Skip to main content

Automotive Cybersecurity

  • Chapter
  • First Online:
Guide to Automotive Connectivity and Cybersecurity

Part of the book series: Computer Communications and Networks ((CCN))

Abstract

Cybersecurity is the body of technologies, processes, and practices designed to protect computers, data, networks, and programs against intrusion, damage, or unauthorized access by cyberattacks. Therefore, this chapter begins, in Sect. 6.1, with an overview of automotive cybersecurity issues subdivided into ten subsections. It focuses on the scale and complexity of vehicles cyber and physical components’ vulnerability to a variety of security challenges, intrusions, threats, and malicious cyberattacks whose intent is to disrupt communication, steal sensitive information or records, and impair the functioning of the system, identifying the risk level as a function of likelihood and consequences. Hence, a solid theoretical foundation for cybersecurity of vehicle cyber-physical systems is introduced too, based on concepts of artificial intelligence, deep neural networks (DNN), and deep learning (DL), control theory, epidemic theory, game theory, graph theory, and the importance of cybersecurity w.r.t. different kinds of attack scenarios, for example, the spear phishing attack. Section 6.2 introduces information technology security in automotive cyber-physical systems (CPSs) and the measures taken to ensure that automotive cyber-physical systems remain secure while interacting with other digital systems connected to a controller area network (CAN) system bus. It also describes the characteristics of today’s attack taxonomies. As a logical next step, Sect. 6.3 focuses on hacking, automotive attack surfaces, and vulnerabilities and summarizes the anatomy of attack surface intrusion points in vehicles and the associated risks. Therefore, vehicle security depends on a variety of different methods and tools that systematically perform security testing, such as functional security testing, fuzzing, penetration testing, and others. Section 6.4 discusses intrusion detection, described as the detection of any set of actions that attempts to compromise the integrity, confidentiality, or availability of a system, as well as intrusion prevention, actions which attempt to prevent a detected intrusion from succeeding. Different detection methods for different kinds of intrusion types are described, including numerous static, dynamic, and hybrid methods for prevention. Section 6.5 discusses security and functional safety with regard to wireless mobile and sensor networks, platform security, cloud computing, and data security, as well as functional safety. Section 6.6 includes several examples of car hacking. Section 6.7 contains a comprehensive set of questions on automotive cybersecurity topics, and and finally followed by references and suggestions for further reading.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References and Further Reading

  • (Akella et al. 2010) Akella, R., Tang, H., McMillin, B.: Analysis of Information Flow Security in Cyber-Physical Systems. In: Internat. Journal of Critical Infrastructure Protection, Vol. 3, pp. 157–173, 2010

    Google Scholar 

  • (Akyildiz et al. 2002) Akyildiz, I. E., Su, W., Sankkarasubramaniam, Y., Cayirci, E.: Wireless Sensor Networks: A Survey. In: Comput. News, Vol. 16, No. 4, pp 393–402, 2002

    Google Scholar 

  • (Avancha 2005) Avancha, S.: A Holistic Approach to Secure Sensor Networks. Ph. D. thesis, 2005

    Google Scholar 

  • (Barika, et al. 2010) Barika, F., Hadjar, K., El-Kadhi, N.: Artificial neural network for mobile IDS solution, In: Security and Management, pp. 271–277, 2010

    Google Scholar 

  • (Bitter et al. 2010) Bitter, C., Elizondo, D. A., Watson, T.: Application of Artificial Neural Networks and Related Techniques to Intrusion Detection. In: IEEE World Congress on Computational Intelligence, pp. 949–954, IEEE Press 2010.

