Advertisement

Automotive Cybersecurity

  • Dietmar P. F. Möller
  • Roland E. Haas
Chapter
Part of the Computer Communications and Networks book series (CCN)

Abstract

Cybersecurity is the body of technologies, processes, and practices designed to protect computers, data, networks, and programs against intrusion, damage, or unauthorized access by cyberattacks. Therefore, this chapter begins, in Sect. 6.1, with an overview of automotive cybersecurity issues subdivided into ten subsections. It focuses on the scale and complexity of vehicles cyber and physical components’ vulnerability to a variety of security challenges, intrusions, threats, and malicious cyberattacks whose intent is to disrupt communication, steal sensitive information or records, and impair the functioning of the system, identifying the risk level as a function of likelihood and consequences. Hence, a solid theoretical foundation for cybersecurity of vehicle cyber-physical systems is introduced too, based on concepts of artificial intelligence, deep neural networks (DNN), and deep learning (DL), control theory, epidemic theory, game theory, graph theory, and the importance of cybersecurity w.r.t. different kinds of attack scenarios, for example, the spear phishing attack. Section 6.2 introduces information technology security in automotive cyber-physical systems (CPSs) and the measures taken to ensure that automotive cyber-physical systems remain secure while interacting with other digital systems connected to a controller area network (CAN) system bus. It also describes the characteristics of today’s attack taxonomies. As a logical next step, Sect. 6.3 focuses on hacking, automotive attack surfaces, and vulnerabilities and summarizes the anatomy of attack surface intrusion points in vehicles and the associated risks. Therefore, vehicle security depends on a variety of different methods and tools that systematically perform security testing, such as functional security testing, fuzzing, penetration testing, and others. Section 6.4 discusses intrusion detection, described as the detection of any set of actions that attempts to compromise the integrity, confidentiality, or availability of a system, as well as intrusion prevention, actions which attempt to prevent a detected intrusion from succeeding. Different detection methods for different kinds of intrusion types are described, including numerous static, dynamic, and hybrid methods for prevention. Section 6.5 discusses security and functional safety with regard to wireless mobile and sensor networks, platform security, cloud computing, and data security, as well as functional safety. Section 6.6 includes several examples of car hacking. Section 6.7 contains a comprehensive set of questions on automotive cybersecurity topics, and and finally followed by references and suggestions for further reading.

References and Further Reading

  1. (Akella et al. 2010) Akella, R., Tang, H., McMillin, B.: Analysis of Information Flow Security in Cyber-Physical Systems. In: Internat. Journal of Critical Infrastructure Protection, Vol. 3, pp. 157–173, 2010Google Scholar
  2. (Akyildiz et al. 2002) Akyildiz, I. E., Su, W., Sankkarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. In: Comput. News, Vol. 16, No. 4, pp 393–402, 2002Google Scholar
  3. (Avancha 2005) Avancha, S.: A Holistic Approach to Secure Sensor Networks. Ph. D. thesis, 2005Google Scholar
