Security challenges in automotive hardware/software architecture design

This paper is an introduction to security challenges for the design of automotive hardware/software architectures. State-of-the-art automotive architectures are highly heterogeneous and complex systems that rely on distributed functions based on electronics and software. As cars are getting more con...

Full description

Bibliographic Details
Main Authors: Sagstetter, Florian, Lukasiewycz, Martin, Steinhorst, Sebastian, Wolf, Marko, Bouard, Alexandre, Peyrin, Thomas, Poschmann, Axel, Chakraborty, Samarjit, Harris, William R., Jha, Somesh.
Other Authors: School of Physical and Mathematical Sciences
Format: Conference Paper
Language:English
Published: 2013
Subjects:
Online Access:https://hdl.handle.net/10356/99788
http://hdl.handle.net/10220/17589
_version_ 1824456077811384320
author Sagstetter, Florian
Lukasiewycz, Martin
Steinhorst, Sebastian
Wolf, Marko
Bouard, Alexandre
Peyrin, Thomas
Poschmann, Axel
Chakraborty, Samarjit
Harris, William R.
Jha, Somesh.
author2 School of Physical and Mathematical Sciences
author_facet School of Physical and Mathematical Sciences
Sagstetter, Florian
Lukasiewycz, Martin
Steinhorst, Sebastian
Wolf, Marko
Bouard, Alexandre
Peyrin, Thomas
Poschmann, Axel
Chakraborty, Samarjit
Harris, William R.
Jha, Somesh.
author_sort Sagstetter, Florian
collection NTU
description This paper is an introduction to security challenges for the design of automotive hardware/software architectures. State-of-the-art automotive architectures are highly heterogeneous and complex systems that rely on distributed functions based on electronics and software. As cars are getting more connected with their environment, the vulnerability to attacks is rapidly growing. Examples for such wireless communication are keyless entry systems, WiFi, or Bluetooth. Despite this increasing vulnerability, the design of automotive architectures is still mainly driven by safety and cost issues rather than security. In this paper, we present potential threats and vulnerabilities, and outline upcoming security challenges in automotive architectures. In particular, we discuss the challenges arising in electric vehicles, like the vulnerability to attacks involving tampering with the battery safety. Finally, we discuss future automotive architectures based on Ethernet/IP and how formal verification methods might be used to increase their security.
first_indexed 2025-02-19T03:48:22Z
format Conference Paper
id ntu-10356/99788
institution Nanyang Technological University
language English
last_indexed 2025-02-19T03:48:22Z
publishDate 2013
record_format dspace
spelling ntu-10356/997882023-02-28T19:18:03Z Security challenges in automotive hardware/software architecture design Sagstetter, Florian Lukasiewycz, Martin Steinhorst, Sebastian Wolf, Marko Bouard, Alexandre Peyrin, Thomas Poschmann, Axel Chakraborty, Samarjit Harris, William R. Jha, Somesh. School of Physical and Mathematical Sciences Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013 TUM CREATE, Singapore DRNTU::Engineering::Computer science and engineering::Mathematics of computing::Mathematical software This paper is an introduction to security challenges for the design of automotive hardware/software architectures. State-of-the-art automotive architectures are highly heterogeneous and complex systems that rely on distributed functions based on electronics and software. As cars are getting more connected with their environment, the vulnerability to attacks is rapidly growing. Examples for such wireless communication are keyless entry systems, WiFi, or Bluetooth. Despite this increasing vulnerability, the design of automotive architectures is still mainly driven by safety and cost issues rather than security. In this paper, we present potential threats and vulnerabilities, and outline upcoming security challenges in automotive architectures. In particular, we discuss the challenges arising in electric vehicles, like the vulnerability to attacks involving tampering with the battery safety. Finally, we discuss future automotive architectures based on Ethernet/IP and how formal verification methods might be used to increase their security. Accepted version 2013-11-11T09:03:13Z 2019-12-06T20:11:29Z 2013-11-11T09:03:13Z 2019-12-06T20:11:29Z 2013 2013 Conference Paper Sagstetter, F., Lukasiewycz, M., Steinhorst, S., Wolf, M., Bouard, A., Harris, W. R., et al. (2013). Security Challenges in Automotive Hardware/Software Architecture Design. Design, Automation & Test in Europe Conference & Exhibition (DATE), 2013, pp.458-463. https://hdl.handle.net/10356/99788 http://hdl.handle.net/10220/17589 10.7873/DATE.2013.102 171816 en © 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. The published version is available at: [http://dx.doi.org/10.7873/DATE.2013.102]. application/pdf
spellingShingle DRNTU::Engineering::Computer science and engineering::Mathematics of computing::Mathematical software
Sagstetter, Florian
Lukasiewycz, Martin
Steinhorst, Sebastian
Wolf, Marko
Bouard, Alexandre
Peyrin, Thomas
Poschmann, Axel
Chakraborty, Samarjit
Harris, William R.
Jha, Somesh.
Security challenges in automotive hardware/software architecture design
title Security challenges in automotive hardware/software architecture design
title_full Security challenges in automotive hardware/software architecture design
title_fullStr Security challenges in automotive hardware/software architecture design
title_full_unstemmed Security challenges in automotive hardware/software architecture design
title_short Security challenges in automotive hardware/software architecture design
title_sort security challenges in automotive hardware software architecture design
topic DRNTU::Engineering::Computer science and engineering::Mathematics of computing::Mathematical software
url https://hdl.handle.net/10356/99788
http://hdl.handle.net/10220/17589
work_keys_str_mv AT sagstetterflorian securitychallengesinautomotivehardwaresoftwarearchitecturedesign
AT lukasiewyczmartin securitychallengesinautomotivehardwaresoftwarearchitecturedesign
AT steinhorstsebastian securitychallengesinautomotivehardwaresoftwarearchitecturedesign
AT wolfmarko securitychallengesinautomotivehardwaresoftwarearchitecturedesign
AT bouardalexandre securitychallengesinautomotivehardwaresoftwarearchitecturedesign
AT peyrinthomas securitychallengesinautomotivehardwaresoftwarearchitecturedesign
AT poschmannaxel securitychallengesinautomotivehardwaresoftwarearchitecturedesign
AT chakrabortysamarjit securitychallengesinautomotivehardwaresoftwarearchitecturedesign
AT harriswilliamr securitychallengesinautomotivehardwaresoftwarearchitecturedesign
AT jhasomesh securitychallengesinautomotivehardwaresoftwarearchitecturedesign