    Google Scholar 

  • (Bittersohl and Thoppill 2015) Bittersohl, C., Thoppil, T. G.: Automotive Cyber Security, P3 Inc., 2015

    Google Scholar 

  • (Brown 1985) Broqn, J.: An Introduction to the Use of Facet Theory. In: Facet Theory, pp. 17–57, Springer Publ. 1985

    Google Scholar 

  • (Bruton 2014) Bruton, J. A.: Securing CAN Bus Communication: An Analysis of Cryptographic Approaches. Master Thesis National University of Ireland, Galway, 2014

    Google Scholar 

  • (Butayán and Hubaux 2007) Butayán, L., Hubaux, J.-P.: Security and Cooperation in Wireless Networks. Cambridge University Press, 2007

    Google Scholar 

  • (CAMP05 2005) CAMP05 Vehicle Safety Communications Consortium. Vehicle Safety Communications Project Task 3 Final Report 2005. http://www.intellidriveusa.org/documents/vehicle-safety.pdf

  • (CAMP09 2008) CAMP09 Vehicle Safety Communications Consortium. Vehicle Safety Communications – Applications 1st Annual Report, Sept. 2008. http://www.intellidriveusa.org/documents/09042008-vsc-a-report.pdf

  • (CAMP10 2008) CAMP10 Vehicle Safety Communications Consortium. Cooperative Intersection Collision Avoidance System Limited to Stop Sign and Traffic Signal Violations Midterm Phase I Report, Oct. 2008. http://www.nhtsa.dot.gov/staticfiles/DOT/NHTSA/NRD/Multimedia/PDFs/Crash%20Avoidance/2008/811048.pdf

  • (Cárdenas et al. 2008) Cárdenas, A., Amin, S., Sastry, S.: Secure Control - Towards Survivable Cyber-Physical Systems. Proceed. 28th IEEE International Conference on Distributed Computing Systems Workshops, pp. 495–500, 2008

    Google Scholar 

  • (Cárdenas et al. 2011) Cárdenas, A., Amin, S., Lin, Z., Huang, Y., Huan, C., Sastry, S.: Attacks against Process Control Systems: Risk Assessment, Detection, and Response. Proceed. 6th ACM Symposium on Information, Computer and Communications Security, pp. 355–366, 2011

    Google Scholar 

  • (Cebula and Young 2010) Cebula, J., Young, L. R.: A Taxonomy of Operational Cyber Security Risks. Software Engineering Institute Technical Note CMU/SEI-2010-TN-028, 2010

    Google Scholar 

  • (Chakrabarti et al. 2007) Chakrabarti, D., Leskovec, J., Faloutsos, C., Madden, S., Guestin, C., Faloutsos, M.: Information Survival Threshold in Sensor and P2P Networks. In: INFOCOMM, IEEE, pp. 1316–1324, 2007

    Google Scholar 

  • (Chalkias et al. 2009) Chalkias, K., Baldimtsi, F., Hristu-Varsakelis, D., Etephanides, G.: Two Types of Key-Compromise Impersonation Attacks against One-Pass Key Establishment Protocols. In: Communications in Computer and Information Science, Vol. 23, Part 3, pp. 227–238, 2009

    Google Scholar 

  • (Chatterjee 2012) Chatterjee, P.: The Connected Car as a Platform. In: EDN Nertwork, December 2012

    Google Scholar 

  • (Checkoway et al. 2011) Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., Kohno, T.: Comprehensive Experimental Analysis of Automotive Attack Surfaces. http://www.autose.org/pubs/cars-usenixsec2011.pdf

  • (Cichonsky et al. 2012) Cichonsky, P., Millar, T., Grance, T., Scarfone, K.: Computer Security Incident Handling Guide. National Institute of Standards and Technology (NIST) Special Publication 800-61, Revision 2, 2012

    Google Scholar 

  • (Cobb 2015) Cobb, S.: Cybersecurity and Manufacturers: What the Costly Chrysler Jeep Hack Reveals. http://www.welivesecurity.com/2015/07/29/cybersecurity-manufacturing-chrysler-jeep-hack/

  • (Currie 2015) Currie, R.: Developments in Car Hacking. SANS Institute 2015. https://www.sans.org/reading-room/whitepapers/ICS/developments-car-hacking-36607

  • (Daley and Gani 1999) Daley, D. J., Gani, J.: Epidemic Modelling: An Introduction. Cambridge University Press, 1999

    Google Scholar 

  • (Das et al. 2012) Das, S. K., Kant, K., Zhang, N.: Handbook on Securing Cyber-Physical Critical Infrastructure. Elsevier Publ. 2012

