper | Investigation of Vehicular Networks and its Main Security Issues |
Technical Paper | CAN Security: Cost-Effective Intrusion Detection for Real-Time Control Systems |
Technical Paper | Securing Connected Vehicles End to End |