Trusted computing for automotive systems

被引:0
|
作者
Bogdanov, A. [1 ]
Eisenbarth, T.
Wolf, M. [1 ]
Wollinger, T. [1 ]
机构
[1] Embedded Sec, Bochum, Germany
来源
AUTOMOTIVE SECURITY | 2007年 / 2016卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
For new automotive applications and services, information technology (IT) has gained central importance. Safety and reliability has become a relatively well-established field. However, the protection of vehicular IT-systems against systematic manipulation or intrusion has started to emerge just recently. For example, user privacy aspects aren't considered at all for the time being. Nevertheless, some complex IT-systems are already base of various security-critical vehicular applications, such as immobilizers or digital tachographs. In Order to securely enable future automotive applications and business models while ensuring users' privacy as well, IT-security will be an obligatory technology for the next generation of vehicles.
引用
收藏
页码:227 / 237
页数:11
相关论文
共 50 条
  • [21] TRUSTED COMPUTING UPDATE
    ABRAMS, MD
    JOYCE, MV
    COMPUTERS & SECURITY, 1995, 14 (01) : 57 - 68
  • [22] Mobile Trusted Computing
    Asokan, N.
    Ekberg, Jan-Erik
    Kostiainen, Kari
    Rajan, Anand
    Rozas, Carlos
    Sadeghi, Ahmad-Reza
    Schulz, Steffen
    Wachsmann, Christian
    PROCEEDINGS OF THE IEEE, 2014, 102 (08) : 1189 - 1206
  • [23] Using trusted computing in trusted mail transfer protocol
    Mohamed, Fady A.
    Hemayed, Elsayed E.
    SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (05) : 926 - 933
  • [24] A Trusted Remote Attestation Model based on Trusted Computing
    Yu, Yue
    Wang, Huaimin
    Liu, Bo
    Yin, Gang
    2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1504 - 1509
  • [25] Trusted computing, trusted third parties, and verified communications
    Abadi, M
    SECURITY AND PROTECTION IN INFORMATION PROCESSING SYSTEMS, 2004, 147 : 291 - 308
  • [26] Research on trusted storage based on trusted computing platform
    School of Computer, Wuhan University, Wuhan 430072, China
    不详
    Tongxin Xuebao, 2007, SUPPL. (117-120):
  • [27] PISTIS: Trusted Computing Architecture for Low-end Embedded Systems
    Grisafi, Michele
    Ammar, Mahmoud
    Roveri, Marco
    Crispo, Bruno
    PROCEEDINGS OF THE 31ST USENIX SECURITY SYMPOSIUM, 2022, : 3843 - 3860
  • [28] CHORS: Hardening High-Assurance Security Systems with Trusted Computing
    Ozga, Wojciech
    Faqeh, Rasha
    Quoc, Do Le
    Gregor, Franz
    Dragone, Silvio
    Fetzer, Christof
    37TH ANNUAL ACM SYMPOSIUM ON APPLIED COMPUTING, 2022, : 1626 - 1635
  • [29] Protected Computing vs. Trusted Computing
    Mana, Antonio
    Munoz, Antonio
    2006 1ST INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS SOFTWARE & MIDDLEWARE, VOLS 1 AND 2, 2006, : 14 - +
  • [30] Software for automotive systems: Model-integrated computing
    Neema, Sandeep
    Karsai, Gabor
    AUTOMOTIVE SOFTWARE-CONNECTED SERVICES IN MOBILE NETWORKS, 2004, 4147 : 116 - 136