    Google Scholar 

  • (De Capitani di Vimercati 2007) De Capitani di Vimercati, S., Foresti, S., Jajodia, S., Paraboschi, S., Samarati, P.: Over Encryption: Management of Access Control Evolution on Outsourced Data. In: Proc. of VLDB, pp. 123–134. 2007

    Google Scholar 

  • (Denning 1987) Denning, D. E.: An Intrusion Detection Model. In: IEEE Transactions on Software, Vol: SE-13 Issue: 2, pp. 222–232, 1987

    Google Scholar 

  • (Dilek et al. 2015) Dilek, S., Caku, H., Aydin, M.: Applications of Artificial Intelligence Techniques to Combating Cyber Crimes - A Review. Internat. J. of Artificial Intelligence and Applications (IJAIA), Vol. 6, No. 11, pp. 21–39, 2015

    Google Scholar 

  • (Dolev 1982) Dolev, D.: The Byzantine Generals Strike Again. Journal of Algorithms, Vol. 3(1), pp.14–30, 1982

    Google Scholar 

  • (Eisenhauer et al. 2006) Eisenhauer, J., Donelly, P., Ellis, M., O’Brien, M.: Roadmap to Secure Control Systems in the Energy Sector. Energetics Inc. Columbia, MD, 2006

    Google Scholar 

  • (Eugster et al. 2004) Eugster, P. T., Guerraoui, R., Kermarrec, A., Massouli, L.: From Epidemics to Distributed Computing. In: IEEE Computer, Vol. 37, pp. 60–76, 2004

    Google Scholar 

  • (Eyal 2007) Eyal, N.: Vehicle Lab – Engine Control Unit, 2007. http://www.vehicle-lab.net/ecu.html

  • (Falliere et al. 2011) Falliere, N., O’Murchu, L., Chien, E.: W32. Stuxnet Dossier. Symantec Corporation, 2011

    Google Scholar 

  • (Finke et al. 2015) Finke, T., Schoop, D., Melcher, H.: Extension of Security AUTOSAR architecture to recognition and Countermeasures in terms of relevant attack scenarios Automotive Ethernet. Thesis Work in German; University of Applied Sciences Esslingen, 2015

    Google Scholar 

  • (Fleury et al. 2009) Fleury, T., Khurana, H., Welch, V.: Towards Taxonomy of Attacks against Energy Control Systems. Proceed. 2nd Annual IFIP Working Group. Internat. Conference on Critical Infrastructure Protection, pp. 71–85, 2009

    Google Scholar 

  • (Gamage and McMillian 2009) Gamage, T., McMillin, B.: Enforcing Information Flow Properties using Compensating Events. In: Proceed. 42nd Hawaii Internat. Conference on System Sciences, pp. 1–7, 2009

    Google Scholar 

  • (Goh et al. 2003) Goh, E., Shacham, H., Modadugu, N., Boneh, D.: SiRiUS: Securing Remote Untrusted Storage. In: Proc. of NDSS, pp. 131–145, 2003

    Google Scholar 

  • (Goodfellow et al. 2016) Goodfellow, I., Bengio, Y., Courville, A.: Deep Learning. MIT Press, 2016. www.deeplearningbook.org

  • (Goodwin 2009) Goodwin, A.: Ford Unveils Open-Source Developer Platform. 2009. http://reviews.cnet.com/8301-13746_7-10385619-48.html, Oct. 2009

  • (Gordon and Ford 2006) Gordon, S., Ford, R.: On the Definition of Classification of Cybercrime. Journal in Computer Virology, Vol.2, No. 1, pp. 13–20, 2006

    Google Scholar 

  • (Greenberg 2013) Greenberg, A.: Hackers Reveal Nasty New Car Attacks-With me Behind the Wheel. http://www.forbes.com/sites/andygreenberg/2013/07/24/hackers-reveal-nasty-new-car-attacks-with-mebehind-the-wheel-video/

  • (Greenberg 2015) Greenberg, A.: Hackers Remotely Kill a Jeep on the Highway-With me in it. http://www.wired.com/2015/07/hackersremotely-kill-jeep-highway/

