Tomas Olovsson
YOU?
Author Swipe
View article: The Automotive BlackBox: Towards a Standardization of Automotive Digital Forensics
The Automotive BlackBox: Towards a Standardization of Automotive Digital Forensics Open
There is a trend toward increased cyberattacks on vehicles. Aligned, forensics requirements and standards are emerging. Digital forensics refers to identifying, preserving, verifying, analyzing, documenting, and finally presenting digital …
View article: Gap Analysis of ISO/SAE 21434 – Improving the Automotive Cybersecurity Engineering Life Cycle
Gap Analysis of ISO/SAE 21434 – Improving the Automotive Cybersecurity Engineering Life Cycle Open
Due to the ongoing legislative shift towards mandatedcybersecurity for road vehicles, the automotive cybersecurityengineering standard ISO/SAE 21434 is seeing fastadoption throughout the industry. Early efforts are focusing onthreat analys…
View article: Secure Vehicle Software Updates: Requirements for a Reference Architecture
Secure Vehicle Software Updates: Requirements for a Reference Architecture Open
A modern vehicle is no longer merely a transportation vessel. It has become a complex cyber-physical system containing over 100M lines of software code controlling various functionalities such as safety-critical steering, brake, and engine…
View article: A Systematic Literature Review on Automotive Digital Forensics: Challenges, Technical Solutions and Data Collection
A Systematic Literature Review on Automotive Digital Forensics: Challenges, Technical Solutions and Data Collection Open
A modern vehicle has a complex internal architecture and is wirelessly connected to the Internet, other vehicles, and the infrastructure. The risk of cyber attacks and other criminal incidents along with recent road accidents caused by aut…
View article: Proposing HEAVENS 2.0 – an automotive risk assessment model
Proposing HEAVENS 2.0 – an automotive risk assessment model Open
Risk-based security models have seen a steady rise in popularity over the last decades, and several security risk assessment models have been proposed for the automotive industry. The new UN vehicle regulation 155 on cybersecurity provisio…
View article: V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems
V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems Open
Vehicles have become connected in many ways. They communicate with the cloud and will use Vehicle-to-Everything (V2X) communication to exchange warning messages and perform cooperative actions such as platooning. Vehicles have already been…
View article: Resilient Shield: Reinforcing the Resilience of Vehicles Against Security Threats
Resilient Shield: Reinforcing the Resilience of Vehicles Against Security Threats Open
Vehicles have become complex computer systems with multiple communication interfaces. In the future, vehicles will have even more connections to e.g., infrastructure, pedestrian smartphones, cloud, road-side-units and the Internet. Externa…
View article: Spectra
Spectra Open
Nowadays, vehicles have complex in-vehicle networks that have recently been shown to be increasingly vulnerable to cyber-attacks capable of taking control of the vehicles, thereby threatening the safety of the passengers. Several counterme…
View article: UniSUF: a unified software update framework for vehicles utilizing isolation techniques and trusted execution environments
UniSUF: a unified software update framework for vehicles utilizing isolation techniques and trusted execution environments Open
Today’s vehicles depend more and more on software, and can contain over 100M lines of code controlling many safety-critical functions, such as steering and brakes. Increased complexity in software inherently increases the number of bugs af…
View article: REMIND: A Framework for the Resilient Design of Automotive Systems
REMIND: A Framework for the Resilient Design of Automotive Systems Open
In the past years, great effort has been spent on enhancing the security and safety of vehicular systems. Current advances in information and communication technology have increased the complexity of these systems and lead to extended func…
View article: Extending AUTOSAR's Counter-Based Solution for Freshness of Authenticated Messages in Vehicles
Extending AUTOSAR's Counter-Based Solution for Freshness of Authenticated Messages in Vehicles Open
Nowadays vehicles have an internal network consisting of more than 100 microcontrollers, so-called Electronic Control Units (ECUs), which control core functionalities, active safety, diagnostics, comfort and infotainment. The Controller Ar…
View article: CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks
CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks Open
Nowadays, vehicles have complex in-vehicle networks (IVNs) with millions of lines of code controlling almost every function in the vehicle including safety-critical functions. It has recently been shown that IVNs are becoming increasingly …
View article: A Preliminary Security Assessment of 5G V2X
A Preliminary Security Assessment of 5G V2X Open
Research on intelligent transport systems (ITS) for improved traffic safety and efficiency has reached a high level of maturity and first applications will hit the market in 2019. Since 2004, the wireless standard 802.11p has been develope…
View article: Joint Subjective and Objective Data Capture and Analytics for Automotive Applications
Joint Subjective and Objective Data Capture and Analytics for Automotive Applications Open
In this paper we describe a novel technological framework for capture and analysis of both objective measurement data and subjective user experience data for automotive applications. We also investigate how the framework can be extended to…
View article: In-Vehicle CAN Message Authentication: An Evaluation Based on Industrial Criteria
In-Vehicle CAN Message Authentication: An Evaluation Based on Industrial Criteria Open
Vehicles have evolved from mostly mechanical machines into devices controlled by an internal computer network consisting of more than 100 interconnected Electronic Control Units (ECUs). Moreover, modern vehicles communicate with external d…
View article: Introducing Differential Privacy to the Automotive Domain: Opportunities and Challenges
Introducing Differential Privacy to the Automotive Domain: Opportunities and Challenges Open
Privacy research is attracting increasingly more attention, especially with the upcoming general data protection regulation (GDPR) which will impose stricter rules on storing and managing personally identifiable information (PII) in Europe…
View article: Security and privacy for big data: A systematic literature review
Security and privacy for big data: A systematic literature review Open
Big data is currently a hot research topic, with four million hits on Google scholar in October 2016. One reason for the popularity of big data research is the knowledge that can be extracted from analyzing these large data sets. However, …
View article: A Risk Assessment Framework for Automotive Embedded Systems
A Risk Assessment Framework for Automotive Embedded Systems Open
The automotive industry is experiencing a paradigm shift towards autonomous and connected vehicles. Coupled with the increasing usage and complexity of electrical and/or electronic systems, this introduces new safety and security risks. En…