Search for dissertations about: "vehicle security systems"

Showing result 1 - 5 of 33 swedish dissertations containing the words vehicle security systems.

  1. 1. Automotive Communication Security Methods and Recommendations for Securing In-vehicle and V2X Communications

    Author : Nasser Nowdehi; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; V2X; security; automotive; vehicular communication; in-vehicle network;

    Abstract : Today’s vehicles contain approximately more than 100 interconnected computers (ECUs), several of which will be connected to the Internet or external devices and networks around the vehicle. In the near future vehicles will extensively communicate with their environment via Vehicle to Vehicle (V2V) and Vehicle to Infrastructure (V2I), together called V2X communications. READ MORE

  2. 2. On the Secure and Resilient Design of Connected Vehicles: Methods and Guidelines

    Author : Thomas Rosenstatter; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; security; secure communication; V2X; cyber-physical systems; resilience; in-vehicle network; automotive;

    Abstract : Vehicles have come a long way from being purely mechanical systems to systems that consist of an internal network of more than 100 microcontrollers and systems that communicate with external entities, such as other vehicles, road infrastructure, the manufacturer’s cloud and external applications. This combination of resource constraints, safety-criticality, large attack surface and the fact that millions of people own and use them each day, makes securing vehicles particularly challenging as security practices and methods need to be tailored to meet these requirements. READ MORE

  3. 3. On Securing Vehicular Communications: Methods and Recommendations for Secure In-vehicle and Car2X Communications

    Author : Nasser Nowdehi; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; V2X; in-vehicle network; vehicular communication; security; ETSI;

    Abstract : Today's vehicles contain approximately more than 100 interconnected computers (ECUs), several of which will be connected to the Internet or external devices and networks around the vehicle. In the near future vehicles will extensively communicate with their environment via Vehicle to Vehicle and Vehicle to Infrastructure (together called V2X) communications. READ MORE

  4. 4. On Cyber-Security for In-Vehicle Software

    Author : Aljoscha Lautenbach; Chalmers tekniska högskola; []
    Keywords : TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Vehicular Security; Memory Protection; Automotive Security; Memory Exploitation; In-Vehicle Network; Risk Assessment; CAN authentication; Secure Software Development;

    Abstract : We live in a highly connected world, which brings many opportunities, but which also makes us vulnerable to attacks. Security in regular IT systems, such as desktop and server systems, has decades of active research behind it, whereas security in the automotive domain is still a relatively new topic. READ MORE

  5. 5. Security Analysis of Web and Embedded Applications

    Author : Benjamin Eriksson; Chalmers tekniska högskola; []
    Keywords : NATURVETENSKAP; NATURAL SCIENCES; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; TEKNIK OCH TEKNOLOGIER; ENGINEERING AND TECHNOLOGY; Web application scanning; Content Security Policy; Vulnerabilities; Android Automotive;

    Abstract : As we put more trust in the computer systems we use the need for security is increasing. And while security features like HTTPS are becoming commonplace on the web, securing applications remains dicult. This thesis focuses on analyzing dierent computer ecosystems to detect vulnerabilities and develop countermeasures. READ MORE