  • (Gupta 2016) Gupta, V.: Control of Cyber-Physical Systems: Recent Results and New Challenges, 2016; http://www.ieeecss-oll.org/sites/default/files/final_gupta_acc.pdf

  • (Guttmann and Roback 1995) Guttman, B., Roback, E. A.: An Introduction to Computer Security: The NIST Handbook. DIANE Publ. 1995

    Google Scholar 

  • (Hamlen et al. 2006) Hamlen, K., Morrisett, G., Schneider, F.: Computability classes for enforcement mechanisms. In: ACM Transactions on Programming Languages and Systems, Vol. 28, No. 1, pp. 175–205; 2006

    Google Scholar 

  • (Hansman and Hunt 2005) Huntsman, S., Hunt, R.: A Taxonomy of Network and Computer Attacks. In: Computers and Security, Vol. 24, Issue 1, pp. 31–43, 2005

    Google Scholar 

  • (Heady et al. 1990) Heady, R., Luger, G., Maccabe, A., Servilla, M.: The Architecture of a Network Level Intrusion Detection System. Technical Report University of New Mexico, Department of Computer Science, 1990

    Google Scholar 

  • (Housley and Arbaugh 2003) Housley, R., Arbaugh, W.: Security Problems in 802.11-based Networks. In: Commun. ACM Vol. 46, No. 5, pp. 21–34, 2003

    Google Scholar 

  • (Hubaux et al. 2004) Hubaux, J. P., Chapkun, S., Luo, J., Raya, M.: The Security and Privacy of Smart Vehicles. In: Journal IEEE Security and Privacy, Vol. 2, No. 3, pp. 49–55, 2004

    Google Scholar 

  • (Intel Security 2015) Intel Security White Paper Automotive Security Best Practice. 2015; http://www.mcafee.com/de/resources/white-papers/wp-automotive-security.pdf

  • (IXIA 2014) IXIA Securing the Connected Car, Whitepaper 915–3513-01 Rev. A, 2014: www.ixiacom.com

  • (Jin et al. 2012) Jin, X., Dan, M., Zhang, N., Yu, W., Fu, X., Das, S. K.: Game Theory for Infrastructure Security: The Power of Intent-Based Adversary Models. In: Das, S. K., Kant, K., Zhang, N.: Handbook on Securing Cyber-Physical Critical Infrastructure, pp. 31–53. Morgan Kaufmann Publ., 2012

    Google Scholar 

  • (Johnson 2010) Johnson, T.: Fault-Tolerant Distributed Cyber-Physical Systems: Two Case Studies. Master Thesis University of Illinois, ECE Dept., 2010

    Google Scholar 

  • (Johnson 2016) Johnson, M.: Cyber Crime, Security and Data Intelligence. Routledge Publ. 2016

    Google Scholar 

  • (Kallahalla et al. 2003) Kallahalla, M., Riedel, E., Waminadham, R., Wang, Q., Fu, K.: Scalable Secure File Sharing on Untrusted Storage. In: Proc. of 2nd USENIX Conference of File and Storage Technologies, pp. 29–42. 2003

    Google Scholar 

  • (Kao and Marculescu 2006) Kao, J. C., Marculescu, R.: Eavesdropping Minimization via Transmission Power Control in Ad-Hoc Wireless Networks. In: 3rd Annual IEEE Communications Society on Sensor and Ad-Hoc Communications and Networks, pp. 707–714, 2006

    Google Scholar 

  • (Karim and Proha 2014) Karim, E., Proha, V. V.: Cyber-Physical Systems Security. In: Applied Cyber-Physical Systems, pp. 75–84. Eds.: Shuh, S. S., Tanik, U., J., Carbone, J. N., Rogglu, A.; Springer Publ., 2014

    Google Scholar 

  • (Kephart and White 1993) Kephardt, J. O., White, S. R.: Measuring and Modeling Computer Virus Prevalence. In: Proceed. IEEE Symposium on Security and Privacy, pp. 2–15, 1993

    Google Scholar 

  • (Kermack and McKendrick 1927) Kermach, W. O., McKendrick, A.: A Contribution to the Mathematical Theory of Epidemics. Proceed. Royal Society of London, Vol. A, No. 1, pp. 700–721, 1927

    Google Scholar 

  • (Kjaerland 2005) Kjaerland, M.: A Taxonomy and Comparison of Computer Security Incidents for the Commercial and Government Sectors. In: Computers and Security, Vol. 25, pp. 522–538, 2005.

