SAFETYLIT WEEKLY UPDATE

We compile citations and summaries of about 400 new articles every week.
RSS Feed

HELP: Tutorials | FAQ
CONTACT US: Contact info

Search Results

Journal Article

Citation

Brooks R, Sander S, Deng J, Taiber J. IEEE Veh. Tech. Mag. 2009; 4(2): 53-64.

Copyright

(Copyright © 2009, Institute of Electrical and Electronics Engineers, Inc.)

DOI

unavailable

PMID

unavailable

Abstract

Some high-profile research into the information security of automotive computer applications has been carried out. This research has been piecemeal, looking for vulnerabilities in specific implementations of isolated applications. Although most of this work concentrates on car theft, modern automotive systems are subject to a much wider range of potential abuses. In this work, the authors consider the automotive system stakeholders and assets they need to protect. This security information is used to help map the automotive security research literature onto the Computer Emergency Response Team (CERT) uses to describe online security incidents, in order to find which threats are not being adequately addressed. The communication modes used in automotive communications are summarized in this article, and the taxonomy of attack incidents are described. Lastly, the security research of specific automobile applications is analyzed, and conclusions are given.

NEW SEARCH


All SafetyLit records are available for automatic download to Zotero & Mendeley
Print