Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates

نویسندگان

  • Muhammad Sabir Idrees
  • Hendrik Schweppe
  • Yves Roudier
  • Marko Wolf
  • Dirk Scheuermann
  • Olaf Henniger
چکیده

The software running on electronic devices is regularly updated, these days. A vehicle consists of many such devices, but is operated in a completely different manner than consumer devices. Update operations are safety critical in the automotive domain. Thus, they demand for a very well secured process. We propose an on-board security architecture which facilitates such update processes by combining hardware and software modules. In this paper, we present a protocol to show how this security architecture is employed in order to achieve secure firmware updates for automotive control units.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Driving Automotive Middleware Towards a Secure IP-based Future

Today’s vehicle has become a very complex good, offering performance and reliability thanks to a sophisticated network of Electronic Control Units. Each year car makers develop new automotive features for use inside and outside of the car. But improving this infrastructure each time adds new costs and overhead to the system. A promising solution resides in the use of Internet Protocol (IP) stan...

متن کامل

Secure Software Flashing

An increasing number of vehicular electronic control units (ECU) are equipped with reprogrammable flash memory. The software program in the flash memory determines the behavior of the ECU. The program code usually can be updated via a bootloader, e.g., for a firmware update, a bug fix, or an update enabling additional functionality. The download might be performed over a diagnostic channel or i...

متن کامل

Mouse Trap: Exploiting Firmware Updates in USB Peripherals

Although many users are aware of the threats that malware pose, users are unaware that malware can infect peripheral devices. Many embedded devices support firmware update capabilities, yet they do not authenticate such updates; this allows adversaries to infect peripherals with malicious firmware. We present a case study of the Logitech G600 mouse, demonstrating attacks on networked systems wh...

متن کامل

I-36: Updates on Matching IVF Protocols with Patient Segments

Background - MaterialsAndMethods N;Results N;Conclusion N;

متن کامل

Disseminating Code Updates in Sensor Networks: Survey of Protocols and Security Issues

Network reprogramming allows for over-the-air application updates in sensor networks. We describe the operation of a number of network reprogramming protocols that have emerged for the TinyOS sensor network operating system. We go on to discuss potential security issues that arise from the operation of network reprogramming protocols. We acknowledge support through the NSF CAREER grant CCR-0238...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011