Serveur d'exploration sur Heinrich Schütz

Attention, ce site est en cours de développement !
Attention, site généré par des moyens informatiques à partir de corpus bruts.
Les informations ne sont donc pas validées.

Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures

Identifieur interne : 000508 ( Main/Exploration ); précédent : 000507; suivant : 000509

Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures

Auteurs : Tobias Hoppe [Allemagne] ; Stefan Kiltz [Allemagne] ; Jana Dittmann [Allemagne]

Source :

RBID : ISTEX:5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B

Abstract

Abstract: The IT security of automotive systems is an evolving area of research. To analyse the current situation we performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology. With respect to the results of these tests, in this paper we discuss selected countermeasures to address the basic weaknesses exploited in our tests and also give a short outlook to requirements, potential and restrictions of future, holistic approaches.

Url:
DOI: 10.1007/978-3-540-87698-4_21


Affiliations:


Links toward previous steps (curation, corpus...)


Le document en format XML

<record>
<TEI wicri:istexFullTextTei="biblStruct">
<teiHeader>
<fileDesc>
<titleStmt>
<title xml:lang="en">Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</title>
<author>
<name sortKey="Hoppe, Tobias" sort="Hoppe, Tobias" uniqKey="Hoppe T" first="Tobias" last="Hoppe">Tobias Hoppe</name>
</author>
<author>
<name sortKey="Kiltz, Stefan" sort="Kiltz, Stefan" uniqKey="Kiltz S" first="Stefan" last="Kiltz">Stefan Kiltz</name>
</author>
<author>
<name sortKey="Dittmann, Jana" sort="Dittmann, Jana" uniqKey="Dittmann J" first="Jana" last="Dittmann">Jana Dittmann</name>
</author>
</titleStmt>
<publicationStmt>
<idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B</idno>
<date when="2008" year="2008">2008</date>
<idno type="doi">10.1007/978-3-540-87698-4_21</idno>
<idno type="url">https://api.istex.fr/document/5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B/fulltext/pdf</idno>
<idno type="wicri:Area/Main/Corpus">001501</idno>
<idno type="wicri:Area/Main/Curation">001424</idno>
<idno type="wicri:Area/Main/Exploration">000508</idno>
<idno type="wicri:explorRef" wicri:stream="Main" wicri:step="Exploration">000508</idno>
</publicationStmt>
<sourceDesc>
<biblStruct>
<analytic>
<title level="a" type="main" xml:lang="en">Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</title>
<author>
<name sortKey="Hoppe, Tobias" sort="Hoppe, Tobias" uniqKey="Hoppe T" first="Tobias" last="Hoppe">Tobias Hoppe</name>
<affiliation wicri:level="3">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg</wicri:regionArea>
<placeName>
<region type="land" nuts="2">Saxe-Anhalt</region>
<settlement type="city">Magdebourg</settlement>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author>
<name sortKey="Kiltz, Stefan" sort="Kiltz, Stefan" uniqKey="Kiltz S" first="Stefan" last="Kiltz">Stefan Kiltz</name>
<affiliation wicri:level="3">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg</wicri:regionArea>
<placeName>
<region type="land" nuts="2">Saxe-Anhalt</region>
<settlement type="city">Magdebourg</settlement>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author>
<name sortKey="Dittmann, Jana" sort="Dittmann, Jana" uniqKey="Dittmann J" first="Jana" last="Dittmann">Jana Dittmann</name>
<affiliation wicri:level="3">
<country xml:lang="fr">Allemagne</country>
<wicri:regionArea>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg</wicri:regionArea>
<placeName>
<region type="land" nuts="2">Saxe-Anhalt</region>
<settlement type="city">Magdebourg</settlement>
</placeName>
</affiliation>
<affiliation wicri:level="1">
<country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series>
<title level="s">Lecture Notes in Computer Science</title>
<imprint>
<date>2008</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B</idno>
<idno type="DOI">10.1007/978-3-540-87698-4_21</idno>
<idno type="ChapterID">Chap21</idno>
<idno type="ChapterID">21</idno>
</biblStruct>
</sourceDesc>
<seriesStmt>
<idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc>
<textClass></textClass>
<langUsage>
<language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front>
<div type="abstract" xml:lang="en">Abstract: The IT security of automotive systems is an evolving area of research. To analyse the current situation we performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology. With respect to the results of these tests, in this paper we discuss selected countermeasures to address the basic weaknesses exploited in our tests and also give a short outlook to requirements, potential and restrictions of future, holistic approaches.</div>
</front>
</TEI>
<affiliations>
<list>
<country>
<li>Allemagne</li>
</country>
<region>
<li>Saxe-Anhalt</li>
</region>
<settlement>
<li>Magdebourg</li>
</settlement>
</list>
<tree>
<country name="Allemagne">
<region name="Saxe-Anhalt">
<name sortKey="Hoppe, Tobias" sort="Hoppe, Tobias" uniqKey="Hoppe T" first="Tobias" last="Hoppe">Tobias Hoppe</name>
</region>
<name sortKey="Dittmann, Jana" sort="Dittmann, Jana" uniqKey="Dittmann J" first="Jana" last="Dittmann">Jana Dittmann</name>
<name sortKey="Dittmann, Jana" sort="Dittmann, Jana" uniqKey="Dittmann J" first="Jana" last="Dittmann">Jana Dittmann</name>
<name sortKey="Hoppe, Tobias" sort="Hoppe, Tobias" uniqKey="Hoppe T" first="Tobias" last="Hoppe">Tobias Hoppe</name>
<name sortKey="Kiltz, Stefan" sort="Kiltz, Stefan" uniqKey="Kiltz S" first="Stefan" last="Kiltz">Stefan Kiltz</name>
<name sortKey="Kiltz, Stefan" sort="Kiltz, Stefan" uniqKey="Kiltz S" first="Stefan" last="Kiltz">Stefan Kiltz</name>
</country>
</tree>
</affiliations>
</record>

Pour manipuler ce document sous Unix (Dilib)

EXPLOR_STEP=$WICRI_ROOT/Wicri/Musique/explor/SchutzV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000508 | SxmlIndent | more

Ou

HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000508 | SxmlIndent | more

Pour mettre un lien sur cette page dans le réseau Wicri

{{Explor lien
   |wiki=    Wicri/Musique
   |area=    SchutzV1
   |flux=    Main
   |étape=   Exploration
   |type=    RBID
   |clé=     ISTEX:5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B
   |texte=   Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures
}}

Wicri

This area was generated with Dilib version V0.6.38.
Data generation: Mon Feb 8 17:34:10 2021. Site generation: Mon Feb 8 17:41:23 2021