  4. (Barika, et al. 2010) Barika, F., Hadjar, K., El-Kadhi, N.: Artificial neural network for mobile IDS solution, In: Security and Management, pp. 271–277, 2010Google Scholar
  5. (Bitter et al. 2010) Bitter, C., Elizondo, D. A., Watson, T.: Application of Artificial Neural Networks and Related Techniques to Intrusion Detection. In: IEEE World Congress on Computational Intelligence, pp. 949–954, IEEE Press 2010.Google Scholar
  6. (Bittersohl and Thoppill 2015) Bittersohl, C., Thoppil, T. G.: Automotive Cyber Security, P3 Inc., 2015Google Scholar
  7. (Brown 1985) Broqn, J.: An Introduction to the Use of Facet Theory. In: Facet Theory, pp. 17–57, Springer Publ. 1985Google Scholar
  8. (Bruton 2014) Bruton, J. A.: Securing CAN Bus Communication: An Analysis of Cryptographic Approaches. Master Thesis National University of Ireland, Galway, 2014Google Scholar
  9. (Butayán and Hubaux 2007) Butayán, L., Hubaux, J.-P.: Security and Cooperation in Wireless Networks. Cambridge University Press, 2007Google Scholar
  10. (CAMP05 2005) CAMP05 Vehicle Safety Communications Consortium. Vehicle Safety Communications Project Task 3 Final Report 2005. http://www.intellidriveusa.org/documents/vehicle-safety.pdf
  11. (CAMP09 2008) CAMP09 Vehicle Safety Communications Consortium. Vehicle Safety Communications – Applications 1st Annual Report, Sept. 2008. http://www.intellidriveusa.org/documents/09042008-vsc-a-report.pdf
  12. (CAMP10 2008) CAMP10 Vehicle Safety Communications Consortium. Cooperative Intersection Collision Avoidance System Limited to Stop Sign and Traffic Signal Violations Midterm Phase I Report, Oct. 2008. http://www.nhtsa.dot.gov/staticfiles/DOT/NHTSA/NRD/Multimedia/PDFs/Crash%20Avoidance/2008/811048.pdf
  13. (Cárdenas et al. 2008) Cárdenas, A., Amin, S., Sastry, S.: Secure Control - Towards Survivable Cyber-Physical Systems. Proceed. 28th IEEE International Conference on Distributed Computing Systems Workshops, pp. 495–500, 2008Google Scholar
  14. (Cárdenas et al. 2011) Cárdenas, A., Amin, S., Lin, Z., Huang, Y., Huan, C., Sastry, S.: Attacks against Process Control Systems: Risk Assessment, Detection, and Response. Proceed. 6th ACM Symposium on Information, Computer and Communications Security, pp. 355–366, 2011Google Scholar
  15. (Cebula and Young 2010) Cebula, J., Young, L. R.: A Taxonomy of Operational Cyber Security Risks. Software Engineering Institute Technical Note CMU/SEI-2010-TN-028, 2010Google Scholar
  16. (Chakrabarti et al. 2007) Chakrabarti, D., Leskovec, J., Faloutsos, C., Madden, S., Guestin, C., Faloutsos, M.: Information Survival Threshold in Sensor and P2P Networks. In: INFOCOMM, IEEE, pp. 1316–1324, 2007Google Scholar
  17. (Chalkias et al. 2009) Chalkias, K., Baldimtsi, F., Hristu-Varsakelis, D., Etephanides, G.: Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols. In: Communications in Computer and Information Science, Vol. 23, Part 3, pp. 227–238, 2009Google Scholar
  18. (Chatterjee 2012) Chatterjee, P.: The Connected Car as a Platform. In: EDN Nertwork, December 2012Google Scholar
  19. (Checkoway et al. 2011) Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive Experimental Analysis of Automotive Attack Surfaces. http://www.autose.org/pubs/cars-usenixsec2011.pdf
