TY - GEN
T1 - Security challenges in automotive hardware/software architecture design
AU - Sagstetter, Florian
AU - Lukasiewycz, Martin
AU - Steinhors, Sebastian
AU - Wolf, Marko
AU - Bouard, Alexandre
AU - Harris, William R.
AU - Jha, Somesh
AU - Peyrin, Thomas
AU - Poschmann, Axel
AU - Chakraborty, Samarjit
PY - 2013
Y1 - 2013
N2 - This paper is an introduction to security challenges for the design of automotive hardware/software architectures. State-of-the-art automotive architectures are highly heterogeneous and complex systems that rely on distributed functions based on electronics and software. As cars are getting more connected with their environment, the vulnerability to attacks is rapidly growing. Examples for such wireless communication are keyless entry systems, WiFi, or Bluetooth. Despite this increasing vulnerability, the design of automotive architectures is still mainly driven by safety and cost issues rather than security. In this paper, we present potential threats and vulnerabilities, and outline upcoming security challenges in automotive architectures. In particular, we discuss the challenges arising in electric vehicles, like the vulnerability to attacks involving tampering with the battery safety. Finally, we discuss future automotive architectures based on Ethernet/IP and how formal verification methods might be used to increase their security.
AB - This paper is an introduction to security challenges for the design of automotive hardware/software architectures. State-of-the-art automotive architectures are highly heterogeneous and complex systems that rely on distributed functions based on electronics and software. As cars are getting more connected with their environment, the vulnerability to attacks is rapidly growing. Examples for such wireless communication are keyless entry systems, WiFi, or Bluetooth. Despite this increasing vulnerability, the design of automotive architectures is still mainly driven by safety and cost issues rather than security. In this paper, we present potential threats and vulnerabilities, and outline upcoming security challenges in automotive architectures. In particular, we discuss the challenges arising in electric vehicles, like the vulnerability to attacks involving tampering with the battery safety. Finally, we discuss future automotive architectures based on Ethernet/IP and how formal verification methods might be used to increase their security.
UR - http://www.scopus.com/inward/record.url?scp=84885584568&partnerID=8YFLogxK
U2 - 10.7873/date.2013.102
DO - 10.7873/date.2013.102
M3 - Conference contribution
AN - SCOPUS:84885584568
SN - 9783981537000
T3 - Proceedings -Design, Automation and Test in Europe, DATE
SP - 458
EP - 463
BT - Proceedings - Design, Automation and Test in Europe, DATE 2013
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 16th Design, Automation and Test in Europe Conference and Exhibition, DATE 2013
Y2 - 18 March 2013 through 22 March 2013
ER -