Automotive cybersecurity engineering handbook: the automotive engineer's roadmap to cyber-resilient vehicles
Accelerate your journey of securing safety-critical automotive systems through practical and standard-compliant methods Key Features Understand how automotive systems can become vulnerable to cyberattacks Apply security controls to all vehicle layers for mitigating cybersecurity risks Find out how s...
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Birmingham ; Mumbai
Packt Publishing
October 2023
|
Ausgabe: | 1st edition |
Schlagworte: | |
Online-Zugang: | DE-1050 |
Zusammenfassung: | Accelerate your journey of securing safety-critical automotive systems through practical and standard-compliant methods Key Features Understand how automotive systems can become vulnerable to cyberattacks Apply security controls to all vehicle layers for mitigating cybersecurity risks Find out how systematic secure engineering mitigates cyber risks while ensuring compliance Purchase of the print or Kindle book includes a free PDF eBook Book Description Replete with exciting challenges, automotive cybersecurity is an emerging domain, and cybersecurity is a foundational enabler for current and future connected vehicle features. This book addresses the severe talent shortage faced by the industry in meeting the demand for building cyber-resilient systems by consolidating practical topics on securing automotive systems to help automotive engineers gain a competitive edge. |
Beschreibung: | Includes index |
Beschreibung: | 1 Online-Ressource (xx, 371 Seiten) |
ISBN: | 9781801072632 |
Internformat
MARC
LEADER | 00000nmm a2200000 c 4500 | ||
---|---|---|---|
001 | BV049774234 | ||
003 | DE-604 | ||
007 | cr|uuu---uuuuu | ||
008 | 240709s2023 |||| o||u| ||||||eng d | ||
020 | |a 9781801072632 |9 978-1-80107-263-2 | ||
035 | |a (OCoLC)1446257932 | ||
035 | |a (DE-599)BVBBV049774234 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-1050 | ||
084 | |a ZO 4250 |0 (DE-625)157719: |2 rvk | ||
100 | 1 | |a Nasser, Ahmad MK |e Verfasser |4 aut | |
245 | 1 | 0 | |a Automotive cybersecurity engineering handbook |b the automotive engineer's roadmap to cyber-resilient vehicles |c Dr. Ahmad MK Nasser |
250 | |a 1st edition | ||
264 | 1 | |a Birmingham ; Mumbai |b Packt Publishing |c October 2023 | |
300 | |a 1 Online-Ressource (xx, 371 Seiten) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes index | ||
505 | 8 | |a Cover -- Title Page -- Copyright and Credit -- Dedicated -- Table of Contents -- Preface -- Part 1: Understanding the Cybersecurity Relevance of the Vehicle Electrical Architecture -- Chapter 1: Introducing the Vehicle Electrical/Electronic Architecture -- Overview of the basic building blocks of the E/E architecture -- Electronic control units -- Looking at MCU-based ECUs -- Looking at SoC-based ECUs -- Looking inside the MCU and SoC software layers -- ECU domains -- Fuel-based powertrain domain -- Electric drive powertrain domain -- Chassis safety control domain -- Interior cabin domain | |
505 | 8 | |a Infotainment and connectivity domain -- Cross-domain -- Exploring the in-vehicle network -- CAN -- FlexRay -- LIN -- UART -- SENT -- GMSL -- I2C -- Ethernet -- J1939 -- Sensors and actuators -- Sensor types -- Actuators -- Exploring the vehicle architecture types -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Zone architecture -- Commercial truck architecture types -- Summary -- Answers to discussion points -- Further reading -- Chapter 2: Cybersecurity Basics for Automotive Use Cases -- Exploring the attack classes -- Passive attacks -- Active attacks | |
505 | 8 | |a Identifying security objectives -- Integrity -- Authenticity -- Confidentiality -- Accountability -- Availability -- Cryptography applied to automotive use cases -- Building blocks -- One-way hash functions -- Message authentication code algorithms -- Random number generators -- Public key cryptography -- Key management -- NIST defined security strength -- Chinese cryptography -- PQC algorithms -- Security principles -- Defense in depth -- Domain separation -- Least privilege -- Least sharing -- Mediated access -- Protective defaults -- Anomaly detection -- Distributed privilege | |
505 | 8 | |a Hierarchical protection and zero trust -- Minimal trusted elements -- Least persistence -- Protective failure -- Continuous protection -- Redundancy -- Use of standardized cryptography -- Summary -- Further reading -- Chapter 3: Threat Landscape against Vehicle Components -- Threats against external vehicle interfaces -- Backend-related threats -- Connectivity threats -- Threats against the E/E topology -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Central vehicle computer architecture -- Threats against in-vehicle networks -- CAN -- FlexRay -- Ethernet | |