  20. (Cichonsky et al. 2012) Cichonsky, P., Millar, T., Grance, T., Scarfone, K.: Computer Security Incident Handling Guide. National Institute of Standards and Technology (NIST) Special Publication 800-61, Revision 2, 2012Google Scholar
  21. (Cobb 2015) Cobb, S.: Cybersecurity and Manufacturers: What the Costly Chrysler Jeep Hack Reveals. http://www.welivesecurity.com/2015/07/29/cybersecurity-manufacturing-chrysler-jeep-hack/
  22. (Currie 2015) Currie, R.: Developments in Car Hacking. SANS Institute 2015. https://www.sans.org/reading-room/whitepapers/ICS/developments-car-hacking-36607
  23. (Daley and Gani 1999) Daley, D. J., Gani, J.: Epidemic Modelling: An Introduction. Cambridge University Press, 1999Google Scholar
  24. (Das et al. 2012) Das, S. K., Kant, K., Zhang, N.: Handbook on Securing Cyber-Physical Critical Infrastructure. Elsevier Publ. 2012Google Scholar
  25. (De Capitani di Vimercati 2007) De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over Encryption: Management of Access Control Evolution on Outsourced Data. In: Proc. of VLDB, pp. 123–134. 2007Google Scholar
  26. (Denning 1987) Denning, D. E.: An Intrusion Detection Model. In: IEEE Transactions on Software, Vol: SE-13 Issue: 2, pp. 222–232, 1987Google Scholar
  27. (Dilek et al. 2015) Dilek, S., Caku, H., Aydin, M.: Applications of Artificial Intelligence Techniques to Combating Cyber Crimes - A Review. Internat. J. of Artificial Intelligence and Applications (IJAIA), Vol. 6, No. 11, pp. 21–39, 2015Google Scholar
  28. (Dolev 1982) Dolev, D.: The Byzantine Generals Strike Again. Journal of Algorithms, Vol. 3(1), pp.14–30, 1982Google Scholar
  29. (Eisenhauer et al. 2006) Eisenhauer, J., Donelly, P., Ellis, M., O’Brien, M.: Roadmap to Secure Control Systems in the Energy Sector. Energetics Inc. Columbia, MD, 2006Google Scholar
  30. (Eugster et al. 2004) Eugster, P. T., Guerraoui, R., Kermarrec, A., Massouli, L.: From Epidemics to Distributed Computing. In: IEEE Computer, Vol. 37, pp. 60–76, 2004Google Scholar
  31. (Eyal 2007) Eyal, N.: Vehicle Lab – Engine Control Unit, 2007. http://www.vehicle-lab.net/ecu.html
  32. (Falliere et al. 2011) Falliere, N., O’Murchu, L., Chien, E.: W32. Stuxnet Dossier. Symantec Corporation, 2011Google Scholar
  33. (Finke et al. 2015) Finke, T., Schoop, D., Melcher, H.: Extension of Security AUTOSAR architecture to recognition and Countermeasures in terms of relevant attack scenarios Automotive Ethernet. Thesis Work in German; University of Applied Sciences Esslingen, 2015Google Scholar
  34. (Fleury et al. 2009) Fleury, T., Khurana, H., Welch, V.: Towards Taxonomy of Attacks against Energy Control Systems. Proceed. 2nd Annual IFIP Working Group. Internat. Conference on Critical Infrastructure Protection, pp. 71–85, 2009Google Scholar
  35. (Gamage and McMillian 2009) Gamage, T., McMillin, B.: Enforcing Information Flow Properties using Compensating Events. In: Proceed. 42nd Hawaii Internat. Conference on System Sciences, pp. 1–7, 2009Google Scholar
  36. (Goh et al. 2003) Goh, E., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing Remote Untrusted Storage. In: Proc. of NDSS, pp. 131–145, 2003Google Scholar
  37. (Goodfellow et al. 2016) Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, 2016. www.deeplearningbook.org
  38. (Goodwin 2009) Goodwin, A.: Ford Unveils Open-Source Developer Platform. 2009. http://reviews.cnet.com/8301-13746_7-10385619-48.html, Oct. 2009
