Your Selections

Cybersecurity
Show Only Newly Added Content My Access Full Text Content

Collections

Complimentary Content
Journal Articles Magazine Articles Open Access TBMG Articles Tech Insights White Papers

File Formats

ePUB (12) HTML (56) PDF (44) Video (5)

Content Types

Magazine Article (31) Book (17) Technical Paper (16) Professional Development (6) Journal Article (5) Magazine Feature Article (5) Podcast (5) Magazine Issue (4) Aerospace Standard (1) Ground Vehicle Standard (1) Journal (1)

Dates

Sectors

Automotive (56) Aerospace (32) Commercial Vehicle (23) Medical (4) Govt/Defense (3)

Topics

Cybersecurity (92) Computer software and hardware (32) Architecture (16) Research and development (15) Vehicle networking (12) Risk assessments (11) Connectivity (10) Risk management (9) Autonomous vehicles (8) Communication protocols (8) Mathematical models (8) Medical equipment and supplies (8) Electronic control units (7) Internet of things (IoT) (7) Sensors and actuators (7) Vehicle to vehicle (V2V) (7) Technical review (6) Wireless communication systems (6) Collaboration and partnering (5) Cryptography (5) Education and training (5) Hardware (5) Infotainment systems (5) Security systems (5) Commercial vehicles (4) Embedded software (4) Mobility (4) On-board diagnostics (OBD) (4) Personnel (4) Regulations (4) Test procedures (4) Big data (3) Control systems (3) Energy consumption (3) Internet (3) Product development (3) Simulation and modeling (3) Supply chain management (3) Systems engineering (3) Systems management (3) Telecommunications (3) Active safety systems (2) Cardiovascular system (2) Certification (2) Cloud computing (2) Commercial aircraft (2) Communication systems (2) Defense industry (2) Diagnosis (2) Documentation (2)

Authors

Costlow, Terry (3) Koepsel, Kirsten M. (2) Shuttleworth, Jennifer (2) Ward, David (2) Armengaud, Eric (1) Arndt, Paul (1) Bechler, Marc (1) Ben David, Tal (1) Bochow, Bernd (1) Bosworth, Seymour (1) Brenner, Eugen (1) Buchholz, Kami (1) Bulgakov, Nickolay (1) Chan, Wai Keung (1) Chen, Qi (1) Czerny, Barbara J. (1) D'Anna, Gloria (1) Daily, Jeremy (1) Dannebaum, Udo (1) Delgrossi, Luca (1) Economou, John (1) Emmelmann, Marc (1) Felix, Rodrigo (1) Freiwald, Axel (1) Frith, Bob (1) Fujikura, Toshiyuki (1) Gamble, Rose (1) Girimonte, Sam (1) Gowri, Krishnan (1) Gregg, Michael (1) Gritsuk, Igor V. (1) Gui, Kok Cheng (1) Halliwell, John (1) Harel, Assaf (1) Harris, Paul (1) Harry, Evan (1) Hartenstein, Hannes (1) Heidt, Laurent (1) Hirschler, Bernd (1) Hu, Qiang (1) Hwang, Gunn (1) Ibarra, Ireri (1) Iyer, Gopalakrishnan (1) Jakovljevic, Mirko (1) Johnson, James (1) Kabay, M. E. (1) Kashani, Ameer (1) Kawabata, Takeshi (1) Kellum, Christopher (1) Kim, Dae-Kyoo (1)

Publishers

SAE (42) TBMG (24) Wiley (11) ABOUT (1) CTEA (1) NOSTARCH (1)

Affiliations

SAE International (5) Chrysler Group LLC (2) AUDI AG (1) AVL List GmbH (1) Baylor University (1) Colorado State University (1) Corporate Research & Development Center, Toshiba Corporation (1) Cranfield Univ. (1) DENSO Corporation (1) DENSO International America Inc (1) DENSO International America Inc. (1) Donbas National Academy of Civil Engineering & Architecture (1) dSPACE (1) EPRI (1) Ford Motor Co. (1) Ford Motor Company (1) General Motors Company (1) General Telecom Systems Inc. (1) Graz University of Technology (1) Grenoble Institute of Technology (1) HORIBA MIRA Ltd (1) HP Chemie Pelzer Ltd. (1) I.S.C.N. GesmbH/LTD (1) Infineon Technologies (1) Infineon Technologies AG (1) Infineon Technologies AG Germany (1) Infineon Technologies Korea Co., Ltd. (1) INVENSITY GmbH (1) Karamba Security (1) Kharkiv National Auto and Highway University (1) Kharkov National Auto and Highway University (1) Kherson State Maritime Academy (1) MIRA Ltd (1) Motorola, Inc. (1) Nagoya University (1) National Aerospace University (1) National Transport University (NTU) (1) Nissan Technical Center NA Inc. (1) Oakland University (1) Pacific Northwest National Laboratory (1) SAE Industry Technologies Consortia (1) Synercon Technologies (1) Tongji Univ (1) Tongji University (1) Toyota InfoTechnology Center USA (1) TTTech (1) TTTech. Computertechnik AG (1) University of Tulsa (1) Yocum Communications (1)

