Your Selections

Cyber security
Show Only Newly Added Content My Access Full Text Content


Complimentary Content
Journal Articles Magazine Articles Open Access TBMG Articles Tech Insights White Papers

File Formats

ePUB (11) HTML (162) PDF (133)

Content Types

Magazine Article (90) Technical Paper (37) Magazine Issue (31) Magazine Feature Article (19) Book (18) Journal Article (11) Standard (6) Aerospace Standard (4) Professional Development (4) Ground Vehicle Standard (3) Progress In Technology (PT) (2) Journal (1)



Automotive (127) Aerospace (105) Commercial Vehicle (57) Automotive Sector (4) Govt/Defense Sector (2) Aerospace Sector (1) Commercial Veh Sector (1)


Cyber security (226) Data acquisition and handling (226) Electrical, Electronics, and Avionics (177) Architecture (74) Management and Organization (70) Telecommunications (70) Vehicles and Performance (65) Vehicles (63) Electrical, Electronics and Avionics (49) Computer software and hardware (34) Vehicle networking (31) Fuels and Energy Sources (30) Autonomous vehicles (29) Electronic control systems (29) Safety (29) Design Engineering and Styling (28) Communication protocols (27) Power and Propulsion (26) Human Factors and Ergonomics (25) Aircraft (24) Data management (23) Engines (22) Electronic equipment (21) Manufacturing (20) Electric power grid (18) Embedded software (17) Cryptography (16) Electric vehicles (16) Infotainment systems (16) Safety testing and procedures (16) Telematics (16) Sensors and actuators (15) Wireless communication systems (15) Computer software / hardware (14) Maintenance and Aftermarket (14) Materials (14) Tests and Testing (14) Unmanned aerial vehicles (14) Interiors, Cabins, and Cockpits (13) Internet of things (13) On-board energy sources (13) Commercial vehicles (12) Environment (12) Hybrid electric vehicles (12) Lightweighting (12) Trucks (12) Vehicle to vehicle (V2V) (12) Aerodynamics (11) Electrical systems (11) Electronic control units (11)


Costlow, Terry (11) Schmidt, Karsten (4) Shuttleworth, Jennifer (4) Dannebaum, Udo (3) Anderson, Brian (2) Brooke, Lindsay (2) Gehm, Ryan (2) Kashani, Ameer (2) Klimke, Martin (2) Koepsel, Kirsten M. (2) Ponticel, Patrick (2) Scheibert, Klaus (2) Schneider, Rolf (2) Ward, David (2) Weissler, Paul (2) Wilson, Ryan (2) Zweck, Harald (2) Aggarwal, Siddhartha (1) Alves, Marco A. R. (1) Antunes, Helder (1) Anzai, Jun (1) Armengaud, Eric (1) Arndt, Paul (1) Awajan, Arafat (1) Barreto, Alexandre (1) Bechler, Marc (1) Ben David, Tal (1) Bochow, Bernd (1) Borst, Matthew (1) Bosworth, Seymour (1) Brenner, Eugen (1) Brooks, Mark (1) Brunner, Martin (1) Buchholz, Kami (1) Bulgakov, Nickolay (1) Bünger, Thomas (1) Carvalho, Jeronymo (1) Chan, Wai Keung (1) Chen, Qi (1) Chernoguzov, Alex (1) Corbett, Christopher (1) Costa, Paulo (1) Czerny, Barbara J. (1) D'Anna, Gloria (1) Daily, Jeremy (1) Dakroub, Husein (1) Davis, Terry Lee (1) Delgrossi, Luca (1) Economou, John (1) Edwards, Jesse (1)


SAE (128) TBMG (73) Wiley (11) SAEITC (6) ABOUT (1) NOSTARCH (1)


