Your Selections

Cybersecurity
Show Only

Collections

File Formats

Content Types

Dates

Sectors

Topics

Authors

Publishers

Affiliations

Committees

Events

Magazine

Series

   This content is not included in your SAE MOBILUS subscription, or you are not logged in.
new

Supply Chain Vulnerabilities Impacting Commercial Aviation

Kirsten M. Koepsel
  • Book
  • T-138
Published 2019-09-04 by SAE International in United States

Written by Kirsten Koepsel, a lawyer and engineer whose work has focused on aviation cybersecurity, Supply Chain Vulnerabilities Impacting Commercial Aviation addresses the big question facing aircraft manufacturers today: keep the work in house or outsource it? The ongoing battle between cost cutting and supply-chain control is ever more visible as aircraft OEMs have full order books and tight delivery schedules.

Annotation ability available
   This content is not included in your SAE MOBILUS subscription, or you are not logged in.
new

BlackBerry Tech Duo Sees Emergence of Vehicle-based Platforms

Autonomous Vehicle Engineering: September 2019

Paul Seredynski
  • Magazine Article
  • 19AVEP09_07
Published 2019-09-01 by SAE International in United States

Though likely to provide the OS of autonomy, BlackBerry also anticipates a larger shift to automobiles as software platforms.

At 2019's TU Automotive conference, Autonomous Vehicle Engineering spoke with two of the industry's most important software sages, BlackBerry's John Wall and Kaivan Karimi, both senior vice presidents and co-heads of Blackberry Technology Solutions. The duo's division includes BlackBerry's security services, the nigh ubiquitous QNX architecture along with products including Jarvis, Certicom and Paratek for the Waterloo, Ontario-based company. Sort of like chatting with the Obi-Wan and Yoda of secure-software architectures, the interview provided an animated back-and-forth between the two well-acquainted BlackBerry execs, discussing the emergence of the vehicle as its own software platform.

Annotation ability available
   This content is not included in your SAE MOBILUS subscription, or you are not logged in.
new

Autonomy in Your Face

Autonomous Vehicle Engineering: September 2019

Terry Costlow
  • Magazine Article
  • 19AVEP09_04
Published 2019-09-01 by SAE International in United States

Biometric technology is deemed essential to ensuring AV driving safety and advancing the user experience-if privacy issues don't derail its deployment.

Research into potential automotive applications for biometrics-facial and retina scans or fingerprints-is increasing, despite rising concerns about privacy and data security, and outcries from civil liberties advocates. A growing number of OEMs, Tier 1s and startups are striving to add facial recognition capability to driver monitoring systems (DMS).

Annotation ability available
   This content is not included in your SAE MOBILUS subscription, or you are not logged in.
new

Editorial

Autonomous Vehicle Engineering: September 2019

Editorial Director-Bill Visnic
  • Magazine Article
  • 19AVEP09_01
Published 2019-09-01 by SAE International in United States

Although editor-in-chief Lindsay Brooke's cover story detailing the foundations of Israel's surging tech sector helps to explain the nation's expanding expertise in all things cyber-secure, much of this issue deals with security and privacy of another kind-the access we grant almost daily to all manner of digital “providers” of goods and services.

Annotation ability available

Technology Produces Unclonable Digital Fingerprints for Internet of Things Devices

  • Magazine Article
  • TBMG-34932
Published 2019-08-01 by Tech Briefs Media Group in United States

Researchers have created technology that is 10 times more reliable than current methods of producing unclonable digital fingerprints that can be used to authenticate devices linked to the Internet of Things (IoT).

Hands-on Cybersecurity Studies: Multi-Perspective Analysis of the WannaCry Ransomware

  • Magazine Article
  • TBMG-34864
Published 2019-08-01 by Tech Briefs Media Group in United States

Ransomware is malware that obstructs a user from accessing digital assets through various mechanisms. These assets are held hostage and inaccessible until the user pays a ransom. In most cases, this is accomplished using encryption where, once the malicious program executes, it will target and encrypt certain files and will release the decryption key at the time of payment. Some ransomware instances target only certain common user-generated files such as media and documents. In this case, system files and others required for the operating system to function correctly (user authentication, process execution, etc.) are unaffected. Others encrypt much more and seek to lock out entire systems.

   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Hands-on Cybersecurity Studies: Multi-Perspective Analysis of the WannaCry Ransomware

Aerospace & Defense Technology: August 2019

  • Magazine Article
  • 19AERP08_10
Published 2019-08-01 by SAE International in United States

In-depth analysis of malware provides strategy to defend against future attacks.

Ransomware is malware that obstructs a user from accessing digital assets through various mechanisms. These assets are held hostage and inaccessible until the user pays a ransom. In most cases, this is accomplished using encryption where, once the malicious program executes, it will target and encrypt certain files and will release the decryption key at the time of payment. Some ransomware instances target only certain common user-generated files such as media and documents. In this case, system files and others required for the operating system to function correctly (user authentication, process execution, etc.) are unaffected. Others encrypt much more and seek to lock out entire systems.

Annotation ability available
   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

E/E Data Link Security

Vehicle E E System Diagnostic Standards Committee
  • Ground Vehicle Standard
  • J2186_201907
  • Current
Published 2019-07-12 by SAE International in United States

This SAE Recommended Practice establishes a uniform practice for protecting vehicle components from "unauthorized" access through a vehicle data link connector (DLC). The document defines a security system for motor vehicle and tool manufacturers. It will provide flexibility to tailor systems to the security needs of the vehicle manufacturer. The vehicle modules addressed are those that are capable of having solid state memory contents accessed or altered through the data link connector. Improper memory content alteration could potentially damage the electronics or other vehicle modules; risk the vehicle compliance to government legislated requirements; or risk the vehicle manufacturer's security interests. This document does not imply that other security measures are not required nor possible.

   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

Accelerated Secure Boot for Real-Time Embedded Safety Systems

SAE International Journal of Transportation Cybersecurity and Privacy

Rhein-Waal University of Applied Sciences-Kleve, Germany-Wonder Gumise
University of Michigan-Dearborn, USA-Ahmad M.K. Nasser, Di Ma
  • Journal Article
  • 11-02-01-0003
Published 2019-07-08 by SAE International in United States
Secure boot is a fundamental security primitive for establishing trust in computer systems. For real-time safety applications, the time taken to perform the boot measurement conflicts with the need for near instant availability. To speed up the boot measurement while establishing an acceptable degree of trust, we propose a dual-phase secure boot algorithm that balances the strong requirement for data tamper detection with the strong requirement for real-time availability. A probabilistic boot measurement is executed in the first phase to allow the system to be quickly booted. This is followed by a full boot measurement to verify the first-phase results and generate the new sampled space for the next boot cycle. The dual-phase approach allows the system to be operational within a fraction of the time needed for a full boot measurement while producing a high detection probability of data tampering. We propose two efficient schemes of the dual-phase approach along with calibratable parameters to achieve the desired tamper detection probability. We evaluate the tampering detection accuracy within a simulation environment. Then we build a…
This content contains downloadable datasets
Annotation ability available
   This content is not included in your SAE MOBILUS subscription, or you are not logged in.

What M&E Can Teach the AV Industry About Data

Autonomous Vehicle Engineering: July 2019

Jason Coari, Mark Pastor
  • Magazine Article
  • 19AVEP07_05
Published 2019-07-01 by SAE International in United States

Media & entertainment offers important learnings on data retention, management, scalability and security.

At first glance, autonomous vehicles would seem to have little in common with the Media and Entertainment (M&E) industry, beyond action-movie car chases and in-vehicle entertainment screens.

Annotation ability available