Securing Safety Critical Automotive Systems
dc.contributor.author | Nasser, Ahmad | |
dc.contributor.advisor | Ma, Di | |
dc.date.accessioned | 2019-12-03T18:36:36Z | |
dc.date.available | 2019-12-06T16:09:27Z | en |
dc.date.issued | 2019-08-23 | |
dc.date.submitted | 2019-06-12 | |
dc.identifier.uri | https://hdl.handle.net/2027.42/152321 | |
dc.description.abstract | In recent years, several attacks were successfully demonstrated against automotive safety systems. The advancement towards driver assistance, autonomous driving, and rich connectivity make it impossible for automakers to ignore security. However, automotive systems face several unique challenges that make security adoption a rather slow and painful process. Challenges with safety and security co-engineering, the inertia of legacy software, real-time processing, and memory constraints, along with resistance to costly security countermeasures, are all factors that must be considered when proposing security solutions for automotive systems. In this work, we aim to address those challenges by answering the next questions. What is the right safety security co-engineering approach that would be suitable for automotive safety systems? Does AUTOSAR, the most popular automotive software platform, contain security gaps and how can they be addressed? Can an embedded HSM be leveraged as a security monitor to stop common attacks and maintain system safety? When an attack is detected, what is the proper response that harmonizes the security reaction with the safety constraints? And finally, can trust be established in a safety-critical system without violating its strict startup timing requirements? We start with a qualitative analysis of the safety and security co-engineering problem to derive the safety-driven approach to security. We then apply the approach to the AUTOSAR classic platform to uncover security gaps. Using a real automotive hardware environment, we construct security attacks against AUTOSAR and evaluate countermeasures. We then propose an HSM based security monitoring system and apply it against the popular CAN masquerading attack. Finally, we turn to the trust establishment problem in constrained devices and offer an accelerated secure boot method to improve the availability time by several factors. Overall, the security techniques and countermeasures presented in this work improve the security resilience of safety-critical automotive systems to enable future technologies that require strong security foundations. Our methods and proposed solutions can be adopted by other types of Cyber-Physical Systems that are concerned with securing safety. | en_US |
dc.language.iso | en_US | en_US |
dc.subject | Automotive cyber security | en_US |
dc.subject | Hardware security module | en_US |
dc.subject | Cyber physical systems | en_US |
dc.subject | Automotive safety | en_US |
dc.subject | Security monitoring | en_US |
dc.subject | Secure boot acceleration | en_US |
dc.subject.other | Computer and Information Science | en_US |
dc.title | Securing Safety Critical Automotive Systems | en_US |
dc.type | Thesis | en_US |
dc.description.thesisdegreename | PhD | en_US |
dc.description.thesisdegreediscipline | College of Engineering & Computer Science | en_US |
dc.description.thesisdegreegrantor | University of Michigan-Dearborn | en_US |
dc.contributor.committeemember | Guo, Jinhua | |
dc.contributor.committeemember | Jia, Bochen | |
dc.contributor.committeemember | Medjahed, Brahim | |
dc.identifier.uniqname | 7732 1253 | en_US |
dc.description.bitstreamurl | https://deepblue.lib.umich.edu/bitstream/2027.42/152321/1/Ahmad Nasser Final Thesis (1).pdf | |
dc.identifier.orcid | 0000-0001-8318-7082 | en_US |
dc.description.filedescription | Description of Ahmad Nasser Final Thesis (1).pdf : Dissertation | |
dc.identifier.name-orcid | Nasser, Ahmad; 0000-0001-8318-7082 | en_US |
dc.owningcollname | Dissertations and Theses (Ph.D. and Master's) |
Files in this item
Remediation of Harmful Language
The University of Michigan Library aims to describe its collections in a way that respects the people and communities who create, use, and are represented in them. We encourage you to Contact Us anonymously if you encounter harmful or problematic language in catalog records or finding aids. More information about our policies and practices is available at Remediation of Harmful Language.
Accessibility
If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.