Macher et al., 2017 - Google Patents
Integrated safety and security development in the automotive domainMacher et al., 2017
View PDF- Document ID
- 5123972659204179189
- Author
- Macher G
- Messnarz R
- Armengaud E
- Riel A
- Brenner E
- Kreiner C
- Publication year
External Links
Snippet
The replacement of safety-critical mechanical components with electro-mechanical systems has led to the fact that safety aspects play a central role in development of embedded automotive systems. Recently, consumer demands for connectivity (eg, infotainment, car-2 …
- 238000011161 development 0 title abstract description 34
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/70—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
- G06F21/71—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
- G06F21/77—Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for programme control, e.g. control unit
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| Macher et al. | Integrated safety and security development in the automotive domain | |
| Riel et al. | Integrated design for tackling safety and security challenges of smart products and digital manufacturing | |
| Macher et al. | Supporting cyber-security based on hardware-software interface definition | |
| Burton et al. | Automotive functional safety= safety+ security | |
| CN112087519A (en) | Specially programmed computing system with associated devices configured to implement security lockout and methods of use thereof | |
| Dobaj et al. | Cybersecurity Threat Analysis, Risk Assessment and Design Patterns for Automotive Networked Embedded Systems: A Case Study. | |
| Cui et al. | US 2: An unified safety and security analysis method for autonomous vehicles | |
| Zoppelt et al. | SAM: a security abstraction model for automotive software systems | |
| Macher et al. | An integrated view on automotive SPICE, functional safety and cyber-security | |
| D'Anna | Cybersecurity for Commercial Vehicles | |
| Liedtke et al. | The new cybersecurity challenges and demands for automotive organisations and projects-an insight view | |
| Yousseef et al. | Autonomous Vehicle Security: A Deep Dive into Threat Modeling | |
| Hamad | A multilayer secure framework for vehicular systems | |
| Roudier et al. | Towards the model-driven engineering of security requirements for embedded systems | |
| Hagan et al. | Policy-based security modelling and enforcement approach for emerging embedded architectures | |
| Schwarzl et al. | Safety and security co-engineering for highly automated vehicles | |
| Rao et al. | A novel scalable hybrid threat analysis and risk assessment engine for an automotive subsystem | |
| Wei et al. | A system theoretic approach to cybersecurity risk analysis and mitigation for autonomous passenger vehicles | |
| Macher et al. | Signal-Layer Security and Trust-Boundary Identification based on Hardware-Software Interface Definition. | |
| Kenyon | Transportation cyber-physical systems security and privacy | |
| Robinson-Mallett | Coordinating security and safety engineering processes in automotive electronics development | |
| Camek et al. | Future cars: Necessity for an adaptive and distributed multiple independent levels of security architecture | |
| Mohamad et al. | Asset-driven security assurance cases with built-in quality assurance | |
| Kim et al. | AUTOSAR embedded security in vehicles | |
| Yousseef et al. | Autonomous Vehicle Security: Hybrid Threat Modeling Approach |