Infineon Technologies AG (5) Audi Electronics Venture GmbH (3) AUDI AG (2) DENSO International America Inc (2) Ford Motor Company (2) Southwest Research Institute (2) AMD (1) Applied DNA Sciences Inc. (1) Audi AG (1) AVL List GmbH (1) Baylor University (1) Carnegie Mellon Univ. (1) Chrysler Group LLC (1) Cisco Systems (1) Colorado State University (1) Cranfield Univ. (1) CSUDH (1) DENSO Corporation (1) DENSO International America Inc. (1) DG Technologies (1) Donbas National Academy of Civil Engineering & Architecture (1) dSPACE (1) Editor-in-Chief (1) ESCRYPT GmbH (1) ESCRYPT Inc. (1) ESSS - Engineering Simulation & Scientific Software (1) ETAS K.K. (1) FESCARO (1) Florida Gulf Coast University (1) FTM, Technische Universität München (1) General Telecom Systems Inc. (1) George Mason University (1) Graz University of Technology (1) Grenoble Institute of Technology (1) Hamburg University of Technology (1) Hasso Plattner Institute (1) Hasso-Plattner-Institut (1) Hitachi Automotive Systems, Ltd. (1) Hitachi, Ltd. (1) Honeywell (1) HORIBA MIRA Ltd (1) I.S.C.N. GesmbH/LTD (1) INATEL - National Institute of Telecommunications (1) Infineon Technologies (1) Infineon Technologies AG Munich (1) Infineon Technologies Korea Co., Ltd. (1) Infineon Technologies North America Corp (1) Institute of Electrical Engineering,CAS (1) Instituto de Controle do Espaço Aéreo (1)


ARINC IA (6) APMC Avionics Process Management (4) Hybrid - EV Committee (2) Vehicle Cybersecurity Systems Engineering Committee (1)


WCX™ 17: SAE World Congress Experience (11) SAE 2016 World Congress and Exhibition (8) WCX World Congress Experience (8) SAE 2014 World Congress & Exhibition (6) SAE 2013 World Congress & Exhibition (3) SAE 2015 World Congress & Exhibition (3) Intelligent and Connected Vehicles Symposium (2) SAE 2014 Aerospace Systems and Technology Conference (2) SAE 2015 AeroTech Congress & Exhibition (2) 23rd SAE Brasil International Congress and Display (1) JSAE/SAE 2015 International Powertrains, Fuels & Lubricants Meeting (1) SAE 2016 Commercial Vehicle Engineering Congress (1)


Automotive Engineering® (16) Aerospace & Defense™ Technology (6) MOBILITY ENGINEERING™ AUTOMOTIVE, AEROSPACE, OFF-HIGHWAY (6) Truck & Off-Highway Engineering™ (4) MOBILITY ENGINEERING− AUTOMOTIVE, AEROSPACE, OFF-HIGHWAY (2) MOMENTUM The Magazine for Student Members of SAE International® (1) Off-Highway Engineering® (1)

Cybersecurity for Commercial Vehicles

  • General Telecom Systems Inc. - Gloria D'Anna
  • Book
  • R-464
Published 2018-06-01 by SAE International in United States
This book provides a thorough view of cybersecurity to encourage those in the commercial vehicle industry to be fully aware and concerned that their fleet and cargo could be at risk to a cyber-attack. It delivers details on key subject areas including: • SAE International Standard J3061; the cybersecurity guidebook for cyber-physical vehicle systems • The differences between automotive and commercial vehicle cybersecurity. • Forensics for identifying breaches in cybersecurity. • Platooning and fleet implications. • Impacts and importance of secure systems for today and for the future. Cybersecurity for all segments of the commercial vehicle industry requires comprehensive solutions to secure networked vehicles and the transportation infrastructure. It clearly demonstrates the likelihood that an attack can happen, the impacts that would occur, and the need to continue to address those possibilities. This multi-authored presentation by subject-matter experts provides an interesting and dynamic story of how industry is developing solutions that address the critical security issues; the key social, policy, and privacy perspectives; as well as the integrated efforts of industry, academia, and government to…

SAE International Journal of Transportation Cybersecurity and Privacy

  • Journal
  • V127-11EJ
Published 2018-05-01 by SAE International in United States
This is the electonric format of the journal.