    Google Scholar 

  • (Koscher et al. 2010) Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S.: Experimental Security Analysis of a Modern Automobile. In: IEEE Symposium on Security and Privacy, pp. 448–461, 2010

    Google Scholar 

  • (Kumar and Spafford 1994) Kumar, S., Spafford, E. H.: An Application of Pattern Matching in Intrusion Detection. Computer Science Technical Reports, Paper 1116, Purdue University, 1994

    Google Scholar 

  • (Landrum et al. 2014) Landrum, R., Pace, S., Hu, F.: Cyber-Physical Systems Security–Smart Grid Example, pp. 135–154. In: Cyber-Physical Systems. Ed.: F. Hu. CRC Press 2014

    Google Scholar 

  • (Lamport 1997) Lamport, L.: Proving the Correctness of Multiprocessing Programs. In: IEEE Transactions on Software Engineering, Vol. 3(2), pp. 125–143, 1997

    Google Scholar 

  • (Lamport 1998) Lamport, L.: Proving Possibility Properties. In: Theoretical Computer Science, Vol. 206(1–2), pp. 341–352, 1998

    Google Scholar 

  • (Lamport 2005) Lamport L.: Real-Time Model Checking is Really Simple. Proceed. 13th Advanced Research Working Conference on Correct Hardware Design and Verification Methods, pp. 162–175, 2005

    Google Scholar 

  • (Landram et al. 2014) Landram, R., Pace, S., Hu, F.: Cyber-Physical System Security - Smart Grid Example. In: F. Hu: Cyber-Physical Systems - Integrated Computing and Engineering Design. pp. 145–154, CRC Press 2014

    Google Scholar 

  • (Lin and Sangiovanni-Vincentelli 2012) Lin, C. W., Sangiovanni-Vincentelli, A.: Cyber-Security for the Controller Area Network (CAN) Communication Protocol. In: IEEE Proceed. Internat. Conference on Cyber Security, pp. 1–7, 2012

    Google Scholar 

  • (Lin et al. 2013) Lin, C. W., Zhu, Q., Phung, C., Sangiovanni-Vincentelli, A.: Security-aware mapping for CAN-based real-time distributed automotive systems. In: IEEE Proceed. Internat. Conference on Cyber Security, pp. 115–121, 2013

    Google Scholar 

  • (Lough 2001) Lough, G. L.: A Taxonomy of Computer Attacks with Applications to Wireless Networks. Dissertation submitted to the Faculty of the Virginia Polytechnic Institute, 2001

    Google Scholar 

  • (Lunt et al. 1992) Lunt, T. F., Tamaru, A., Gilham, F., Jagannathan, R., Neumann, P. G., Javitz, H. S., Valdes, A., Garvey, T. D.: A Real-Time Intrusion Detection Expert System (IDES) – Final technical Report, SRI Computer Science Laboratory, SRI International, Menlo Park, CA, 1992

    Google Scholar 

  • (Luo et al. 2010) Luo, Y., Szidarovsky, F., Al-Nashif, Y., Hariti, S.: Game Theory Based Network Security. In. Journal of Information Security, pp. 41–44, 2010

    Google Scholar 

  • (Miller and Valasek 2014) Miller C., Valasek C.: A Survey of Remote Automotive Attack Surfaces. IOActive 2014. Available from: https://www.ioactive.com/pdfs/IOActive_Remote_Attack_ Surfaces.pdf

  • (Miller and Valasek 2015) Miller, C., Valasek, C.: Remote Exploitation of an Unaltered Passenger Vehicle. http://illmatics.com/Remote%20Car%20Hacking.pdf

  • (Mo and Sinopoli 2009) Mo, Y., Sinopoli, B.: Secure Control against Replay Attacks. Proceed. 47th Conf. on Communication, Control, and Computing, pp. 911–918, 2009

