SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
Experimental Security Analysis of a Modern Automobile
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
Proceedings of the Conference on Design, Automation and Test in Europe
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
Comprehensive experimental analyses of automotive attack surfaces
SEC'11 Proceedings of the 20th USENIX conference on Security
EDA for secure and dependable cybercars: challenges and opportunities
Proceedings of the 49th Annual Design Automation Conference
System-level design: orthogonalization of concerns and platform-based design
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems
Cyber-Security for the Controller Area Network (CAN) Communication Protocol
CYBERSECURITY '12 Proceedings of the 2012 International Conference on Cyber Security
Low cost multicast network authentication for embedded control systems
Low cost multicast network authentication for embedded control systems
Design synthesis and optimization for automotive embedded systems
Proceedings of the 2014 on International symposium on physical design
Hi-index | 0.00 |
Cyber-security is a rising issue for automotive electronic systems, and it is critical to system safety and dependability. Current in-vehicles architectures, such as those based on the Controller Area Network (CAN), do not provide direct support for secure communications. When retrofitting these architectures with security mechanisms, a major challenge is to ensure that system safety will not be hindered, given the limited computation and communication resources. We apply Message Authentication Codes (MACs) to protect against masquerade and replay attacks on CAN networks, and propose an optimal Mixed Integer Linear Programming (MILP) formulation for solving the mapping problem from a functional model to the CAN-based platform while meeting both the security and the safety requirements. We also develop an efficient heuristic for the mapping problem under security and safety constraints. To the best of our knowledge, this is the first work to address security and safety in an integrated formulation in the design automation of automotive electronic systems. Experimental results of an industrial case study show the effectiveness of our approach.