Your Selections

Cybersecurity
Show Only Newly Added Content My Access Full Text Content

Collections

Complimentary Content
Journal Articles Magazine Articles Open Access TBMG Articles Tech Insights White Papers

File Formats

ePUB (11) HTML (42) PDF (40)

Content Types

Magazine Article (19) Book (16) Technical Paper (15) Journal Article (5) Magazine Feature Article (5) Magazine Issue (3) Professional Development (2) Ground Vehicle Standard (1)

Dates

Sectors

Automotive (49) Aerospace (20) Commercial Vehicle (17)

Topics

Cybersecurity (66) Computer software and hardware (25) Architecture (14) Research and development (10) Vehicle networking (10) Connectivity (9) Risk assessments (8) Communication protocols (7) Vehicle to vehicle (V2V) (7) Autonomous vehicles (6) Risk management (6) Technical review (6) Cryptography (5) Education and training (5) Electronic control units (5) Hardware (5) Infotainment systems (5) Internet of things (IoT) (5) Mathematical models (5) Medical equipment and supplies (5) Sensors and actuators (5) Mobility (4) Regulations (4) Security systems (4) Wireless communication systems (4) Big data (3) Collaboration and partnering (3) Commercial vehicles (3) Control systems (3) Energy consumption (3) On-board diagnostics (OBD) (3) Product development (3) Simulation and modeling (3) Supply chain management (3) Systems management (3) Telecommunications systems (3) Test procedures (3) Active safety systems (2) Certification (2) Diagnosis (2) Documentation (2) Driver assistance systems (2) Electrical systems (2) Embedded software (2) Imaging and visualization (2) Intelligent transportation Systems (2) Logistics (2) Machine learning (2) Personnel (2) Planning / sheduling (2)

Authors

Costlow, Terry (3) Koepsel, Kirsten M. (2) Shuttleworth, Jennifer (2) Ward, David (2) Armengaud, Eric (1) Arndt, Paul (1) Bechler, Marc (1) Ben David, Tal (1) Bochow, Bernd (1) Bosworth, Seymour (1) Brenner, Eugen (1) Buchholz, Kami (1) Bulgakov, Nickolay (1) Chan, Wai Keung (1) Chen, Qi (1) Czerny, Barbara J. (1) d’Eon, Greg (1) Daily, Jeremy (1) Dannebaum, Udo (1) Delgrossi, Luca (1) Economou, John (1) Emmelmann, Marc (1) Felix, Rodrigo (1) Freiwald, Axel (1) Frith, Bob (1) Gamble, Rose (1) Girimonte, Sam (1) Gowri, Krishnan (1) Gregg, Michael (1) Gritsuk, Igor V. (1) Gui, Kok Cheng (1) Halliwell, John (1) Harel, Assaf (1) Harris, Paul (1) Harry, Evan (1) Hartenstein, Hannes (1) Heidt, Laurent (1) Hirschler, Bernd (1) Hu, Qiang (1) Hwang, Gunn (1) Ibarra, Ireri (1) Iyer, Gopalakrishnan (1) Jakovljevic, Mirko (1) Johnson, James (1) Kabay, M. E. (1) Kashani, Ameer (1) Kellum, Christopher (1) Kim, Dae-Kyoo (1) Klets, Dmytro (1) Klimke, Martin (1)

Publishers

SAE (37) TBMG (12) Wiley (11) ABOUT (1) CTEA (1) NOSTARCH (1)

Affiliations

Chrysler Group LLC (2) AUDI AG (1) AVL List GmbH (1) Baylor University (1) Colorado State University (1) Cranfield Univ. (1) DENSO Corporation (1) DENSO International America Inc (1) DENSO International America Inc. (1) Donbas National Academy of Civil Engineering & Architecture (1) EPRI (1) Ford Motor Co. (1) Ford Motor Company (1) General Motors Company (1) Graz University of Technology (1) Grenoble Institute of Technology (1) HORIBA MIRA Ltd (1) HP Chemie Pelzer Ltd. (1) I.S.C.N. GesmbH/LTD (1) Infineon Technologies (1) Infineon Technologies AG (1) Infineon Technologies AG Germany (1) Infineon Technologies Korea Co., Ltd. (1) INVENSITY GmbH (1) Karamba Security (1) Kharkiv National Auto and Highway University (1) Kharkov National Auto and Highway University (1) Kherson State Maritime Academy (1) MIRA Ltd (1) Motorola, Inc. (1) National Aerospace University (1) National Transport University (NTU) (1) NewAE Technology Inc. (1) Nissan Technical Center NA Inc. (1) Oakland University (1) Pacific Northwest National Laboratory (1) SAE Industry Technologies Consortia (1) Synercon Technologies (1) Tongji Univ (1) Tongji University (1) Toyota InfoTechnology Center USA (1) TTTech (1) TTTech. Computertechnik AG (1) University of Tulsa (1) Yocum Communications (1)

Committees

Vehicle E E System Diagnostic Standards Committee (1)