    Google Scholar 

  • (Mollman 2009) Mollmann S.: From Cars to TVs, Apps are Spreading to the Real World. http://edition.cnn.com/2009/TECH/10/08/apps.realworld/

  • (Möller 2016) Möller, D. P. F.: Guide to Computing Fundamentals in Cyber-Physical Systems – Concepts, Design Methods, and Applications, Springer Publ., 2016

    Google Scholar 

  • (ni-com 2009) ECU Designing and Testing Using National Instruments Products. White Paper, National Instruments 2009

    Google Scholar 

  • (Nurse et al. 2014) Nurse, J. R. C., Buckley, O., Legg, P. A., Goldsmith, M., Cresse, S., Wright, G. R., Whitey, M.: Understanding Insider Threat: A Framework for Characterizing Attacks. IEEE Security and Privacy Workshops, pp. 214–222, IEEE 2014

    Google Scholar 

  • (Patel et al. 2010) Patel, A., Qassim, Q., Shukor, Z., Nogueira, J., Junior, J., Wills, C.: Autonomic Agent-Based Self-Managed Intrusion Detection and Prevention System, In: Proceed. South African Information Security Multi-Conference, pp. 223–234, 2010

    Google Scholar 

  • (Pathan et al. 2006) Pathan, Al-S. K., Lee, H.-W., Hong, C. S.: Security in Wireless Sensor Networks: Issues and Challenges. In: Proceed. Internat. Confer. Advanced Technology, pp. 1043–1048, 2006

    Google Scholar 

  • (Payteck 2003) How PayTeck Works. www.payteck.cc/aboutpayteck.html

  • (Pfleeger et al. 2015) Pfleeger, C. P., Pfleeger, S. L., Margulies, J.: Security in Computing. Prentice Hall 2015

    Google Scholar 

  • (Pelechrinis et al. 2011) Pelechrinis, K., Iliofotou, M., Krishnanurthy, S. V.: Denial of Service Attacks in Wireless Networks: The Case of Jammers. In: IEEE Communications Surveys and Tutorial, Vol. 13, No. 2, pp. 245–257, 2011

    Google Scholar 

  • (Poulsen 2010) Poulsen, K.: Hacker disables more than 100 cars remotely. Wired online. March 17th 2010. Available from: www.wired.com/threatlevel/2010/03/hacker-bricks-cars

  • (PR Newswire 2015) https://www.prnewswire.com/news-releases/nearly-80-percent-of-consumers-think-vehicle-hacking-will-be-frequent-problem-in-near-future-according-to-new-kelley-blue-book-survey-300121740.html

  • (Salahuddin and Al-Fuqaha 2013) Salahuddin M. A. B., Al-Fuqaha, A.: AGORA: A Versatile Framework for the Development of Intelligent Transportation System Applications. In: Wireless Sensor and Mobile Ad-Hoc Networks: Vehicular and Space Applications, pp. 163–184, Eds.: B. Benhaddou, A. Al-Fuqaha, Springer Publ. 2013

    Google Scholar 

  • (Saleh and Khatib 2005). Saleh, M., Khatib, I. A.: Throughput Analysis of WEP Security in Ad Hoc Sensor Networks. In: Proc. 2nd International Conference on Innovations in Information Technology, 2005

    Google Scholar 

  • (Saltzman and Sharabani 2009) Saltzman, R., Sharabani, A.: Active Man in the Middle Attacks – A Security Advisory. Whitepaper IBM Rational Application Security Group. IBM Corporation 2009

    Google Scholar 

  • (Satyanarayanan et al. 2009) Satyanarayan, M., Bahl, P., Caceres, R., Davies, N.: The Case for VM-based Cloudlets in Mobile Computing. IEEE Pervasive Compt. Vol. 8 No. 4, 14–23, 2009

    Google Scholar 

  • (Sastry et al. 1994) Sastry, P. S., Phansalpar, V. V., Thathachar, M. A. L: Decentralized Learning of Nash Equilibria in Multi-Person Stochastic Games with Incomplete Information. In: IEEE Transct. On Systems, Man, and Cybernetics, Vol. 24, No. 5, pp. 769–777, 1994

