Trusted computing for automotive systems

被引:0
|
作者
Bogdanov, A. [1 ]
Eisenbarth, T.
Wolf, M. [1 ]
Wollinger, T. [1 ]
机构
[1] Embedded Sec, Bochum, Germany
来源
AUTOMOTIVE SECURITY | 2007年 / 2016卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
For new automotive applications and services, information technology (IT) has gained central importance. Safety and reliability has become a relatively well-established field. However, the protection of vehicular IT-systems against systematic manipulation or intrusion has started to emerge just recently. For example, user privacy aspects aren't considered at all for the time being. Nevertheless, some complex IT-systems are already base of various security-critical vehicular applications, such as immobilizers or digital tachographs. In Order to securely enable future automotive applications and business models while ensuring users' privacy as well, IT-security will be an obligatory technology for the next generation of vehicles.
引用
下载
收藏
页码:227 / 237
页数:11
相关论文
共 50 条
  • [1] Trusted computing for automotive systems: New approaches to enforce security for electronic systems in vehicles
    Escrypt - Embedded Security, Bochum
    不详
    VDI Berichte, 2007, (2016): : 227 - 237
  • [2] Firmware Security ModuleA Framework for Trusted Computing in Automotive Multiprocessors
    Claudius Pott
    Philipp Jungklass
    David Jacek Csejka
    Thomas Eisenbarth
    Marco Siebert
    Journal of Hardware and Systems Security, 2021, 5 (2) : 103 - 113
  • [3] Updates and Asynchronous Communication in Trusted Computing Systems
    Brustoloni, Jose C.
    Kyle, David
    28TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS, VOLS 1 AND 2, PROCEEDINGS, 2008, : 194 - 205
  • [4] Trusted computing - A new challenge for embedded systems
    Vaslin, Romain
    Gogniat, Guy
    Diguet, Jean-Philippe
    Pegatoquet, Alain
    2006 13TH IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, CIRCUITS AND SYSTEMS, VOLS 1-3, 2006, : 776 - +
  • [5] Survey on Application of Trusted Computing in Industrial Control Systems
    Bai, Jing
    Zhang, Xiao
    Qi, Longyun
    Liu, Wei
    Zhou, Xianfei
    Liu, Yin
    Lv, Xiaoliang
    Sun, Boyan
    Duan, Binbin
    Zhang, Siyuan
    Che, Xin
    ELECTRONICS, 2023, 12 (19)
  • [6] Convergence in Trusted Computing and Virtualized Systems: A new Dimension towards Trusted Intelligent System
    Thinh Le Vinh
    Bouzefrane, Samia
    Banerjee, Soumya
    5TH IFIP INTERNATIONAL CONFERENCE ON PERFORMANCE EVALUATION AND MODELING IN WIRED AND WIRELESS NETWORKS PEMWN 16, 2016,
  • [7] A Logic of Secure Systems and its Application to Trusted Computing
    Datta, Anupam
    Franklin, Jason
    Garg, Deepak
    Kaynar, Dilsun
    PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, : 221 - 236
  • [8] Trusted-Computing Technologies for the Protection of Critical Information Systems
    Lioy, Antonio
    Ramunno, Gianluca
    Vernizzi, Davide
    PROCEEDINGS OF THE INTERNATIONAL WORKSHOP ON COMPUTATIONAL INTELLIGENCE IN SECURITY FOR INFORMATION SYSTEMS CISIS 2008, 2009, 53 : 77 - 83
  • [9] Challenges for Trusted Computing
    Sadeghi, Ahmad-Reza
    CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 414 - 414
  • [10] Reassessing the TCG specifications for trusted computing in mobile and embedded systems
    Grossschadl, Johann
    Vejda, Tobias
    Page, Dan
    2008 IEEE INTERNATIONAL WORKSHOP ON HARDWARE-ORIENTED SECURITY AND TRUST, 2008, : 84 - +