Difference between revisions of "Koushanfar2012eda"
From ACES
(Import from BibTeX) |
m (Default pdf) |
||
(One intermediate revision by the same user not shown) | |||
Line 4: | Line 4: | ||
|keywords=Automotive Security, CPS Security, Perspective Article | |keywords=Automotive Security, CPS Security, Perspective Article | ||
|abstract=<p>Modern vehicles integrate a multitude of embedded hard realtime control functionalities, and a host of advanced information and entertainment (infotainment) features. The true paradigm shift for future vehicles (cybercars) is not only a result of this increasing plurality of subsystems and functions, but is also driven by the unprecedented levels of intra- and inter-car connections and communications as well as networking with external entities. Several new cybercar security and safety challenges simultaneously arise. On one hand, many challenges arise due to increasing system complexity as well as new functionalities that should jointly work on the existing legacy protocols and technologies; such systems are likely unable to warrant a fully secure and dependable system without afterthoughts. On the other hand, challenges arise due to the escalating number of interconnections among the realtime control functions, infotainment components, and the accessible surrounding external devices, vehicles, networks, and cloud services. The arrival of cybercars calls for novel abstractions, models, protocols, design methodologies, testing and evaluation tools to automate the integration and analysis of the safety and security requirements.</p> | |abstract=<p>Modern vehicles integrate a multitude of embedded hard realtime control functionalities, and a host of advanced information and entertainment (infotainment) features. The true paradigm shift for future vehicles (cybercars) is not only a result of this increasing plurality of subsystems and functions, but is also driven by the unprecedented levels of intra- and inter-car connections and communications as well as networking with external entities. Several new cybercar security and safety challenges simultaneously arise. On one hand, many challenges arise due to increasing system complexity as well as new functionalities that should jointly work on the existing legacy protocols and technologies; such systems are likely unable to warrant a fully secure and dependable system without afterthoughts. On the other hand, challenges arise due to the escalating number of interconnections among the realtime control functions, infotainment components, and the accessible surrounding external devices, vehicles, networks, and cloud services. The arrival of cybercars calls for novel abstractions, models, protocols, design methodologies, testing and evaluation tools to automate the integration and analysis of the safety and security requirements.</p> | ||
|month=6 | |||
|year=2012 | |||
|booktitle=Design Automation Conference (DAC) | |booktitle=Design Automation Conference (DAC) | ||
|title=EDA for Secure and Dependable Cybercars: Challenges and Opportunities | |title=EDA for Secure and Dependable Cybercars: Challenges and Opportunities | ||
|entry=inproceedings | |entry=inproceedings | ||
| | |pdf=Koushanfar2012eda.pdf | ||
}} | }} |
Latest revision as of 17:37, 9 November 2021
Koushanfar2012eda | |
---|---|
entry | inproceedings |
address | |
annote | |
author | Farinaz Koushanfar and Ahmad-Reza Sadeghi and Herv{\'e} Seudie |
booktitle | Design Automation Conference (DAC) |
chapter | |
edition | |
editor | |
howpublished | |
institution | |
journal | |
month | 6 |
note | |
number | |
organization | |
pages | |
publisher | |
school | |
series | |
title | EDA for Secure and Dependable Cybercars: Challenges and Opportunities |
type | |
volume | |
year | 2012 |
doi | |
issn | |
isbn | |
url | http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=6241514 |
Koushanfar2012eda.pdf |