Cybersecurity (92)Computer software and hardware (32)Architecture (16)Research and development (15)Vehicle networking (12)Risk assessments (11)Connectivity (10)Risk management (9)Autonomous vehicles (8)Communication protocols (8)Mathematical models (8)Medical equipment and supplies (8)Electronic control units (7)Internet of things (IoT) (7)Sensors and actuators (7)Vehicle to vehicle (V2V) (7)Technical review (6)Wireless communication systems (6)Collaboration and partnering (5)Cryptography (5)Education and training (5)Hardware (5)Infotainment systems (5)Security systems (5)Commercial vehicles (4)Embedded software (4)Mobility (4)On-board diagnostics (OBD) (4)Personnel (4)Regulations (4)Test procedures (4)Big data (3)Control systems (3)Energy consumption (3)Internet (3)Product development (3)Simulation and modeling (3)Supply chain management (3)Systems engineering (3)Systems management (3)Telecommunications (3)Active safety systems (2)Cardiovascular system (2)Certification (2)Cloud computing (2)Commercial aircraft (2)Communication systems (2)Defense industry (2)Diagnosis (2)Documentation (2)
Costlow, Terry (3)Koepsel, Kirsten M. (2)Shuttleworth, Jennifer (2)Ward, David (2)Armengaud, Eric (1)Arndt, Paul (1)Bechler, Marc (1)Ben David, Tal (1)Bochow, Bernd (1)Bosworth, Seymour (1)Brenner, Eugen (1)Buchholz, Kami (1)Bulgakov, Nickolay (1)Chan, Wai Keung (1)Chen, Qi (1)Czerny, Barbara J. (1)D'Anna, Gloria (1)Daily, Jeremy (1)Dannebaum, Udo (1)Delgrossi, Luca (1)Economou, John (1)Emmelmann, Marc (1)Felix, Rodrigo (1)Freiwald, Axel (1)Frith, Bob (1)Fujikura, Toshiyuki (1)Gamble, Rose (1)Girimonte, Sam (1)Gowri, Krishnan (1)Gregg, Michael (1)Gritsuk, Igor V. (1)Gui, Kok Cheng (1)Halliwell, John (1)Harel, Assaf (1)Harris, Paul (1)Harry, Evan (1)Hartenstein, Hannes (1)Heidt, Laurent (1)Hirschler, Bernd (1)Hu, Qiang (1)Hwang, Gunn (1)Ibarra, Ireri (1)Iyer, Gopalakrishnan (1)Jakovljevic, Mirko (1)Johnson, James (1)Kabay, M. E. (1)Kashani, Ameer (1)Kawabata, Takeshi (1)Kellum, Christopher (1)Kim, Dae-Kyoo (1)
SAE International (5)Chrysler Group LLC (2)AUDI AG (1)AVL List GmbH (1)Baylor University (1)Colorado State University (1)Corporate Research & Development Center, Toshiba Corporation (1)Cranfield Univ. (1)DENSO Corporation (1)DENSO International America Inc (1)DENSO International America Inc. (1)Donbas National Academy of Civil Engineering & Architecture (1)dSPACE (1)EPRI (1)Ford Motor Co. (1)Ford Motor Company (1)General Motors Company (1)General Telecom Systems Inc. (1)Graz University of Technology (1)Grenoble Institute of Technology (1)HORIBA MIRA Ltd (1)HP Chemie Pelzer Ltd. (1)I.S.C.N. GesmbH/LTD (1)Infineon Technologies (1)Infineon Technologies AG (1)Infineon Technologies AG Germany (1)Infineon Technologies Korea Co., Ltd. (1)INVENSITY GmbH (1)Karamba Security (1)Kharkiv National Auto and Highway University (1)Kharkov National Auto and Highway University (1)Kherson State Maritime Academy (1)MIRA Ltd (1)Motorola, Inc. (1)Nagoya University (1)National Aerospace University (1)National Transport University (NTU) (1)Nissan Technical Center NA Inc. (1)Oakland University (1)Pacific Northwest National Laboratory (1)SAE Industry Technologies Consortia (1)Synercon Technologies (1)Tongji Univ (1)Tongji University (1)Toyota InfoTechnology Center USA (1)TTTech (1)TTTech. Computertechnik AG (1)University of Tulsa (1)Yocum Communications (1)
PNT Position, Navigation, and Timing (1)Vehicle E E System Diagnostic Standards Committee (1)
WCX World Congress Experience (5)WCX™ 17: SAE World Congress Experience (4)SAE 2013 World Congress & Exhibition (2)1998 International Congress on Transportation Electronics (1)AeroTech Congress & Exhibition (1)Intelligent and Connected Vehicles Symposium (1)Noise and Vibration Conference and Exhibition (1)SAE 2011 World Congress & Exhibition (1)SAE 2014 Aerospace Systems and Technology Conference (1)SAE 2016 Brake Colloquium & Exhibition - 34th Annual (1)SAE 2016 Commercial Vehicle Engineering Congress (1)SAE 2016 World Congress and Exhibition (1)
Automotive Engineering® (7)Truck & Off-Highway Engineering™ (2)MOMENTUM The Magazine for Student Members of SAE International® (1)MOMENTUM, The Magazine for Student Members of SAE International® (1)Off-Highway Engineering® (1)
Published 2018-10-01 by Tech Briefs Media Group in United States
This research investigates a new vision for increasing the resilience of computing clouds by elevating continuous change, evolution, and misinformation as first-rate design principles of the cloud's infrastructure. The work is motivated by the fact that today's clouds are very static, uniform, and predictable, allowing attackers who identify a vulnerability in one of the services or infrastructure components to spread their effect to other, mission-critical services. The goal is to integrate into clouds a new level of unpredictability for both their services and data so as to both impede an adversary's ability to achieve an initial system compromise and, if a compromise occurs, to detect, disrupt, and/or otherwise impede their ability to exploit this success.
