Zusammenfassung
The recent [3] successful attack on a current connected car has proven the practicability of remote attacks on connected vehicles. It is no longer a theory that can be dismissed or ignored in the development of automotive systems. The effort involved was not beyond what is to be expected for some attackers with a strong motivation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
Literatur
Koscher et al: Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy
Checkoway et al: Comprehensive Experimental Analyses of Automotive Attack Surfaces, USENIX Security 2011
Miller, Valasesk: Remote Exploitation of an Unaltered Passenger Vehicle, August 10, 2015 (http://illmatics.com/Remote%20Car%20Hacking.pdf, accessed February 23, 2016)
https://en.wikipedia.org/wiki/S%C3%A9bastien_Le_Prestre_de_Vauban, accessed on February 23, 2016
https://en.wikipedia.org/wiki/Neuf-Brisach, accessed on February 23, 2016
AUTOSAR Release 4.2 Overview and Revision History, http://www.autosar.org/fileadmin/files/releases/4-2/AUTOSAR_TR_ReleaseOverviewAndRevHistory.pdf, accessed on February 23, 2016
FIPS PUB 180-4, Secure Hash Standard (SHS), http://nvlpubs.nist.gov/nistpubs/FIPS/NIST.FIPS.180-4.pdf, accessed on February 23, 2016
FIPS PUB 197, ADVANCED ENCRYPTION STANDARD (AES), http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf, accessed February 23, 2016
Bubeck et al: A Hardware Security Module for Engine Control Units, ESCAR Conference, Dresden, Germany, 2011
Kriso, Ihle: Automotive Security im Kontext der Funktionssicherheit (ISO 26262), 31. VDI/VW Gemeinschaftstagung Automotive Security, Wolfsburg, 2015
Intel® 64 and IA-32 Architectures Developer’s Manual, http://www.intel.com/content/www/us/en/architecture-and-technology/64-ia-32-architectures-software-developer-manual-325462.html, accessed February 23, 2016
ARM TrustZone, http://www.arm.com/products/processors/technologies/trustzone/, accessed February 23, 2016
EVITA, E-safety vehicle intrusion protected applications, http://www.evitaproject.org/, 2008
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2018 Springer Fachmedien Wiesbaden GmbH, ein Teil von Springer Nature
About this paper
Cite this paper
Ihle, M., Glas, B. (2018). Impact of demonstrated remote attacks on security of connected vehicles. In: Isermann, R. (eds) Fahrerassistenzsysteme 2016. Proceedings. Springer Vieweg, Wiesbaden. https://doi.org/10.1007/978-3-658-21444-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-658-21444-9_8
Published:
Publisher Name: Springer Vieweg, Wiesbaden
Print ISBN: 978-3-658-21443-2
Online ISBN: 978-3-658-21444-9
eBook Packages: Computer Science and Engineering (German Language)