Events

WCX World Congress Experience (4) WCX™ 17: SAE World Congress Experience (4) SAE 2013 World Congress & Exhibition (2) 1998 International Congress on Transportation Electronics (1) AeroTech Congress & Exhibition (1) Intelligent and Connected Vehicles Symposium (1) Noise and Vibration Conference and Exhibition (1) SAE 2011 World Congress & Exhibition (1) SAE 2014 Aerospace Systems and Technology Conference (1) SAE 2016 Brake Colloquium & Exhibition - 34th Annual (1) SAE 2016 Commercial Vehicle Engineering Congress (1) SAE 2016 World Congress and Exhibition (1)

Magazine

Automotive Engineering® (7) Truck & Off-Highway Engineering™ (2) MOMENTUM The Magazine for Student Members of SAE International® (1) MOMENTUM, The Magazine for Student Members of SAE International® (1) Off-Highway Engineering® (1)
new

The Aerospace Supply Chain and Cyber Security- Challenges Ahead

  • Kirsten M. Koepsel
  • Book
  • T-133
Published 2018-04-24 by SAE International in United States
The Aerospace Supply Chain and Cyber Security – Challenges Ahead looks at the current state of commercial aviation and cyber security, how information technology and its attractiveness to cyber attacks is affecting it, and the way supply chains have become a vital part of the industry’s cyber-security strategy. More than ever before, commercial aviation relies on information and communications technology. Some examples of this include the use of e-tickets by passengers, electronic flight bags by pilots, wireless web access in flight, not to mention the thousands of sensors throughout the aircraft constantly gathering and sharing data with the crew on the ground. The same way technology opens the doors for speed, efficiency and convenience, it also offers the unintended opportunity for malicious cyber attacks, with threat agents becoming bolder and choosing any possible apertures to breach security. Supply chains are now being seriously targeted as a pathway to the vital core of organizations around the world. Written in a direct and informative way, The Aerospace Supply Chain and Cyber Security – Challenges Ahead discusses the…

Mitigating Unknown Cybersecurity Threats in Performance Constrained Electronic Control Units

  • Karamba Security - Assaf Harel, Tal Ben David
  • DENSO International America Inc. - Ameer Kashani
  • Show More
Published 2018-04-03 by SAE International in United States

Externally-connected Electronic Control Units (ECUs) contain millions of lines of code, which may contain security vulnerabilities. Hackers may exploit these vulnerabilities to gain code execution privileges, which affect public safety. Traditional Cybersecurity solutions fall short in meeting automotive ECU constraints such as zero false positives, intermittent connectivity, and low performance impact. A desirable solution would be deterministic, require minimum resources, and protect against known and unknown security threats. We integrated Autonomous Security on a BeagleBone Black (BBB) system to evaluate the feasibility of mitigating Cybersecurity risks against potential threats. We identified key metrics that should be measured, such as level of security, ease of integration and system performance impact. In this paper, we describe the integration and evaluation process and present its results. We show that Autonomous Security can provide this protection with zero false-positives while meeting automotive constraints.

Security Mechanisms Design for In-Vehicle Network Gateway

  • Tongji University - Feng Luo, Qiang Hu
Published 2018-04-03 by SAE International in United States

In the automotive network architecture, the basic functions of gateway include routing, diagnostic, network management and so on. With the rapid development of connected vehicles, the cybersecurity has become an important topic in the automotive network. A spoof ECU can be used to hack the automotive network. In order to prevent the in-vehicle networks from attacking, the automotive gateway is an important part of the security architecture. A secure gateway should be able to authenticate the connected ECU and control the access to the critical network domain. The data and signals transferred between gateway and ECUs should be protected to against wiretap attacking. The purpose of this paper is to design a secure gateway for in-vehicle networks. In this paper, the designing process of the automotive secure gateway is presented. Based on the threat analysis, security requirements for automotive gateway are defined. Secure communication, key master, and firewall are proposed as the security mechanisms to protect the automotive gateway. Secure communication mechanisms contain the message authentication and data encryption. Key master is a gateway function to distribute and update the keys for the secure communication of connected ECUs. Firewall based on message filter is designed to isolate the untrusted network domain and trusted network domain. The security functions of the automotive gateway are validated in a simulated attacking environment. A microcontroller with HSM is used to implement the secure gateway. Considering the influences of security mechanisms, the network latency is tested and the results have proved the secure gateway is effective and efficient.