SAE Truck & Off-Highway Engineering: April 2018

  • Magazine Issue
  • 18TOFHP04
Published 2018-04-05 by SAE International in United States
Connectivity takes center stage Telematic links have become the norm, helping fleet owners and operators improve efficiency and letting OEMs predict component failures.More power, less noise, fewer emissions These key attributes drive development of new generators both big and small.TARDEC pursues advanced power generation U.S. Army, GM collaborate on fuel-cell-generated electricity to power the vehicle's propulsion system and onboard electronics, while providing off-vehicle power via an Exportable Power Take-Off unit.Developing an alternative engine concept Ricardo's CryoPower engine leverages two unique combustion techniques for reduced emissions and fuel consumption-liquid nitrogen and split combustion. Long-haul trucking and stationary power generation will be the first beneficiaries of the technologies.Technology time-warp The road to autonomous driving has been under construction for decades, as showcased by SAE's Mobility History Committee at the 2018 WCX in Detroit.Editorial 'Heavy' topics on tap for WCX18Hackers aim to exploit vulnerabilities in CVs, pushing security to the forefrontGenerative design software exploits AI to change how new vehicles, equipment are designedSwRI's ECTO-Lab bridges gap in catalyst and aftertreatment developmentDiesel reigns as alternatives expand their role in…

Practical Approaches for Detecting DoS Attacks on CAN Network

  • KPIT Technologies, Ltd. - Pallavi Kalyanasundaram, Venkatesh Kareti, Meghana Sambranikar, Narendra Kumar SS, Priti Ranadive
Published 2018-04-03 by SAE International in United States

Some of the recent studies reveal that it is possible to access the in-vehicle networks and inject malicious messages to alter the behavior of the vehicle. Researchers have shown that, it is possible to hack a car’s communication network and remotely take control of brake, steering, power window systems, etc. Hence, it becomes inevitable to implement schemes that detect anomalies and prevent attacks on Controller Area Network (CAN). Our work explores the complete anomaly detection process for CAN. We cover the techniques followed, available tools and challenges at every stage. Beginning with what makes CAN protocol vulnerable, we discuss case studies about attacks on CAN with major focus on Denial of Service (DoS) attack. We analyze the pattern of normal CAN messages obtained from real vehicle, along with patterns of simulated attack data using different methods/tools. The work in this paper presents a statistical data analysis based machine learning algorithm with two approaches “time-based” and “message-based” to detect DoS attack on CAN bus. Comparative analysis of observations and accuracy results are highlighted. The average accuracy obtained for “time-based” approach is 81% while that for “message-based” is 80%.


Leveraging Hardware Security to Secure Connected Vehicles

  • AUDI AG - Christopher Corbett
  • Infineon Technologies AG - Martin Brunner
  • Show More
Published 2018-04-03 by SAE International in United States

Advanced safety features and new services in connected cars depend on the security of the underlying vehicle functions. Due to the interconnection with the outside world and as a result of being an embedded system a modern vehicle is exposed to both, malicious activities as faced by traditional IT world systems as well as physical attacks. This introduces the need for utilizing hardware-assisted security measures to prevent both kinds of attacks.


Case Study for Defining Security Goals and Requirements for Automotive Security Parts Using Threat Modeling

  • Infineon Technologies Korea Co., Ltd. - Jin Seo Park
  • FESCARO - Daehyun Kim, Seokmin Hong, Hyunjung Lee, EuiJung Myeong
Published 2018-04-03 by SAE International in United States

Several external networks like telematics, and SOTA and many in-vehicle networks by gateways and domain controllers have been increasingly introduced. However, these trends may potentially make many critical data opened, attacked and modified by hackers. These days, vehicle security has been significantly required as these vehicle security threats are related to the human life like drivers and pedestrians.


Mitigating Unknown Cybersecurity Threats in Performance Constrained Electronic Control Units

  • Karamba Security - Assaf Harel, Tal Ben David
  • DENSO International America Inc. - Ameer Kashani
  • Show More
Published 2018-04-03 by SAE International in United States

Externally-connected Electronic Control Units (ECUs) contain millions of lines of code, which may contain security vulnerabilities. Hackers may exploit these vulnerabilities to gain code execution privileges, which affect public safety. Traditional Cybersecurity solutions fall short in meeting automotive ECU constraints such as zero false positives, intermittent connectivity, and low performance impact. A desirable solution would be deterministic, require minimum resources, and protect against known and unknown security threats. We integrated Autonomous Security on a BeagleBone Black (BBB) system to evaluate the feasibility of mitigating Cybersecurity risks against potential threats. We identified key metrics that should be measured, such as level of security, ease of integration and system performance impact. In this paper, we describe the integration and evaluation process and present its results. We show that Autonomous Security can provide this protection with zero false-positives while meeting automotive constraints.