In a very interconnected world, cyber vulnerability is real. Kirsten Koepsel, lawyer and engineer specializing in cyber security, talks with SAE International about how this new environment affects the planes and airports we use every day.
Published 2018-09-01 by Tech Briefs Media Group in United States
Today, more than 8 billion devices are connected around the world, including medical devices, wearables, vehicles, and smart household and city technologies. Those devices are vulnerable to hacker attacks that locate, intercept, and overwrite the data, jamming signals. One method to protect the data is frequency hopping, which sends each data packet, containing thousands of individual bits, on a random, unique radio frequency (RF) channel, so hackers can't pin down any given packet. Hopping large packets, however, is just slow enough that hackers can still execute an attack.
Published 2018-09-01 by Tech Briefs Media Group in United States
Transferring data using light passed along fiber optic cables has become increasingly common over the past decades, but each pulse currently contains millions of photons. That means that in principle, a portion of these could be intercepted without detection. Secure data is already encrypted, but if an eavesdropper was able to intercept the signals containing details of the code, in theory they could access and decode the rest of the message.
Published 2018-08-28 by SAE International in United States
This book provides a thorough view of cybersecurity to encourage those in the commercial vehicle industry to be fully aware and concerned that their fleet and cargo could be at risk to a cyber-attack. It delivers details on key subject areas including: • SAE International Standard J3061; the cybersecurity guidebook for cyber-physical vehicle systems • The differences between automotive and commercial vehicle cybersecurity. • Forensics for identifying breaches in cybersecurity. • Platooning and fleet implications. • Impacts and importance of secure systems for today and for the future. Cybersecurity for all segments of the commercial vehicle industry requires comprehensive solutions to secure networked vehicles and the transportation infrastructure. It clearly demonstrates the likelihood that an attack can happen, the impacts that would occur, and the need to continue to address those possibilities. This multi-authored presentation by subject-matter experts provides an interesting and dynamic story of how industry is developing solutions that address the critical security issues; the key social, policy, and privacy perspectives; as well as the integrated efforts of industry, academia, and government to…
Vehicle cybersecurity vulnerabilities could impact a vehicle's safe operation. Therefore, engineers should ensure that systems are designed free of unreasonable risks to motor vehicle safety, including those that may result due to existence of potential cybersecurity vulnerabilities. The automotive industry is making vehicle cybersecurity an organizational priority. Prioritizing vehicle cybersecurity also means learning about vehicle hacking techniques in order to ensure that systems will be reasonably safe under expected real-world conditions, including those that may arise due to potential vehicle cybersecurity vulnerabilities from hacking the CAN communications or OBD-II interface. The automotive cybersecurity environment is dynamic and is expected to change continually and, at times, rapidly. Developing a basic understanding of car hacking can provide a good foundation for developing approaches to vehicle cybersecurity. Attendees will be introduced to modern automotive in-vehicle communication networks, the CAN communications protocol and the OBD-II interface threat models, hacking into the OBD-II diagnostics interface, ECU cracking, and vehicle network cyber penetration testing. This course will cover existing in-vehicle communication protocols and associated vulnerabilities as well as the limitations of…
Published 2018-08-01 by Tech Briefs Media Group in United States
In 2017, the healthcare industry experienced a dramatic surge in cyberattacks. Thousands of healthcare organizations around the world suffered various attacks — from data theft to ransomware attacks. Among them was the notorious WannaCry ransomware attack, which affected over 300,000 machines across 150,000 countries, including the United States. As many as 200,000 Windows systems were impacted by WannaCry, including nearly 50 healthcare facilities in the UK, and dozens more in the United States. The infections from WannaCry impacted medical devices as well, putting hospital staff — and patient safety — at risk.
