Visible to the public Highly Available, Self-Defending, and Malicious Fault-Tolerant Systems for Automotive Cybersecurity

TitleHighly Available, Self-Defending, and Malicious Fault-Tolerant Systems for Automotive Cybersecurity
Publication TypeConference Paper
Year of Publication2019
AuthorsLiem, Clifford, Murdock, Dan, Williams, Andrew, Soukup, Martin
Conference Name2019 IEEE 19th International Conference on Software Quality, Reliability and Security Companion (QRS-C)
Keywordsautomobiles, automotive cybersecurity, Automotive engineering, brand degradation, cars, cloud computing, composability, computer security, electronic features, Fault tolerance, Fault tolerant systems, fraud, highly available systems, integrity verification, intrusion tolerance, malicious attacks, malicious fault-tolerance, malicious fault-tolerant systems, Monitoring, pubcrawl, Resiliency, road safety, road-side equipment, Safety, security of data, self-defending techniques, self-defending technologies, self-healing systems, self-repair, single protection technique, smart phones, smartphones, software fault tolerance, system-level integrity, traffic engineering computing, warranty fraud
AbstractWith the growing number of electronic features in cars and their connections to the cloud, smartphones, road-side equipment, and neighboring cars the need for effective cybersecurity is paramount. Beyond the concern of brand degradation, warranty fraud, and recalls, what keeps manufacturers up at night is the threat of malicious attacks which can affect the safety of vehicles on the road. Would any single protection technique provide the security needed over the long lifetime of a vehicle? We present a new methodology for automotive cybersecurity where the designs are made to withstand attacks in the future based on the concepts of high availability and malicious fault-tolerance through self-defending techniques. When a system has an intrusion, self-defending technologies work to contain the breach using integrity verification, self-healing, and fail-over techniques to keep the system running.
Citation Keyliem_highly_2019