Supporting Cyber-Security Based on Hardware-Software Interface Definition

被引:19
|
作者
Macher, Georg [1 ]
Sporer, Harald [2 ]
Brenner, Eugen [3 ]
Kreiner, Christian [3 ]
机构
[1] AVL List GmbH, Graz, Austria
[2] Pewag Int GmbH, Graz, Austria
[3] Graz Univ Technol, Inst Tech Informat, Graz, Austria
关键词
ISO; 26262; SAE J3061; Automotive systems; Hardware-software interfaces; Cyber-security; Functional safety;
D O I
10.1007/978-3-319-44817-6_12
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The automotive industry has an annual increase rate of software implemented functions of about 30 %. In the automotive domain the increasing complexity of systems became challenging with consumer demands for advanced driving assistance systems and automated driving functionalities, and the thus broadening societal sensitivity for security and safety concerns, such as remote control of cars by hacking their IT infrastructure. As vehicle providers gear up for the cyber-security challenges, they can leverage experiences from many other domains, but nevertheless have to face several unique challenges. The recently released SAE J3061 guidebook for cyber-physical vehicle systems provides high-level principles for automotive organizations to identify and assess cyber-security threats and design cyber-security aware systems in close relation to ISO 26262. Although functional safety and cyber-security engineering have a considerable overlap regarding many facets, such as analysis methods and system function thinking, the definition of system borders (item definition vs. trust boundaries) often differs largely. Therefore, appropriate systematic approaches to support the identification of trust boundaries and attack vectors for the safety-and cybersecurity-relates aspects of complex automotive systems are essential. In the course of this paper, we analyze a method to identify attack vectors on complex systems via signal interfaces. We focus on a central development artifact of the ISO 26262 functional safety development process, the hardware-software interface (HSI), and propose an extension for the HSI to support the cyber-security engineering process.
引用
收藏
页码:148 / 159
页数:12
相关论文
共 50 条
  • [21] Hardware-Software Co-Design Based Obfuscation of Hardware Accelerators
    Chakraborty, Abhishek
    Srivastava, Ankur
    [J]. 2019 IEEE COMPUTER SOCIETY ANNUAL SYMPOSIUM ON VLSI (ISVLSI 2019), 2019, : 549 - 554
  • [22] Hardware-software partitioning based on system performance constrained
    Peng, Yipin
    Ling, Ming
    Yang, Jun
    [J]. Dongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Southeast University (Natural Science Edition), 2004, 34 (06): : 828 - 832
  • [23] A metaheuristic based on the tabu search for hardware-software partitioning
    Jemai, Mehdi
    Dimassi, Sonia
    Ouni, Bouraoui
    Mtibaa, Abdellatif
    [J]. TURKISH JOURNAL OF ELECTRICAL ENGINEERING AND COMPUTER SCIENCES, 2017, 25 (02) : 901 - 912
  • [24] A knowledge-based system for hardware-software partitioning
    Lopez, ML
    Iglesias, CA
    Lopez, JC
    [J]. DESIGN, AUTOMATION AND TEST IN EUROPE, PROCEEDINGS, 1998, : 914 - 915
  • [25] Hardware-Software Partitioning of Soft Multi-Core Cyber-Physical Systems
    Babjak, Benjamin
    Volgyesi, Peter
    Ledeczi, Akos
    [J]. PROCEEDINGS OF THE 13TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS CONTEL 2015, 2015,
  • [26] Correlation-based Streaming Anomaly Detection in Cyber-Security
    Noble, Jordan
    Adams, Niall M.
    [J]. 2016 IEEE 16TH INTERNATIONAL CONFERENCE ON DATA MINING WORKSHOPS (ICDMW), 2016, : 311 - 318
  • [27] A Quantum-Safe Software-Defined Deterministic Internet of Things (IoT) with Hardware-Enforced Cyber-Security for Critical Infrastructures
    Szymanski, Ted H.
    [J]. INFORMATION, 2024, 15 (04)
  • [28] Vulnerabilities in Lagrange-based DMPC in the Context of Cyber-Security
    Velarde, P.
    Maestre, J. M.
    Ishii, H.
    Negenborn, R. R.
    [J]. 2017 IEEE INTERNATIONAL CONFERENCE ON AUTOMATIC COMPUTING (ICAC), 2017, : 215 - 220
  • [29] No Security Without Time Protection: We Need a New Hardware-Software Contract
    Ge, Qian
    Yarom, Yuval
    Heiser, Gernot
    [J]. 9TH ASIA-PACIFIC SYSTEMS WORKSHOP 2018 (APSYS'18), 2018,
  • [30] Innovations and applications of operating system security with a hardware-software co-design
    Gu, Jinyu
    Hua, Zhichao
    Li, Mingyu
    Chen, Haibo
    [J]. CHINESE SCIENCE BULLETIN-CHINESE, 2022, 67 (32): : 3861 - 3871