A connected and autonomous vehicle reference architecture for attack surface analysis

C Maple, M Bradbury, AT Le, K Ghirardello - Applied Sciences, 2019 - mdpi.com
Featured Application The reference architecture presented is to be instantiated with different
components which is then used to analyse the attack surface of those components. Abstract …

A survey on security attacks and defense techniques for connected and autonomous vehicles

M Pham, K Xiong - Computers & Security, 2021 - Elsevier
Autonomous Vehicle has been transforming intelligent transportation systems. As
telecommunication technology improves, autonomous vehicles are getting connected to …

Sara: Security automotive risk analysis method

JP Monteuuis, A Boudguiga, J Zhang… - Proceedings of the 4th …, 2018 - dl.acm.org
Connected and automated vehicles aim to improve the comfort and the safety of the driver
and passengers. To this end, car manufacturers continually improve actual standardized …

[HTML][HTML] ThreatSurf: A method for automated Threat Surface assessment in automotive cybersecurity engineering

D Zelle, C Plappert, R Rieke, D Scheuermann… - Microprocessors and …, 2022 - Elsevier
Connected smart cars enable new attacks that may have serious consequences. Thus, the
development of new cars must follow a cybersecurity engineering process including a …

VeRA: A simplified security risk analysis method for autonomous vehicles

J Cui, B Zhang - IEEE Transactions on Vehicular Technology, 2020 - ieeexplore.ieee.org
Risk analysis/assessment is an indispensable process during the design and development
of Autonomous Vehicles (AVs), which is in charge of evaluating whether the risk of an attack …

A benchmarking framework for cyber-attacks on autonomous vehicles

A Khadka, P Karypidis, A Lytos… - Transportation research …, 2021 - Elsevier
In this paper, a novel framework for a benchmark system for autonomous vehicles focusing
on their security and reliability is proposed. Computer vision and networking technologies …

[HTML][HTML] VehicleLang: A probabilistic modeling and simulation language for modern vehicle IT infrastructures

S Katsikeas, P Johnsson, S Hacks, R Lagerström - Computers & Security, 2022 - Elsevier
Attack simulations are a feasible means of assessing the cyber security of various systems.
Simulations can replicate the steps taken by an attacker to compromise sensitive system …

Revisiting automotive attack surfaces: a practitioners' perspective

P Jing, Z Cai, Y Cao, L Yu, Y Du… - … IEEE Symposium on …, 2024 - ieeexplore.ieee.org
As modern vehicles become increasingly complex in terms of both external attack surfaces
and internal in-vehicle network (IVN) topology, ensuring their cybersecurity remains a …

Machine learning-based detection for cyber security attacks on connected and autonomous vehicles

Q He, X Meng, R Qu, R Xi - Mathematics, 2020 - mdpi.com
Connected and Autonomous Vehicle (CAV)-related initiatives have become some of the
fastest expanding in recent years, and have started to affect the daily lives of people. More …

A survey on attack detection and resilience for connected and automated vehicles: From vehicle dynamics and control perspective

Z Ju, H Zhang, X Li, X Chen, J Han… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recent advances in attack/anomaly detection and resilience strategies for connected and
automated vehicles (CAVs) are reviewed from vehicle dynamics and control perspective …