This content is not included in
your SAE MOBILUS subscription, or you are not logged in.
Android Defense in Depth Strategy in an Automobile Ecosystem
Technical Paper
2020-01-1365
ISSN: 0148-7191, e-ISSN: 2688-3627
This content contains downloadable datasets
Annotation ability available
Sector:
Language:
English
Abstract
Android is becoming an environment of choice in the automotive sector because of near production grade open source stack availability and large developer community. With growing interest from Automotive OEMs for Android IVI (In-Vehicle Infotainment) solutions, we predict a similar growth trend in an automobile like in Mobile space. At another end, the need for more interconnected devices within the Automobile ecosystem is increasing, which leads to an increased threat to security. In sophisticated device interconnections, identifying the gateways and implementing the right security strategy is key to improve overall system security & stability. While Android is maturing for automotive and with growing interest from automotive OEMs, we spent time in analyzing current Android defense-in-depth concepts with the automotive perspective. The main aim of this paper is to examine the current defense-in-depth strategies available in Android and propose additional measures to meet automotive needs. This paper shall aid OEM’s to consider proposed strategies for their Android IVI solutions for increased security & safety.
Authors
Citation
Achuthan, B., Chandupatla, S., and Yerram, N., "Android Defense in Depth Strategy in an Automobile Ecosystem," SAE Technical Paper 2020-01-1365, 2020, https://doi.org/10.4271/2020-01-1365.Data Sets - Support Documents
Title | Description | Download |
---|---|---|
Unnamed Dataset 1 | ||
Unnamed Dataset 2 | ||
Unnamed Dataset 3 | ||
Unnamed Dataset 4 | ||
Unnamed Dataset 5 | ||
Unnamed Dataset 6 | ||
Unnamed Dataset 7 | ||
Unnamed Dataset 8 |
Also In
References
- Post, Sponsor January 7, 2019 https://www.businessinsider.com/sc/connected-cars-technology-fleet-driving-2019-1?IR=T
- Buttigieg , R. , Farrugia , M. , and Meli , C. Security Issues in Controller Area Networks in Automobile 18th International Conference on Sciences and Techniques of Automatic STA’2017-PID4481 Control & Computer Engineering Monastir, Tunisia December 21-23, 2017
- January 31, 2019 https://en.wikipedia.org/wiki/In-car_entertainment
- Dakroub , H. , Shaout , A. , and Awajan , A. Connected Car Architecture and Virtualization SAE Int. J. Passeng. Cars - Electron. Electr. Syst. 9 1 153 159 May 2016 https://doi.org/10.4271/2016-01-0081
- October 1, 2019 https://en.wikipedia.org/wiki/Automotive_security
- Greenberg , A. http://www.wired.com/2015/07/ Jul. 2015
- Ruddle , A. Security Risk Analysis Approach for On-Board Vehicle Networks The Fully Networked Car Workshop at the Geneva International Motor Show 2010
- Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces USENIX Security Symposium 4 447 462 2011
- October 15, 2019 https://en.wikipedia.org/wiki/Attack_surface
- October 22, 2019 https://en.wikipedia.org/wiki/Bluetooth#Security
- Oliff , W. , Filippoupolitis , A. , and Loukas , G. Evaluating the Impact of Malicious Spoofing Attacks on Bluetooth Low Energy Based Occupancy Detection Systems 2017 IEEE 15th International Conference on Software Engineering Research, Management and Applications (SERA) IEEE 2017 379 385
- Zhang , Y. , Weng , J. , Dey , R. , Jin , Y. , Lin , Z. , and Fu , X. 2019
- Foster , I. , Prudhomme , A. , Koscher , K. , and Savage , S. Fast and Vulnerable: A Story of Telematic Failures 9th {USENIX} Workshop on Offensive Technologies ({WOOT} 15) 2015
- Spitzner, Lance September 27, 2019 https://www.sans.org/security-awareness-training/blog/applying-security-awareness-cyber-kill-chain
- Gordon , K. www.statista.com October 24, 2019 www.statista.com/topics/876/android/
- October 24, 2019 https://www.android.com/
- October 29, 2019 https://developer.android.com/topic/security
- October 29, 2019 https://source.android.com/devices/architecture
- October 26, 2019 https://source.android.com/devices/architecture
- October 29, 2019 https://developer.android.com/guide/platform
- October 25, 2019 https://source.android.com/security/trusty
- October 25, 2019 https://source.android.com/devices/bootloader
- October 25, 2019 https://source.android.com/security/verifiedboot
- October 25, 2019 https://source.android.com/security/verifiedboot/dm-verity
- October 26, 2019 https://source.android.com/devices/architecture/kernel/android-common
- October 26, 2019 https://source.android.com/security/app-sandbox
- October 28, 2019 https://source.android.com/devices/tech/config/filesystem
- October 29, 2019 https://source.android.com/security/selinux
- Huang , J. Android IPC Mechanism Southern Taiwan University of Technology 2012
- Pragati Ogal , R. Android Application Security Essentials Packt Publishing Ltd 2013
- October 26, 2019 https://source.android.com/devices/architecture/hidl
- October 26, 2019 https://source.android.com/devices/bootloader/stable-aidl
- October 26, 2019 https://source.android.com/security/encryption/file-based
- October 26, 2019 https://source.android.com/security/encryption/full-disk
- October 31, 2019 https://source.android.com/security/encryption/metadata
- Thomas , J.D. 2011
- October 28, 2019 https://developer.android.com/training/articles/security-config#additional-resources-codelabs
- October 31, 2019 https://source.android.com/security/keystore
- Steinmetz , F. 2015
- October 6, 2019 https://github.com/google/AFL
- October 31, 2019 https://gitlab.com/akihe/radamsa
- https://source.android.com/security/apksigning/
- October 31, 2019 https://source.android.com/devices/automotive