Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures
Identifieur interne : 001424 ( Main/Curation ); précédent : 001423; suivant : 001425Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures
Auteurs : Tobias Hoppe [Allemagne] ; Stefan Kiltz [Allemagne] ; Jana Dittmann [Allemagne]Source :
- Lecture Notes in Computer Science [ 0302-9743 ] ; 2008.
Abstract
Abstract: The IT security of automotive systems is an evolving area of research. To analyse the current situation we performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology. With respect to the results of these tests, in this paper we discuss selected countermeasures to address the basic weaknesses exploited in our tests and also give a short outlook to requirements, potential and restrictions of future, holistic approaches.
Url:
DOI: 10.1007/978-3-540-87698-4_21
Links toward previous steps (curation, corpus...)
- to stream Main, to step Corpus: Pour aller vers cette notice dans l'étape Curation :001501
Links to Exploration step
ISTEX:5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7BLe document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</title>
<author><name sortKey="Hoppe, Tobias" sort="Hoppe, Tobias" uniqKey="Hoppe T" first="Tobias" last="Hoppe">Tobias Hoppe</name>
<affiliation wicri:level="1"><mods:affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</mods:affiliation>
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: tobias.hoppe@iti.cs.uni-magdeburg.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Kiltz, Stefan" sort="Kiltz, Stefan" uniqKey="Kiltz S" first="Stefan" last="Kiltz">Stefan Kiltz</name>
<affiliation wicri:level="1"><mods:affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</mods:affiliation>
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: stefan.kiltz@iti.cs.uni-magdeburg.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Dittmann, Jana" sort="Dittmann, Jana" uniqKey="Dittmann J" first="Jana" last="Dittmann">Jana Dittmann</name>
<affiliation wicri:level="1"><mods:affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</mods:affiliation>
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: jana.dittmann@iti.cs.uni-magdeburg.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B</idno>
<date when="2008" year="2008">2008</date>
<idno type="doi">10.1007/978-3-540-87698-4_21</idno>
<idno type="url">https://api.istex.fr/document/5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B/fulltext/pdf</idno>
<idno type="wicri:Area/Main/Corpus">001501</idno>
<idno type="wicri:Area/Main/Curation">001424</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</title>
<author><name sortKey="Hoppe, Tobias" sort="Hoppe, Tobias" uniqKey="Hoppe T" first="Tobias" last="Hoppe">Tobias Hoppe</name>
<affiliation wicri:level="1"><mods:affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</mods:affiliation>
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: tobias.hoppe@iti.cs.uni-magdeburg.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Kiltz, Stefan" sort="Kiltz, Stefan" uniqKey="Kiltz S" first="Stefan" last="Kiltz">Stefan Kiltz</name>
<affiliation wicri:level="1"><mods:affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</mods:affiliation>
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: stefan.kiltz@iti.cs.uni-magdeburg.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Dittmann, Jana" sort="Dittmann, Jana" uniqKey="Dittmann J" first="Jana" last="Dittmann">Jana Dittmann</name>
<affiliation wicri:level="1"><mods:affiliation>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg, Germany</mods:affiliation>
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg</wicri:regionArea>
</affiliation>
<affiliation wicri:level="1"><mods:affiliation>E-mail: jana.dittmann@iti.cs.uni-magdeburg.de</mods:affiliation>
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<imprint><date>2008</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B</idno>
<idno type="DOI">10.1007/978-3-540-87698-4_21</idno>
<idno type="ChapterID">Chap21</idno>
<idno type="ChapterID">21</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: The IT security of automotive systems is an evolving area of research. To analyse the current situation we performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology. With respect to the results of these tests, in this paper we discuss selected countermeasures to address the basic weaknesses exploited in our tests and also give a short outlook to requirements, potential and restrictions of future, holistic approaches.</div>
</front>
</TEI>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Musique/explor/SchutzV1/Data/Main/Curation
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 001424 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Curation/biblio.hfd -nk 001424 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Musique |area= SchutzV1 |flux= Main |étape= Curation |type= RBID |clé= ISTEX:5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B |texte= Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures }}
This area was generated with Dilib version V0.6.38. |