Committees

PNT Position, Navigation, and Timing (1) Vehicle E E System Diagnostic Standards Committee (1)

Events

WCX World Congress Experience (5) WCX™ 17: SAE World Congress Experience (4) SAE 2013 World Congress & Exhibition (2) 1998 International Congress on Transportation Electronics (1) AeroTech Congress & Exhibition (1) Intelligent and Connected Vehicles Symposium (1) Noise and Vibration Conference and Exhibition (1) SAE 2011 World Congress & Exhibition (1) SAE 2014 Aerospace Systems and Technology Conference (1) SAE 2016 Brake Colloquium & Exhibition - 34th Annual (1) SAE 2016 Commercial Vehicle Engineering Congress (1) SAE 2016 World Congress and Exhibition (1)

Magazine

Automotive Engineering® (7) Truck & Off-Highway Engineering™ (2) MOMENTUM The Magazine for Student Members of SAE International® (1) MOMENTUM, The Magazine for Student Members of SAE International® (1) Off-Highway Engineering® (1)

Series

SAE Cybersecurity Podcast (5)
new

Maintaining Enterprise Resiliency Via Kaleidoscopic Adaption and Transformation of Software Services (MEERKATS)

  • Magazine Article
  • TBMG-33021
Published 2018-10-01 by Tech Briefs Media Group in United States
This research investigates a new vision for increasing the resilience of computing clouds by elevating continuous change, evolution, and misinformation as first-rate design principles of the cloud's infrastructure. The work is motivated by the fact that today's clouds are very static, uniform, and predictable, allowing attackers who identify a vulnerability in one of the services or infrastructure components to spread their effect to other, mission-critical services. The goal is to integrate into clouds a new level of unpredictability for both their services and data so as to both impede an adversary's ability to achieve an initial system compromise and, if a compromise occurs, to detect, disrupt, and/or otherwise impede their ability to exploit this success.
new

SAE Cybersecurity Podcast: Let's Look at It Again: Cybersecurity and Commercial Aviation

  • Podcast
  • 12383
Recorded 2018-09-13
In a very interconnected world, cyber vulnerability is real. Kirsten Koepsel, lawyer and engineer specializing in cyber security, talks with SAE International about how this new environment affects the planes and airports we use every day.

Transmitter Protects Wireless Data from Hackers

  • Magazine Article
  • TBMG-32852
Published 2018-09-01 by Tech Briefs Media Group in United States
Today, more than 8 billion devices are connected around the world, including medical devices, wearables, vehicles, and smart household and city technologies. Those devices are vulnerable to hacker attacks that locate, intercept, and overwrite the data, jamming signals. One method to protect the data is frequency hopping, which sends each data packet, containing thousands of individual bits, on a random, unique radio frequency (RF) channel, so hackers can't pin down any given packet. Hopping large packets, however, is just slow enough that hackers can still execute an attack.

Faster Photons Could Make Data Totally Secure

  • Magazine Article
  • TBMG-32839
Published 2018-09-01 by Tech Briefs Media Group in United States
Transferring data using light passed along fiber optic cables has become increasingly common over the past decades, but each pulse currently contains millions of photons. That means that in principle, a portion of these could be intercepted without detection. Secure data is already encrypted, but if an eavesdropper was able to intercept the signals containing details of the code, in theory they could access and decode the rest of the message.

Cybersecurity for Commercial Vehicles

  • General Telecom Systems Inc.-Gloria D'Anna
  • Book
  • R-464
Published 2018-08-28 by SAE International in United States
This book provides a thorough view of cybersecurity to encourage those in the commercial vehicle industry to be fully aware and concerned that their fleet and cargo could be at risk to a cyber-attack. It delivers details on key subject areas including: • SAE International Standard J3061; the cybersecurity guidebook for cyber-physical vehicle systems • The differences between automotive and commercial vehicle cybersecurity. • Forensics for identifying breaches in cybersecurity. • Platooning and fleet implications. • Impacts and importance of secure systems for today and for the future. Cybersecurity for all segments of the commercial vehicle industry requires comprehensive solutions to secure networked vehicles and the transportation infrastructure. It clearly demonstrates the likelihood that an attack can happen, the impacts that would occur, and the need to continue to address those possibilities. This multi-authored presentation by subject-matter experts provides an interesting and dynamic story of how industry is developing solutions that address the critical security issues; the key social, policy, and privacy perspectives; as well as the integrated efforts of industry, academia, and government to…

