Cyber-physical systems security: a systematic mapping study

YZ Lun, A D'Innocenzo, I Malavolta… - arXiv preprint arXiv …, 2016 - arxiv.org
Cyber-physical systems are integrations of computation, networking, and physical
processes. Due to the tight cyber-physical coupling and to the potentially disrupting …

Secure over-the-air software updates in connected vehicles: A survey

S Halder, A Ghosal, M Conti - Computer Networks, 2020 - Elsevier
Current trends forecast that Over-the-Air (OTA) software updates will be highly significant for
future connected vehicles. The OTA update will enable upgrading the vehicle functionalities …

Secure ota software updates in connected vehicles: A survey

S Halder, A Ghosal, M Conti - arXiv preprint arXiv:1904.00685, 2019 - arxiv.org
This survey highlights and discusses remote OTA software updates in the automotive sector,
mainly from the security perspective. In particular, the major objective of this survey is to …

SAVTA: A hybrid vehicular threat model: Overview and case study

M Hamad, V Prevelakis - Information, 2020 - mdpi.com
In recent years, significant developments were introduced within the vehicular domain,
evolving the vehicles to become a network of many embedded systems which depend on a …

Secure automotive gateway—Secure communication for future cars

S Seifert, R Obermaisser - 2014 12th IEEE International …, 2014 - ieeexplore.ieee.org
The main focus of the paper is to secure the onboard communication of automobiles. The
current trend in the automotive domain is to incorporate technologies known from the …

An Overview of Cyber Attacks and Defenses on Intelligent Connected Vehicles

NMI Chowdhury, MA Hoque, R Hasan - Computer and Information Security …, 2025 - Elsevier
Our world is evolving into a landscape of smart cities, with intelligent connected vehicles
(ICVs) occupying a central role in the paradigm of smart mobility. To ensure road safety …

[PDF][PDF] Towards comprehensive threat modeling for vehicles

M Hamad, M Nolte, V Prevelakis - the 1st Workshop on Security …, 2016 - researchgate.net
Over the past few years, significant developments were introduced within the vehicular
domain. The modern vehicle becomes a network of dozens of embedded systems which …

Using architecture to reason about information security

S Chong, RVD Meyden - ACM Transactions on Information and System …, 2015 - dl.acm.org
We demonstrate, by a number of examples, that information flow security properties can be
proved from abstract architectural descriptions, which describe only the causal structure of a …

Security problems and attacks on smart cars

Ş Okul, MA Aydin, F Keleş - … Conference: Proceedings of the ITelCon 2017 …, 2019 - Springer
This study provides information about smart cars and some of the technologies and
researches on smart cars. It then describes the modeling of security attacks in smart cars in …

Experimental evaluation of cryptography overhead in automotive safety-critical communication

EAS Junior, PF de Araujo-Filho… - 2018 IEEE 87th …, 2018 - ieeexplore.ieee.org
In this paper, cryptographic schemes are applied to Ethernet-based layer-2 communication
to provide authenticated encryption to safety-critical automotive control data. Confidentiality …