Published 2018-07-20 by SAE International in United States
The Aerospace Supply Chain and Cyber Security - Challenges Ahead looks at the current state of commercial aviation and cyber security, how information technology and its attractiveness to cyber attacks is affecting it, and the way supply chains have become a vital part of the industry's cyber-security strategy.More than ever before, commercial aviation relies on information and communications technology. Some examples of this include the use of e-tickets by passengers, electronic flight bags by pilots, wireless web access in flight, not to mention the thousands of sensors throughout the aircraft constantly gathering and sharing data with the crew on the ground.The same way technology opens the doors for speed, efficiency and convenience, it also offers the unintended opportunity for malicious cyber attacks, with threat agents becoming bolder and choosing any possible apertures to breach security. Supply chains are now being seriously targeted as a pathway to the vital core of organizations around the world.Written in a direct and informative way, The Aerospace Supply Chain and Cyber Security - Challenges Ahead discusses the importance of deeply…
Published 2018-06-01 by Tech Briefs Media Group in United States
In hospitals and healthcare institutions, the sheer amount of patient metrics to track for the staff of doctors and nurses can be been a point of contention. Lawsuits based on the grounds of negligence are a risk that all healthcare practitioners take. Furthermore, there is an estimated 200,000 patients that die in the United States annually from medical errors. 1 Introducing wireless patient monitoring in these environments can potentially mitigate the risks that are innately involved in an environment geared at treatment and maintenance of sick people. There is always the potential for cyberattacks, but the rewards may outweigh the risks. Wired technologies limit patient mobility, increase the difficulty in transporting patients, and often introduce significant delays and hassle for the caregiver in arranging the cables.
Corporate Research & Development Center, Toshiba Corporation-Zhengfan Xia, Yuichi Komano, Takeshi Kawabata, Hideo Shimizu
Published 2018-05-16 by SAE International in United States
Identity-Anonymized CAN (IA-CAN) protocol is a secure CAN protocol, which provides the sender authentication by inserting a secret sequence of anonymous IDs (A-IDs) shared among the communication nodes. To prevent malicious attacks from the IA-CAN protocol, a secure and robust system error recovery mechanism is required. This article presents a central management method of IA-CAN, named the IA-CAN with a global A-ID, where a gateway plays a central role in the session initiation and system error recovery. Each ECU self-diagnoses the system errors, and (if an error happens) it automatically resynchronizes its A-ID generation by acquiring the recovery information from the gateway. We prototype both a hardware version of an IA-CAN controller and a system for the IA-CAN with a global A-ID using the controller to verify our concept.
The current search and criteria have already been saved. Please modify your criteria to save as a new search.
Request Sent successfully!
Contact Technical Support
Institutional Access Sign-up
Search Tips: Search Operators:AND, OR, NOT; Wild Cards; Using Quotes
SAE MOBILUS® Search Tips
Please note: All terms not contained within quotes, will be evaluated using the OR operator. This means that your search results will contain all results that contain ANY of the entered terms.
AND, OR, NOT
SAE MOBILUS supports the use of the AND, OR and NOT BOOLEAN operators ONLY function with the Advanced Search.
Using the asterisk, ( * ) allows you to search for a partial word. For example, entering a keyword search of aero* will search for any word beginning with aero.
Using the question mark, ( ? ) allows you to search for a word with a single character wildcard. For example, searching for t?re would match both tire and tyre
Words in double quotes " " are treated as a phrase. Conducting a search for "heat model" will return all results in which the exact phrase "heat model" is found, while "heat modeling" would NOT be included.
A term combined with a phrase will be joined with an OR operator.
Searching for Standards
When searching for a standard please use the entire Document Number assigned, which includes the abbreviation. A space can be used, or omitted between the abbreviation and number.