Introduction to Car Hacking with CANbus

  • Professional Development
  • C1857
Published 2018-08-02
Vehicle cybersecurity vulnerabilities could impact a vehicle's safe operation. Therefore, engineers should ensure that systems are designed free of unreasonable risks to motor vehicle safety, including those that may result due to existence of potential cybersecurity vulnerabilities. The automotive industry is making vehicle cybersecurity an organizational priority. Prioritizing vehicle cybersecurity also means learning about vehicle hacking techniques in order to ensure that systems will be reasonably safe under expected real-world conditions, including those that may arise due to potential vehicle cybersecurity vulnerabilities from hacking the CAN communications or OBD-II interface. The automotive cybersecurity environment is dynamic and is expected to change continually and, at times, rapidly. Developing a basic understanding of car hacking can provide a good foundation for developing approaches to vehicle cybersecurity. Attendees will be introduced to modern automotive in-vehicle communication networks, the CAN communications protocol and the OBD-II interface threat models, hacking into the OBD-II diagnostics interface, ECU cracking, and vehicle network cyber penetration testing. This course will cover existing in-vehicle communication protocols and associated vulnerabilities as well as the limitations of…

Securing the Future of Healthcare through the Right Cybersecurity Architecture

  • Magazine Article
  • TBMG-32446
Published 2018-08-01 by Tech Briefs Media Group in United States
In 2017, the healthcare industry experienced a dramatic surge in cyberattacks. Thousands of healthcare organizations around the world suffered various attacks — from data theft to ransomware attacks. Among them was the notorious WannaCry ransomware attack, which affected over 300,000 machines across 150,000 countries, including the United States. As many as 200,000 Windows systems were impacted by WannaCry, including nearly 50 healthcare facilities in the UK, and dozens more in the United States. The infections from WannaCry impacted medical devices as well, putting hospital staff — and patient safety — at risk.

The Aerospace Supply Chain and Cyber Security - Challenges Ahead

  • Kirsten M. Koepsel
  • Book
  • T-133
Published 2018-07-20 by SAE International in United States
The Aerospace Supply Chain and Cyber Security - Challenges Ahead looks at the current state of commercial aviation and cyber security, how information technology and its attractiveness to cyber attacks is affecting it, and the way supply chains have become a vital part of the industry's cyber-security strategy.More than ever before, commercial aviation relies on information and communications technology. Some examples of this include the use of e-tickets by passengers, electronic flight bags by pilots, wireless web access in flight, not to mention the thousands of sensors throughout the aircraft constantly gathering and sharing data with the crew on the ground.The same way technology opens the doors for speed, efficiency and convenience, it also offers the unintended opportunity for malicious cyber attacks, with threat agents becoming bolder and choosing any possible apertures to breach security. Supply chains are now being seriously targeted as a pathway to the vital core of organizations around the world.Written in a direct and informative way, The Aerospace Supply Chain and Cyber Security - Challenges Ahead discusses the importance of deeply…

Passive Hardware Considerations for Medical Body Area Network Transceivers

  • Magazine Article
  • TBMG-29112
Published 2018-06-01 by Tech Briefs Media Group in United States
In hospitals and healthcare institutions, the sheer amount of patient metrics to track for the staff of doctors and nurses can be been a point of contention. Lawsuits based on the grounds of negligence are a risk that all healthcare practitioners take. Furthermore, there is an estimated 200,000 patients that die in the United States annually from medical errors. 1 Introducing wireless patient monitoring in these environments can potentially mitigate the risks that are innately involved in an environment geared at treatment and maintenance of sick people. There is always the potential for cyberattacks, but the rewards may outweigh the risks. Wired technologies limit patient mobility, increase the difficulty in transporting patients, and often introduce significant delays and hassle for the caregiver in arranging the cables.

A Centrally Managed Identity-Anonymized CAN Communication System*

  • Corporate Research & Development Center, Toshiba Corporation-Zhengfan Xia, Yuichi Komano, Takeshi Kawabata, Hideo Shimizu
  • Journal Article
  • 11-01-01-0002
Published 2018-05-16 by SAE International in United States
Identity-Anonymized CAN (IA-CAN) protocol is a secure CAN protocol, which provides the sender authentication by inserting a secret sequence of anonymous IDs (A-IDs) shared among the communication nodes. To prevent malicious attacks from the IA-CAN protocol, a secure and robust system error recovery mechanism is required. This article presents a central management method of IA-CAN, named the IA-CAN with a global A-ID, where a gateway plays a central role in the session initiation and system error recovery. Each ECU self-diagnoses the system errors, and (if an error happens) it automatically resynchronizes its A-ID generation by acquiring the recovery information from the gateway. We prototype both a hardware version of an IA-CAN controller and a system for the IA-CAN with a global A-ID using the controller to verify our concept.