Security Mechanisms Design for In-Vehicle Network Gateway

  • Tongji University - Feng Luo, Qiang Hu
Published 2018-04-03 by SAE International in United States

In the automotive network architecture, the basic functions of gateway include routing, diagnostic, network management and so on. With the rapid development of connected vehicles, the cybersecurity has become an important topic in the automotive network. A spoof ECU can be used to hack the automotive network. In order to prevent the in-vehicle networks from attacking, the automotive gateway is an important part of the security architecture. A secure gateway should be able to authenticate the connected ECU and control the access to the critical network domain. The data and signals transferred between gateway and ECUs should be protected to against wiretap attacking. The purpose of this paper is to design a secure gateway for in-vehicle networks. In this paper, the designing process of the automotive secure gateway is presented. Based on the threat analysis, security requirements for automotive gateway are defined. Secure communication, key master, and firewall are proposed as the security mechanisms to protect the automotive gateway. Secure communication mechanisms contain the message authentication and data encryption. Key master is a gateway function to distribute and update the keys for the secure communication of connected ECUs. Firewall based on message filter is designed to isolate the untrusted network domain and trusted network domain. The security functions of the automotive gateway are validated in a simulated attacking environment. A microcontroller with HSM is used to implement the secure gateway. Considering the influences of security mechanisms, the network latency is tested and the results have proved the secure gateway is effective and efficient.


Safe and Secure Development: Challenges and Opportunities

  • INVENSITY GmbH - Jana Karina von Wedel, Paul Arndt
Published 2018-04-03 by SAE International in United States

The ever-increasing complexity and connectivity of driver assist functions pose challenges for both Functional Safety and Cyber Security. Several of these challenges arise not only due to the new functionalities themselves but due to numerous interdependencies between safety and security. Safety and security goals can conflict, safety mechanisms might be intentionally triggered by attackers to impact functionality negatively, or mechanisms can compete for limited resources like processing power or memory to name just some conflict potentials. But there is also the potential for synergies, both in the implementation as well as during the development. For example, both disciplines require mechanisms to check data integrity, are concerned with freedom from interference and require architecture based analyses. So far there is no consensus in the industry on how to best deal with these interdependencies in automotive development projects. SAE J3061 introduces a process framework for Cyber Security development that is intentionally very similar to that for Functional Safety as defined in ISO 26262. While these parallel frameworks help to identify interdependencies and show that aligned processes are possible, a joint process seems unreasonable due to the vastly different implementation frameworks and methods. Using concrete examples, we show problems that can arise if Functional Safety and Cyber Security processes are not properly aligned and integrated into the overall development process. Based on this we then propose steps towards coordinated safety and security processes that can prevent such problems and show how such an approach at the same time allows to benefit from synergies.


Proposal of HILS-Based In-Vehicle Network Security Verification Environment

  • Nagoya University - Ryo Kurachi
  • dSPACE - Toshiyuki Fujikura
Published 2018-04-03 by SAE International in United States

We propose a security-testing framework to analyze attack feasibilities for automotive control software by integrating model-based development with model checking techniques. Many studies have pointed out the vulnerabilities in the Controller Area Network (CAN) protocol, which is widely used in in-vehicle network systems. However, many security attacks on automobiles did not explicitly consider the transmission timing of CAN packets to realize vulnerabilities. Additionally, in terms of security testing for automobiles, most existing studies have only focused on the generation of the testing packets to realize vulnerabilities, but they did not consider the timing of invoking a security testing. Therefore, we focus on the transmit timing of CAN packets to realize vulnerabilities. In our experiments, we have demonstrated the classification of feasible attacks at the early development phase by integrating the model checking techniques into a virtualized environment.