  39. (Gordon and Ford 2006) Gordon, S., Ford, R.: On the Definition of Classification of Cybercrime. Journal in Computer Virology, Vol.2, No. 1, pp. 13–20, 2006Google Scholar
  40. (Greenberg 2013) Greenberg, A.: Hackers Reveal Nasty New Car Attacks-With me Behind the Wheel. http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-mebehind-the-wheel-video/
  41. (Greenberg 2015) Greenberg, A.: Hackers Remotely Kill a Jeep on the Highway-With me in it. http://www.wired.com/2015/07/hackersremotely-kill-jeep-highway/
  42. (Gupta 2016) Gupta, V.: Control of Cyber-Physical Systems: Recent Results and New Challenges, 2016; http://www.ieeecss-oll.org/sites/default/files/final_gupta_acc.pdf
  43. (Guttmann and Roback 1995) Guttman, B., Roback, E. A.: An Introduction to Computer Security: The NIST Handbook. DIANE Publ. 1995Google Scholar
  44. (Hamlen et al. 2006) Hamlen, K., Morrisett, G., Schneider, F.: Computability classes for enforcement mechanisms. In: ACM Transactions on Programming Languages and Systems, Vol. 28, No. 1, pp. 175–205; 2006Google Scholar
  45. (Hansman and Hunt 2005) Huntsman, S., Hunt, R.: A Taxonomy of Network and Computer Attacks. In: Computers and Security, Vol. 24, Issue 1, pp. 31–43, 2005Google Scholar
  46. (Heady et al. 1990) Heady, R., Luger, G., Maccabe, A., Servilla, M.: The Architecture of a Network Level Intrusion Detection System. Technical Report University of New Mexico, Department of Computer Science, 1990Google Scholar
  47. (Housley and Arbaugh 2003) Housley, R., Arbaugh, W.: Security Problems in 802.11-based Networks. In: Commun. ACM Vol. 46, No. 5, pp. 21–34, 2003Google Scholar
  48. (Hubaux et al. 2004) Hubaux, J. P., Chapkun, S., Luo, J., Raya, M.: The Security and Privacy of Smart Vehicles. In: Journal IEEE Security and Privacy, Vol. 2, No. 3, pp. 49–55, 2004Google Scholar
  49. (Intel Security 2015) Intel Security White Paper Automotive Security Best Practice. 2015; http://www.mcafee.com/de/resources/white-papers/wp-automotive-security.pdf
  50. (IXIA 2014) IXIA Securing the Connected Car, Whitepaper 915–3513-01 Rev. A, 2014: www.ixiacom.com
  51. (Jin et al. 2012) Jin, X., Dan, M., Zhang, N., Yu, W., Fu, X., Das, S. K.: Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models. In: Das, S. K., Kant, K., Zhang, N.: Handbook on Securing Cyber-Physical Critical Infrastructure, pp. 31–53. Morgan Kaufmann Publ., 2012Google Scholar
  52. (Johnson 2010) Johnson, T.: Fault-Tolerant Distributed Cyber-Physical Systems: Two Case Studies. Master Thesis University of Illinois, ECE Dept., 2010Google Scholar
  53. (Johnson 2016) Johnson, M.: Cyber Crime, Security and Data Intelligence. Routledge Publ. 2016Google Scholar
  54. (Kallahalla et al. 2003) Kallahalla, M., Riedel, E., Waminadham, R., Wang, Q., Fu, K.: Scalable Secure File Sharing on Untrusted Storage. In: Proc. of 2nd USENIX Conference of File and Storage Technologies, pp. 29–42. 2003Google Scholar
  55. (Kao and Marculescu 2006) Kao, J. C., Marculescu, R.: Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks. In: 3rd Annual IEEE Communications Society on Sensor and Ad-Hoc Communications and Networks, pp. 707–714, 2006Google Scholar
  56. (Karim and Proha 2014) Karim, E., Proha, V. V.: Cyber-Physical Systems Security. In: Applied Cyber-Physical Systems, pp. 75–84. Eds.: Shuh, S. S., Tanik, U., J., Carbone, J. N., Rogglu, A.; Springer Publ., 2014Google Scholar
