Poudel et al., 2018 - Google Patents
Design and evaluation of a reconfigurable ECU architecture for secure and dependable automotive CPSPoudel et al., 2018
View PDF- Document ID
- 8402002069595571993
- Author
- Poudel B
- Munir A
- Publication year
- Publication venue
- IEEE Transactions on Dependable and Secure Computing
External Links
Snippet
The next generation of automobiles integrate a multitude of electronic control units (ECUs) to implement various automotive control and infotainment applications. However, recent works have demonstrated that these pervasively computerized modern automobiles are …
- 238000011156 evaluation 0 title description 6
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
- H04L12/40—Bus networks
- H04L2012/40208—Bus networks characterized by the use of a particular bus standard
- H04L2012/40215—Controller Area Network CAN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L12/00—Data switching networks
- H04L12/28—Data switching networks characterised by path configuration, e.g. local area networks [LAN], wide area networks [WAN]
- H04L12/40—Bus networks
- H04L2012/40267—Bus for use in transportation systems
- H04L2012/40273—Bus for use in transportation systems the transportation system being a vehicle
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Poudel et al. | Design and evaluation of a reconfigurable ECU architecture for secure and dependable automotive CPS | |
US11108542B2 (en) | Multi-processor automotive electronic control unit | |
Munir et al. | Design and analysis of secure and dependable automotive CPS: A steer-by-wire case study | |
Van Bulck et al. | VulCAN: Efficient component authentication and software isolation for automotive control networks | |
US11507662B2 (en) | Systems and methods of security for trusted artificial intelligence hardware processing | |
Simpson et al. | Offline hardware/software authentication for reconfigurable platforms | |
Koushanfar et al. | EDA for secure and dependable cybercars: Challenges and opportunities | |
Poudel et al. | Design and comparative evaluation of GPGPU-and FPGA-based MPSoC ECU architectures for secure, dependable, and real-time automotive CPS | |
WO2008127124A2 (en) | Method and apparatus for verification of information access in ict- systems having multiple security dimensions and multiple security levels | |
CN112217636B (en) | Data processing method and device based on block chain, computer equipment and medium | |
Shreejith et al. | Security aware network controllers for next generation automotive embedded systems | |
KR20180081332A (en) | Security System and Method of Embeded software in Vehicle electric device | |
Shipman et al. | A zero trust architecture for automotive networks | |
Nasser | Automotive Cybersecurity Engineering Handbook | |
Poudel et al. | Design and evaluation of a novel ECU architecture for secure and dependable automotive CPS | |
Giri et al. | An integrated safe and secure approach for authentication and secret key establishment in automotive cyber-physical systems | |
Mohd et al. | Run-time monitoring and validation using reverse function (RMVRF) for hardware trojans detection | |
US12362933B2 (en) | Scheme for transferring and authenticating data | |
US5958073A (en) | Reliability enhanced processing system and method for optimizing | |
Chan et al. | Towards a blockchain framework for autonomous vehicle system integrity | |
Bernardeschi et al. | Modeling and generation of secure component communications in AUTOSAR | |
CN109063514A (en) | For preventing the method, apparatus, equipment and computer readable storage medium of data tampering | |
Ghani et al. | Transparent and Trustworthy Blockchain-Based Scheme for the Protection of Vehicular Soft Integrity in Shared Mobility | |
Fern et al. | A complete system-level security verification methodology | |
Hashii | Lessons learned using alloy to formally specify mls-pca trusted security architecture |