Show simple item record

Securing Safety Critical Automotive Systems

dc.contributor.authorNasser, Ahmad
dc.contributor.advisorMa, Di
dc.date.accessioned2019-12-03T18:36:36Z
dc.date.available2019-12-06T16:09:27Zen
dc.date.issued2019-08-23
dc.date.submitted2019-06-12
dc.identifier.urihttps://hdl.handle.net/2027.42/152321
dc.description.abstractIn recent years, several attacks were successfully demonstrated against automotive safety systems. The advancement towards driver assistance, autonomous driving, and rich connectivity make it impossible for automakers to ignore security. However, automotive systems face several unique challenges that make security adoption a rather slow and painful process. Challenges with safety and security co-engineering, the inertia of legacy software, real-time processing, and memory constraints, along with resistance to costly security countermeasures, are all factors that must be considered when proposing security solutions for automotive systems. In this work, we aim to address those challenges by answering the next questions. What is the right safety security co-engineering approach that would be suitable for automotive safety systems? Does AUTOSAR, the most popular automotive software platform, contain security gaps and how can they be addressed? Can an embedded HSM be leveraged as a security monitor to stop common attacks and maintain system safety? When an attack is detected, what is the proper response that harmonizes the security reaction with the safety constraints? And finally, can trust be established in a safety-critical system without violating its strict startup timing requirements? We start with a qualitative analysis of the safety and security co-engineering problem to derive the safety-driven approach to security. We then apply the approach to the AUTOSAR classic platform to uncover security gaps. Using a real automotive hardware environment, we construct security attacks against AUTOSAR and evaluate countermeasures. We then propose an HSM based security monitoring system and apply it against the popular CAN masquerading attack. Finally, we turn to the trust establishment problem in constrained devices and offer an accelerated secure boot method to improve the availability time by several factors. Overall, the security techniques and countermeasures presented in this work improve the security resilience of safety-critical automotive systems to enable future technologies that require strong security foundations. Our methods and proposed solutions can be adopted by other types of Cyber-Physical Systems that are concerned with securing safety.en_US
dc.language.isoen_USen_US
dc.subjectAutomotive cyber securityen_US
dc.subjectHardware security moduleen_US
dc.subjectCyber physical systemsen_US
dc.subjectAutomotive safetyen_US
dc.subjectSecurity monitoringen_US
dc.subjectSecure boot accelerationen_US
dc.subject.otherComputer and Information Scienceen_US
dc.titleSecuring Safety Critical Automotive Systemsen_US
dc.typeThesisen_US
dc.description.thesisdegreenamePhDen_US
dc.description.thesisdegreedisciplineCollege of Engineering & Computer Scienceen_US
dc.description.thesisdegreegrantorUniversity of Michigan-Dearbornen_US
dc.contributor.committeememberGuo, Jinhua
dc.contributor.committeememberJia, Bochen
dc.contributor.committeememberMedjahed, Brahim
dc.identifier.uniqname7732 1253en_US
dc.description.bitstreamurlhttps://deepblue.lib.umich.edu/bitstream/2027.42/152321/1/Ahmad Nasser Final Thesis (1).pdf
dc.identifier.orcid0000-0001-8318-7082en_US
dc.description.filedescriptionDescription of Ahmad Nasser Final Thesis (1).pdf : Dissertation
dc.identifier.name-orcidNasser, Ahmad; 0000-0001-8318-7082en_US
dc.owningcollnameDissertations and Theses (Ph.D. and Master's)


Files in this item

Show simple item record

Remediation of Harmful Language

The University of Michigan Library aims to describe library materials in a way that respects the people and communities who create, use, and are represented in our collections. Report harmful or offensive language in catalog records, finding aids, or elsewhere in our collections anonymously through our metadata feedback form. More information at Remediation of Harmful Language.

Accessibility

If you are unable to use this file in its current format, please select the Contact Us link and we can modify it to make it more accessible to you.