  57. (Kephart and White 1993) Kephardt, J. O., White, S. R.: Measuring and Modeling Computer Virus Prevalence. In: Proceed. IEEE Symposium on Security and Privacy, pp. 2–15, 1993Google Scholar
  58. (Kermack and McKendrick 1927) Kermach, W. O., McKendrick, A.: A Contribution to the Mathematical Theory of Epidemics. Proceed. Royal Society of London, Vol. A, No. 1, pp. 700–721, 1927Google Scholar
  59. (Kjaerland 2005) Kjaerland, M.: A Taxonomy and Comparison of Computer Security Incidents for the Commercial and Government Sectors. In: Computers and Security, Vol. 25, pp. 522–538, 2005.Google Scholar
  60. (Koscher et al. 2010) Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental Security Analysis of a Modern Automobile. In: IEEE Symposium on Security and Privacy, pp. 448–461, 2010Google Scholar
  61. (Kumar and Spafford 1994) Kumar, S., Spafford, E. H.: An Application of Pattern Matching in Intrusion Detection. Computer Science Technical Reports, Paper 1116, Purdue University, 1994Google Scholar
  62. (Landrum et al. 2014) Landrum, R., Pace, S., Hu, F.: Cyber-Physical Systems Security–Smart Grid Example, pp. 135–154. In: Cyber-Physical Systems. Ed.: F. Hu. CRC Press 2014Google Scholar
  63. (Lamport 1997) Lamport, L.: Proving the Correctness of Multiprocessing Programs. In: IEEE Transactions on Software Engineering, Vol. 3(2), pp. 125–143, 1997Google Scholar
  64. (Lamport 1998) Lamport, L.: Proving Possibility Properties. In: Theoretical Computer Science, Vol. 206(1–2), pp. 341–352, 1998Google Scholar
  65. (Lamport 2005) Lamport L.: Real-Time Model Checking is Really Simple. Proceed. 13th Advanced Research Working Conference on Correct Hardware Design and Verification Methods, pp. 162–175, 2005Google Scholar
  66. (Landram et al. 2014) Landram, R., Pace, S., Hu, F.: Cyber-Physical System Security - Smart Grid Example. In: F. Hu: Cyber-Physical Systems - Integrated Computing and Engineering Design. pp. 145–154, CRC Press 2014Google Scholar
  67. (Lin and Sangiovanni-Vincentelli 2012) Lin, C. W., Sangiovanni-Vincentelli, A.: Cyber-Security for the Controller Area Network (CAN) Communication Protocol. In: IEEE Proceed. Internat. Conference on Cyber Security, pp. 1–7, 2012Google Scholar
  68. (Lin et al. 2013) Lin, C. W., Zhu, Q., Phung, C., Sangiovanni-Vincentelli, A.: Security-aware mapping for CAN-based real-time distributed automotive systems. In: IEEE Proceed. Internat. Conference on Cyber Security, pp. 115–121, 2013Google Scholar
  69. (Lough 2001) Lough, G. L.: A Taxonomy of Computer Attacks with Applications to Wireless Networks. Dissertation submitted to the Faculty of the Virginia Polytechnic Institute, 2001Google Scholar
  70. (Lunt et al. 1992) Lunt, T. F., Tamaru, A., Gilham, F., Jagannathan, R., Neumann, P. G., Javitz, H. S., Valdes, A., Garvey, T. D.: A Real-Time Intrusion Detection Expert System (IDES) – Final technical Report, SRI Computer Science Laboratory, SRI International, Menlo Park, CA, 1992Google Scholar
  71. (Luo et al. 2010) Luo, Y., Szidarovsky, F., Al-Nashif, Y., Hariti, S.: Game Theory Based Network Security. In. Journal of Information Security, pp. 41–44, 2010Google Scholar
  72. (Miller and Valasek 2014) Miller C., Valasek C.: A Survey of Remote Automotive Attack Surfaces. IOActive 2014. Available from: https://www.ioactive.com/pdfs/IOActive_Remote_Attack_ Surfaces.pdf