Safe and Secure Development: Challenges and Opportunities

  • INVENSITY GmbH - Jana Karina von Wedel, Paul Arndt
Published 2018-04-03 by SAE International in United States

The ever-increasing complexity and connectivity of driver assist functions pose challenges for both Functional Safety and Cyber Security. Several of these challenges arise not only due to the new functionalities themselves but due to numerous interdependencies between safety and security. Safety and security goals can conflict, safety mechanisms might be intentionally triggered by attackers to impact functionality negatively, or mechanisms can compete for limited resources like processing power or memory to name just some conflict potentials. But there is also the potential for synergies, both in the implementation as well as during the development. For example, both disciplines require mechanisms to check data integrity, are concerned with freedom from interference and require architecture based analyses. So far there is no consensus in the industry on how to best deal with these interdependencies in automotive development projects. SAE J3061 introduces a process framework for Cyber Security development that is intentionally very similar to that for Functional Safety as defined in ISO 26262. While these parallel frameworks help to identify interdependencies and show that aligned processes are possible, a joint process seems unreasonable due to the vastly different implementation frameworks and methods. Using concrete examples, we show problems that can arise if Functional Safety and Cyber Security processes are not properly aligned and integrated into the overall development process. Based on this we then propose steps towards coordinated safety and security processes that can prevent such problems and show how such an approach at the same time allows to benefit from synergies.

Information Security Risk Management of Vehicles

  • Kharkiv National Auto and Highway University - Dmytro Klets
  • Kharkov National Auto and Highway University - Igor V. Gritsuk
  • Show More
Published 2018-04-03 by SAE International in United States

The results of this work is allowed to identify a number of cybersecurity threats of the automated security-critical automotive systems, which reduces the efficiency of operation, road safety and system safety. Wired or wireless access of the information networks of the modern vehicles allows to gain control over power unit, chassis, security system components and comfort systems.

Power Analysis and Fault Attacks against Secure CAN: How Safe Are Your Keys?

  • NewAE Technology Inc. - Colin O’Flynn, Greg d’Eon
  • Journal Article
  • 11-01-01-0001
Published 2018-02-14 by SAE International in United States

Designers of automotive systems find themselves pulled in an impossible number of directions. Systems must use the most advanced security features, but at the same time run on low-cost and resource-constrained hardware. Ultimately, an engineering trade-off will eventually be made regarding how encryption and key management is used on these systems, potentially leaving them vulnerable to attack.

BIG DATA A FOCUS FOR 2018 SAE PRESIDENT MIRCEA GRADU

  • Magazine Article
  • 18MOMP02_03
Published 2018-02-01 by SAE International in United States

Velodyne CQO sees use of Big Data as a way to capitalize on multiple industry trends including vehicle electrification and automated vehicles.

A HIGHLY RESPECTED FIGURE in the automotive industry, Mircea Gradu, Ph.D., this month begins his one-year term as SAE President amid monumental technology shifts that are rocking the automotive industry. SAE has been a source of progress and stability almost since the industry's inception, and looks assured to continue in that way under Gradu's leadership.

Big Data a focus for 2018 SAE President Mircea Gradu

  • Patrick Ponticel
  • Magazine Article
  • 18TOFHP02_04
Published 2018-02-01 by SAE International in United States

Velodyne CQO sees use of Big Data as a way to capitalize on multiple industry trends including vehicle electrification and automated vehicles.

A highly respected figure in the automotive industry, Mircea Gradu, Ph.D., began his one-year term as SAE President in January amid monumental technology shifts that are rocking the automotive industry. SAE has been a source of progress and stability almost since the industry's inception, and looks assured to continue in that way under Gradu's leadership.

SAE STANDARDS NEWS

  • Jennifer Shuttleworth
  • Magazine Article
  • 18AUTP01_09
Published 2018-01-01 by SAE International in United States

Moving swiftly to define the shared-mobility future

Public and private partnerships to standardize data, share data, and protect sensitive data are being formed to help understand-and at the same time define- shared-mobility's potential to transform the transportation network.

Research on Vehicle Cybersecurity Based on Dedicated Security Hardware and ECDH Algorithm

  • Tongji Univ - Zhihong Wu, Jian_ning Zhao, Yuan Zhu, Qingchen Li
Published 2017-09-23 by SAE International in United States

Vehicle cybersecurity consists of internal security and external security. Dedicated security hardware will play an important role in car’s internal and external security communication. TPM (Trusted Platform Module) can serve as the security cornerstone when vehicle connects with external entity or constructs a trusted computing environment. Based on functions such as the storage of certificate, key derivation and integrity testing, we research the principle of how to construct a trusted environment in a vehicle which has telematics unit. HSM (Hardware Security Module) can help to realize the onboard cryptographic communication securely and quickly so as to protect data. For certain AURIX MCU consisting of HSM, the experiment result shows that cheaper 32-bit HSM’s AES calculating speed is 25 times of 32-bit main controller, so HSM is an effective choice to realize cybersecurity. After comparing two existing methods that realize secure CAN communication, A Modified SECURE CAN scheme is proposed, and differences of the three schemes are analyzed. Result shows that considering both communication time and attacks such as replay attack and eavesdropping, the Modified SECURE CAN communication has more advantage in practical applications. In a secure system, key derivation and management is a critical question. After comparing the computational efficiency of the RSA and ECC algorithm, an improved key derivation scheme to realize one-time pad is proposed based on ECDH algorithm. Key derivation among 3 ECUs is realized and derivation time is tested.