Item type |
Symposium(1) |
公開日 |
2014-10-15 |
タイトル |
|
|
タイトル |
Analysis of Performing Secure Remote Vehicle Diagnostics |
タイトル |
|
|
言語 |
en |
|
タイトル |
Analysis of Performing Secure Remote Vehicle Diagnostics |
言語 |
|
|
言語 |
eng |
キーワード |
|
|
主題Scheme |
Other |
|
主題 |
Vehicle diagnostics,remote diagnostics,security,diagnostics services |
資源タイプ |
|
|
資源タイプ識別子 |
http://purl.org/coar/resource_type/c_5794 |
|
資源タイプ |
conference paper |
著者所属 |
|
|
|
ETAS K.K. |
著者所属 |
|
|
|
ETAS K.K. |
著者所属 |
|
|
|
ESCRYPT GmbH |
著者所属 |
|
|
|
ETAS K.K. |
著者所属(英) |
|
|
|
en |
|
|
ETAS K.K. |
著者所属(英) |
|
|
|
en |
|
|
ETAS K.K. |
著者所属(英) |
|
|
|
en |
|
|
ESCRYPT GmbH |
著者所属(英) |
|
|
|
en |
|
|
ETAS K.K. |
著者名 |
DennisKengoOka
Takahiro, Furue
Stephanie, Bayer
Camille, Vuillaume
|
著者名(英) |
Dennis, KengoOka
Takahiro, Furue
Stephanie, Bayer
Camille, Vuillaume
|
論文抄録 |
|
|
内容記述タイプ |
Other |
|
内容記述 |
Traditionally, diagnostics of vehicles is done by plugging a physical device into a diagnostics interface in the vehicle; however, over the last years OEMs are considering to perform remote diagnostics. But connecting remotely to a vehicle opens a new entrypoint for attackers. Hence, it is important to secure the remote diagnostics procedure. We first provide an analysis of the security properties for remote diagnostics; this is done by giving a short overview over possible attacks. Next, we analyze and group diagnostic services and specify whether they are possible or suitable to be performed remotely. Last, we identify relevant security properties for each of the suitable diagnostic service groups. |
論文抄録(英) |
|
|
内容記述タイプ |
Other |
|
内容記述 |
Traditionally, diagnostics of vehicles is done by plugging a physical device into a diagnostics interface in the vehicle; however, over the last years OEMs are considering to perform remote diagnostics. But connecting remotely to a vehicle opens a new entrypoint for attackers. Hence, it is important to secure the remote diagnostics procedure. We first provide an analysis of the security properties for remote diagnostics; this is done by giving a short overview over possible attacks. Next, we analyze and group diagnostic services and specify whether they are possible or suitable to be performed remotely. Last, we identify relevant security properties for each of the suitable diagnostic service groups. |
書誌情報 |
コンピュータセキュリティシンポジウム2014論文集
巻 2014,
号 2,
p. 643-650,
発行日 2014-10-15
|
出版者 |
|
|
言語 |
ja |
|
出版者 |
情報処理学会 |