  73. (Miller and Valasek 2015) Miller, C., Valasek, C.: Remote Exploitation of an Unaltered Passenger Vehicle. http://illmatics.com/Remote%20Car%20Hacking.pdf
  74. (Mo and Sinopoli 2009) Mo, Y., Sinopoli, B.: Secure Control against Replay Attacks. Proceed. 47th Conf. on Communication, Control, and Computing, pp. 911–918, 2009Google Scholar
  75. (Mollman 2009) Mollmann S.: From Cars to TVs, Apps are Spreading to the Real World. http://edition.cnn.com/2009/TECH/10/08/apps.realworld/
  76. (Möller 2016) Möller, D. P. F.: Guide to Computing Fundamentals in Cyber-Physical Systems – Concepts, Design Methods, and Applications, Springer Publ., 2016Google Scholar
  77. (ni-com 2009) ECU Designing and Testing Using National Instruments Products. White Paper, National Instruments 2009Google Scholar
  78. (Nurse et al. 2014) Nurse, J. R. C., Buckley, O., Legg, P. A., Goldsmith, M., Cresse, S., Wright, G. R., Whitey, M.: Understanding Insider Threat: A Framework for Characterizing Attacks. IEEE Security and Privacy Workshops, pp. 214–222, IEEE 2014Google Scholar
  79. (Patel et al. 2010) Patel, A., Qassim, Q., Shukor, Z., Nogueira, J., Junior, J., Wills, C.: Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System, In: Proceed. South African Information Security Multi-Conference, pp. 223–234, 2010Google Scholar
  80. (Pathan et al. 2006) Pathan, Al-S. K., Lee, H.-W., Hong, C. S.: Security in Wireless Sensor Networks: Issues and Challenges. In: Proceed. Internat. Confer. Advanced Technology, pp. 1043–1048, 2006Google Scholar
  81. (Payteck 2003) How PayTeck Works. www.payteck.cc/aboutpayteck.html
  82. (Pfleeger et al. 2015) Pfleeger, C. P., Pfleeger, S. L., Margulies, J.: Security in Computing. Prentice Hall 2015Google Scholar
  83. (Pelechrinis et al. 2011) Pelechrinis, K., Iliofotou, M., Krishnanurthy, S. V.: Denial of Service Attacks in Wireless Networks: The Case of Jammers. In: IEEE Communications Surveys and Tutorial, Vol. 13, No. 2, pp. 245–257, 2011Google Scholar
  84. (Poulsen 2010) Poulsen, K.: Hacker disables more than 100 cars remotely. Wired online. March 17th 2010. Available from: www.wired.com/threatlevel/2010/03/hacker-bricks-cars
  85. (Salahuddin and Al-Fuqaha 2013) Salahuddin M. A. B., Al-Fuqaha, A.: AGORA: A Versatile Framework for the Development of Intelligent Transportation System Applications. In: Wireless Sensor and Mobile Ad-Hoc Networks: Vehicular and Space Applications, pp. 163–184, Eds.: B. Benhaddou, A. Al-Fuqaha, Springer Publ. 2013Google Scholar
  86. (Saleh and Khatib 2005). Saleh, M., Khatib, I. A.: Throughput Analysis of WEP Security in Ad Hoc Sensor Networks. In: Proc. 2nd International Conference on Innovations in Information Technology, 2005Google Scholar
  87. (Saltzman and Sharabani 2009) Saltzman, R., Sharabani, A.: Active Man in the Middle Attacks – A Security Advisory. Whitepaper IBM Rational Application Security Group. IBM Corporation 2009Google Scholar
  88. (Satyanarayanan et al. 2009) Satyanarayan, M., Bahl, P., Caceres, R., Davies, N.: The Case for VM-based Cloudlets in Mobile Computing. IEEE Pervasive Compt. Vol. 8 No. 4, 14–23, 2009Google Scholar
  89. (Sastry et al. 1994) Sastry, P. S., Phansalpar, V. V., Thathachar, M. A. L: Decentralized Learning of Nash Equilibria in Multi-Person Stochastic Games with Incomplete Information. In: IEEE Transct. On Systems, Man, and Cybernetics, Vol. 24, No. 5, pp. 769–777, 1994Google Scholar