    Google Scholar 

  • (Scarfone and Mell 2007) Scarfone K., Mell, P.: Guide to Intrusion Detection and Prevention Systems. National Institute of Standards and Technology (NIST) Special Publication 800–94, 2007

    Google Scholar 

  • (Shieh and Gligor 1991) Shiva, S. W., Gligor, V. D.: A Pattern Oriented Intrusion Model and its Applications. In: Proceed. IEEE Computer Society Symposium on Research in Security and Privacy, pp. 327–342, 1991

    Google Scholar 

  • (Shimeall and Spring 2014) Shimeall, T., Spring, J.: Introduction to Information Security: A Strategic-Based Approach. Elsevier Publ. 2014

    Google Scholar 

  • (Shiva et al. 2010) Shiva, S., Roy, S., Dasgupta, D.: Game Theory for Cyber Security. In: CSIIRW Conf. Proceed., ACM Press 2010

    Google Scholar 

  • (Simmons et al. 2014) Simmons, C., Ellis, C., Shiva, S., Dasgupta, D., Wu, Q.: AVOIDIT : A cyberattack Taxonomy. In: 9th Annual Symposium on Information Assurance (ASIA), pp. 14-1-14-, 2014

    Google Scholar 

  • (Smaha 1988) Smaha S. E.: Haytack: An Intrusion Detection System. In: Proceed. 4th Aerospace Computer Security Applications Conference, pp. 37–44, 1988

    Google Scholar 

  • (Tang and McMillin 2008) Tang, H., McMillian, B.: Security Property Violation in CPS through Timing. In: Proceed. 28th Internat. Conference on Distributed Computing Systems Workshops, pp. 519–524, 2008

    Google Scholar 

  • (Valasek and Miller 2014) Valasek, C., Miller, C.: A Survey of Remote Automotive Attack Surfaces. Technical White Paper, IOActive Inc., 2014

    Google Scholar 

  • (VTTI 2007) VTTI - Virginia Tech Transportation Institute. Intersection Collision Avoidance - Violation Task 5 Final Report, 2007. http://www.intellidriveusa.org/documents/final-report-04-2007.pdf

  • (Wang et al. 2010) Wang, E. K., Ye, Y., Xu, X., Yiu, S. M., Hui, L. C. K., Chow, K. P.: Security Issues and Challenges for Cyber Physical Systems. IEEE/ACM Conference on Green Computing and Communications and IEEE/ACM Intern. Conference on Cyber, Physical and Social Computing, pp.733–738, IEEE Publ., 2010

    Google Scholar 

  • (Xiao 2006) Xiao, Y.: Security in Sensor Networks. Auerbach Publ., 2006

    Google Scholar 

  • (Xiao et al. 2008) Xiao, K., Ren, S., Kwiat, K.: Retrofitting Cyber-Physical Systems for Survivability through External Coordination. In: Proceed. 41st Internat. Conference on Systems Science, pp. 454–466, 2008

    Google Scholar 

  • (Yuzhe et al. 2013) Yuzhe, L., Ling, S., Peng, D., Quecedo, E.: Jamming Attack on Cyber-Physical Systems : A Game Theoretic Approach. In: IEEE 3rd Annual Conference on Cyber Technology in Automation, pp. 252–257, 2013

    Google Scholar 

  • (Zeltser 2015) Zeltser, L.: Antivirus Software uses Several Different Virus Detection Techniques. TechTarget Network, 2015

    Google Scholar 

  • (Zimmer et al. 2010) Zimmer, C., Bhat, B., Mueller, F., Mohan, S.: Time-Based Intrusion Detection in Cyber-Physical Systems. In: Proceed. 1st ACM/IEEE International Conference on Cyber-Physical Systems, pp. 109–118, 2010

    Google Scholar 

Links

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer International Publishing AG, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Möller, D.P.F., Haas, R.E. (2019). Automotive Cybersecurity. In: Guide to Automotive Connectivity and Cybersecurity. Computer Communications and Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-73512-2_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-73512-2_6

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-73511-5

  • Online ISBN: 978-3-319-73512-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics