Don't brick your car: firmware confidentiality and rollback for vehicles

H Mansor, K Markantonakis, RN Akram… - 2015 10th …, 2015 - ieeexplore.ieee.org
In modern cars, there are a number of controllers that play a major role in the overall
operations of the vehicles. The secure and updated firmware of these controllers is crucial to …

Replay attack on lightweight CAN authentication protocol

P Noureldeen, MA Azer, A Refaat… - 2017 12th International …, 2017 - ieeexplore.ieee.org
Day after day, users' expectations of tomorrow vehicles' features are increasing. Although
the industry's prime goal is users' satisfaction, many unsolved problems are still present …

[PDF][PDF] Security and privacy aspects of automotive systems

H Mansor - 2017 - pure.royalholloway.ac.uk
Connected cars have Internet access and connectivity to supporting infrastructures and
other vehicles. This enables them to take advantage of smart applications (such as crash …

Vulnerability analysis of real-time operating systems for wireless sensor networks

M Rajesh, B Sreevidya - … : Proceedings of ICACIE 2018, Volume 2, 2020 - Springer
The faultless operation of systems which are safety-critical like the anti-lock braking system
(ABS), fuel control system (especially during cruise control), traction control system, etc., is …

Flow-graph and Markovian methods for cyber security analysis

K Jenab, S Khoury, K LaFevor - International Journal of Enterprise …, 2016 - igi-global.com
A flow-graph depicts the interrelationships among cyber security and security
threats/incidents (ie, internal, external, and accidental). Using a flow-graph, the manner in …

Ajoneuvojen kyberuhat ja niiden torjuminen

S Rikkonen - 2020 - trepo.tuni.fi
Diplomityö tehtiin kartoittamaan vallitsevaa tilannetta ajoneuvoihin kohdistuvien
kyberturvallisuusuhkien osalta. Työtä ohjasivat tutkimuskysymykset: 1. Mitkä ovat modernien …