  90. (Scarfone and Mell 2007) Scarfone K., Mell, P.: Guide to Intrusion Detection and Prevention Systems. National Institute of Standards and Technology (NIST) Special Publication 800–94, 2007Google Scholar
  91. (Shieh and Gligor 1991) Shiva, S. W., Gligor, V. D.: A Pattern Oriented Intrusion Model and its Applications. In: Proceed. IEEE Computer Society Symposium on Research in Security and Privacy, pp. 327–342, 1991Google Scholar
  92. (Shimeall and Spring 2014) Shimeall, T., Spring, J.: Introduction to Information Security: A Strategic-Based Approach. Elsevier Publ. 2014Google Scholar
  93. (Shiva et al. 2010) Shiva, S., Roy, S., Dasgupta, D.: Game Theory for Cyber Security. In: CSIIRW Conf. Proceed., ACM Press 2010Google Scholar
  94. (Simmons et al. 2014) Simmons, C., Ellis, C., Shiva, S., Dasgupta, D., Wu, Q.: AVOIDIT : A cyberattack Taxonomy. In: 9th Annual Symposium on Information Assurance (ASIA), pp. 14-1-14-, 2014Google Scholar
  95. (Smaha 1988) Smaha S. E.: Haytack: An Intrusion Detection System. In: Proceed. 4th Aerospace Computer Security Applications Conference, pp. 37–44, 1988Google Scholar
  96. (Tang and McMillin 2008) Tang, H., McMillian, B.: Security Property Violation in CPS through Timing. In: Proceed. 28th Internat. Conference on Distributed Computing Systems Workshops, pp. 519–524, 2008Google Scholar
  97. (Valasek and Miller 2014) Valasek, C., Miller, C.: A Survey of Remote Automotive Attack Surfaces. Technical White Paper, IOActive Inc., 2014Google Scholar
  98. (VTTI 2007) VTTI - Virginia Tech Transportation Institute. Intersection Collision Avoidance - Violation Task 5 Final Report, 2007. http://www.intellidriveusa.org/documents/final-report-04-2007.pdf
  99. (Wang et al. 2010) Wang, E. K., Ye, Y., Xu, X., Yiu, S. M., Hui, L. C. K., Chow, K. P.: Security Issues and Challenges for Cyber Physical Systems. IEEE/ACM Conference on Green Computing and Communications and IEEE/ACM Intern. Conference on Cyber, Physical and Social Computing, pp.733–738, IEEE Publ., 2010Google Scholar
  100. (Xiao 2006) Xiao, Y.: Security in Sensor Networks. Auerbach Publ., 2006Google Scholar
  101. (Xiao et al. 2008) Xiao, K., Ren, S., Kwiat, K.: Retrofitting Cyber-Physical Systems for Survivability through External Coordination. In: Proceed. 41st Internat. Conference on Systems Science, pp. 454–466, 2008Google Scholar
  102. (Yuzhe et al. 2013) Yuzhe, L., Ling, S., Peng, D., Quecedo, E.: Jamming Attack on Cyber-Physical Systems : A Game Theoretic Approach. In: IEEE 3rd Annual Conference on Cyber Technology in Automation, pp. 252–257, 2013Google Scholar
  103. (Zeltser 2015) Zeltser, L.: Antivirus Software uses Several Different Virus Detection Techniques. TechTarget Network, 2015Google Scholar
  104. (Zimmer et al. 2010) Zimmer, C., Bhat, B., Mueller, F., Mohan, S.: Time-Based Intrusion Detection in Cyber-Physical Systems. In: Proceed. 1st ACM/IEEE International Conference on Cyber-Physical Systems, pp. 109–118, 2010Google Scholar

Copyright information

© Springer International Publishing AG, part of Springer Nature 2019

Authors and Affiliations

  • Dietmar P. F. Möller
    • 1
  • Roland E. Haas
    • 2
  1. 1.Clausthal University of TechnologyClausthal-ZellerfeldGermany
  2. 2.QSO TechnologiesBangaloreIndia

Personalised recommendations