Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2808414.2808423acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
invited-talk

An Overview of Automotive Cybersecurity: Challenges and Solution Approaches

Published:16 October 2015Publication History

ABSTRACT

In recent years, several academic teams demonstrated that it is possible to hack vehicles via every available interface (telematics, cellular, Bluetooth, etc.). In this presentation a brief overview of recent results will be presented, and current cybersecurity and privacy threats will be described including attacks on functional safety, attacks for financial purposes, attacks on infrastructure, and considerations around privacy. The differences of automotive cybersecurity to Internet data security will be analyzed, and we will explore why traditional security solutions and even Internet-of-Things security solutions often do not translate well to the automotive world. We will then consider future applications such as vehicle-to-vehicle communication and automated vehicles, and analyze what security risks and challenges these technologies introduce. Research results for implementing automotive cybersecurity will be presented, including connected vehicle security and privacy, secure in-vehicle communication, automotive firewalls and intrusion detection systems, trusted hardware, and formally verified communication interfaces. Finally, an overview of current research initiatives will be provided, and an outlook to future security and research demands will be given.

Index Terms

  1. An Overview of Automotive Cybersecurity: Challenges and Solution Approaches

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            TrustED '15: Proceedings of the 5th International Workshop on Trustworthy Embedded Devices
            October 2015
            72 pages
            ISBN:9781450338288
            DOI:10.1145/2808414

            Copyright © 2015 Owner/Author

            Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 16 October 2015

            Check for updates

            Qualifiers

            • invited-talk

            Acceptance Rates

            TrustED '15 Paper Acceptance Rate6of11submissions,55%Overall Acceptance Rate24of49submissions,49%

            Upcoming Conference

            CCS '24
            ACM SIGSAC Conference on Computer and Communications Security
            October 14 - 18, 2024
            Salt Lake City , UT , USA

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader