Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures
Identifieur interne : 000508 ( Main/Exploration ); précédent : 000507; suivant : 000509Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures
Auteurs : Tobias Hoppe [Allemagne] ; Stefan Kiltz [Allemagne] ; Jana Dittmann [Allemagne]Source :
- Lecture Notes in Computer Science [ 0302-9743 ] ; 2008.
Abstract
Abstract: The IT security of automotive systems is an evolving area of research. To analyse the current situation we performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology. With respect to the results of these tests, in this paper we discuss selected countermeasures to address the basic weaknesses exploited in our tests and also give a short outlook to requirements, potential and restrictions of future, holistic approaches.
Url:
DOI: 10.1007/978-3-540-87698-4_21
Affiliations:
Links toward previous steps (curation, corpus...)
Le document en format XML
<record><TEI wicri:istexFullTextTei="biblStruct"><teiHeader><fileDesc><titleStmt><title xml:lang="en">Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</title>
<author><name sortKey="Hoppe, Tobias" sort="Hoppe, Tobias" uniqKey="Hoppe T" first="Tobias" last="Hoppe">Tobias Hoppe</name>
</author>
<author><name sortKey="Kiltz, Stefan" sort="Kiltz, Stefan" uniqKey="Kiltz S" first="Stefan" last="Kiltz">Stefan Kiltz</name>
</author>
<author><name sortKey="Dittmann, Jana" sort="Dittmann, Jana" uniqKey="Dittmann J" first="Jana" last="Dittmann">Jana Dittmann</name>
</author>
</titleStmt>
<publicationStmt><idno type="wicri:source">ISTEX</idno>
<idno type="RBID">ISTEX:5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B</idno>
<date when="2008" year="2008">2008</date>
<idno type="doi">10.1007/978-3-540-87698-4_21</idno>
<idno type="url">https://api.istex.fr/document/5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B/fulltext/pdf</idno>
<idno type="wicri:Area/Main/Corpus">001501</idno>
<idno type="wicri:Area/Main/Curation">001424</idno>
<idno type="wicri:Area/Main/Exploration">000508</idno>
<idno type="wicri:explorRef" wicri:stream="Main" wicri:step="Exploration">000508</idno>
</publicationStmt>
<sourceDesc><biblStruct><analytic><title level="a" type="main" xml:lang="en">Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures</title>
<author><name sortKey="Hoppe, Tobias" sort="Hoppe, Tobias" uniqKey="Hoppe T" first="Tobias" last="Hoppe">Tobias Hoppe</name>
<affiliation wicri:level="3"><country xml:lang="fr">Allemagne</country>
<wicri:regionArea>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg</wicri:regionArea>
<placeName><region type="land" nuts="2">Saxe-Anhalt</region>
<settlement type="city">Magdebourg</settlement>
</placeName>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Kiltz, Stefan" sort="Kiltz, Stefan" uniqKey="Kiltz S" first="Stefan" last="Kiltz">Stefan Kiltz</name>
<affiliation wicri:level="3"><country xml:lang="fr">Allemagne</country>
<wicri:regionArea>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg</wicri:regionArea>
<placeName><region type="land" nuts="2">Saxe-Anhalt</region>
<settlement type="city">Magdebourg</settlement>
</placeName>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
<author><name sortKey="Dittmann, Jana" sort="Dittmann, Jana" uniqKey="Dittmann J" first="Jana" last="Dittmann">Jana Dittmann</name>
<affiliation wicri:level="3"><country xml:lang="fr">Allemagne</country>
<wicri:regionArea>ITI Research Group on Multimedia and Security, Otto-von-Guericke University of Magdeburg, Universitaetsplatz 2, 39106, Magdeburg</wicri:regionArea>
<placeName><region type="land" nuts="2">Saxe-Anhalt</region>
<settlement type="city">Magdebourg</settlement>
</placeName>
</affiliation>
<affiliation wicri:level="1"><country wicri:rule="url">Allemagne</country>
</affiliation>
</author>
</analytic>
<monogr></monogr>
<series><title level="s">Lecture Notes in Computer Science</title>
<imprint><date>2008</date>
</imprint>
<idno type="ISSN">0302-9743</idno>
<idno type="eISSN">1611-3349</idno>
<idno type="ISSN">0302-9743</idno>
</series>
<idno type="istex">5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B</idno>
<idno type="DOI">10.1007/978-3-540-87698-4_21</idno>
<idno type="ChapterID">Chap21</idno>
<idno type="ChapterID">21</idno>
</biblStruct>
</sourceDesc>
<seriesStmt><idno type="ISSN">0302-9743</idno>
</seriesStmt>
</fileDesc>
<profileDesc><textClass></textClass>
<langUsage><language ident="en">en</language>
</langUsage>
</profileDesc>
</teiHeader>
<front><div type="abstract" xml:lang="en">Abstract: The IT security of automotive systems is an evolving area of research. To analyse the current situation we performed several practical tests on recent automotive technology, focusing on automotive systems based on CAN bus technology. With respect to the results of these tests, in this paper we discuss selected countermeasures to address the basic weaknesses exploited in our tests and also give a short outlook to requirements, potential and restrictions of future, holistic approaches.</div>
</front>
</TEI>
<affiliations><list><country><li>Allemagne</li>
</country>
<region><li>Saxe-Anhalt</li>
</region>
<settlement><li>Magdebourg</li>
</settlement>
</list>
<tree><country name="Allemagne"><region name="Saxe-Anhalt"><name sortKey="Hoppe, Tobias" sort="Hoppe, Tobias" uniqKey="Hoppe T" first="Tobias" last="Hoppe">Tobias Hoppe</name>
</region>
<name sortKey="Dittmann, Jana" sort="Dittmann, Jana" uniqKey="Dittmann J" first="Jana" last="Dittmann">Jana Dittmann</name>
<name sortKey="Dittmann, Jana" sort="Dittmann, Jana" uniqKey="Dittmann J" first="Jana" last="Dittmann">Jana Dittmann</name>
<name sortKey="Hoppe, Tobias" sort="Hoppe, Tobias" uniqKey="Hoppe T" first="Tobias" last="Hoppe">Tobias Hoppe</name>
<name sortKey="Kiltz, Stefan" sort="Kiltz, Stefan" uniqKey="Kiltz S" first="Stefan" last="Kiltz">Stefan Kiltz</name>
<name sortKey="Kiltz, Stefan" sort="Kiltz, Stefan" uniqKey="Kiltz S" first="Stefan" last="Kiltz">Stefan Kiltz</name>
</country>
</tree>
</affiliations>
</record>
Pour manipuler ce document sous Unix (Dilib)
EXPLOR_STEP=$WICRI_ROOT/Wicri/Musique/explor/SchutzV1/Data/Main/Exploration
HfdSelect -h $EXPLOR_STEP/biblio.hfd -nk 000508 | SxmlIndent | more
Ou
HfdSelect -h $EXPLOR_AREA/Data/Main/Exploration/biblio.hfd -nk 000508 | SxmlIndent | more
Pour mettre un lien sur cette page dans le réseau Wicri
{{Explor lien |wiki= Wicri/Musique |area= SchutzV1 |flux= Main |étape= Exploration |type= RBID |clé= ISTEX:5AE7B96D4AD6E4860A04A6B719DE3F78721DBF7B |texte= Security Threats to Automotive CAN Networks – Practical Examples and Selected Short-Term Countermeasures }}
This area was generated with Dilib version V0.6.38. |