505 | 8 | |a The Unified Diagnostic Services (UDS) protocol -- SAE J1939 protocols -- SAE J2497 (PLC4TRUCKS) -- Threats against sensors -- Common ECU threats -- Debug ports -- Flash programming -- Power and mode manipulation -- Tampering with machine learning algorithms -- Software attacks -- Disclosure and tampering of cryptographic keys -- Summary -- References -- Part 2: Understanding the Secure Engineering Development Process -- Chapter 4: Exploring the Landscape of Automotive Cybersecurity Standards -- Primary standards -- UNECE WP.29 -- Chinese regulation and standardization -- Secondary standards | |
520 | |a Accelerate your journey of securing safety-critical automotive systems through practical and standard-compliant methods Key Features Understand how automotive systems can become vulnerable to cyberattacks Apply security controls to all vehicle layers for mitigating cybersecurity risks Find out how systematic secure engineering mitigates cyber risks while ensuring compliance Purchase of the print or Kindle book includes a free PDF eBook Book Description Replete with exciting challenges, automotive cybersecurity is an emerging domain, and cybersecurity is a foundational enabler for current and future connected vehicle features. This book addresses the severe talent shortage faced by the industry in meeting the demand for building cyber-resilient systems by consolidating practical topics on securing automotive systems to help automotive engineers gain a competitive edge. | ||
650 | 4 | |a Automotive computers / Security measures | |
650 | 4 | |a Automobile industry and trade / Technological innovations | |
650 | 4 | |a Automated vehicles | |
650 | 4 | |a Ordinateurs de bord / Sécurité / Mesures | |
650 | 4 | |a Automobiles / Industrie et commerce / Innovations | |
650 | 4 | |a Véhicules autonomes | |
650 | 7 | |a Automated vehicles |2 fast | |
650 | 7 | |a Automobile industry and trade / Technological innovations |2 fast | |
650 | 0 | 7 | |a Kraftfahrzeugindustrie |0 (DE-588)4032690-1 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Computersicherheit |0 (DE-588)4274324-2 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Computersicherheit |0 (DE-588)4274324-2 |D s |
689 | 0 | 1 | |a Kraftfahrzeugindustrie |0 (DE-588)4032690-1 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 978-1-80107-653-1 |
912 | |a ZDB-30-PQE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-035115351 | |
966 | e | |u https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=30973271 |l DE-1050 |p ZDB-30-PQE |q FHD01_PQE_Kauf |x Aggregator |3 Volltext |
Datensatz im Suchindex
_version_ | 1814902745527746560 |
---|---|
adam_text | |
any_adam_object | |
author | Nasser, Ahmad MK |
author_facet | Nasser, Ahmad MK |
author_role | aut |
author_sort | Nasser, Ahmad MK |
author_variant | a m n am amn |
building | Verbundindex |
bvnumber | BV049774234 |
classification_rvk | ZO 4250 |
collection | ZDB-30-PQE |
contents | Cover -- Title Page -- Copyright and Credit -- Dedicated -- Table of Contents -- Preface -- Part 1: Understanding the Cybersecurity Relevance of the Vehicle Electrical Architecture -- Chapter 1: Introducing the Vehicle Electrical/Electronic Architecture -- Overview of the basic building blocks of the E/E architecture -- Electronic control units -- Looking at MCU-based ECUs -- Looking at SoC-based ECUs -- Looking inside the MCU and SoC software layers -- ECU domains -- Fuel-based powertrain domain -- Electric drive powertrain domain -- Chassis safety control domain -- Interior cabin domain Infotainment and connectivity domain -- Cross-domain -- Exploring the in-vehicle network -- CAN -- FlexRay -- LIN -- UART -- SENT -- GMSL -- I2C -- Ethernet -- J1939 -- Sensors and actuators -- Sensor types -- Actuators -- Exploring the vehicle architecture types -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Zone architecture -- Commercial truck architecture types -- Summary -- Answers to discussion points -- Further reading -- Chapter 2: Cybersecurity Basics for Automotive Use Cases -- Exploring the attack classes -- Passive attacks -- Active attacks Identifying security objectives -- Integrity -- Authenticity -- Confidentiality -- Accountability -- Availability -- Cryptography applied to automotive use cases -- Building blocks -- One-way hash functions -- Message authentication code algorithms -- Random number generators -- Public key cryptography -- Key management -- NIST defined security strength -- Chinese cryptography -- PQC algorithms -- Security principles -- Defense in depth -- Domain separation -- Least privilege -- Least sharing -- Mediated access -- Protective defaults -- Anomaly detection -- Distributed privilege Hierarchical protection and zero trust -- Minimal trusted elements -- Least persistence -- Protective failure -- Continuous protection -- Redundancy -- Use of standardized cryptography -- Summary -- Further reading -- Chapter 3: Threat Landscape against Vehicle Components -- Threats against external vehicle interfaces -- Backend-related threats -- Connectivity threats -- Threats against the E/E topology -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Central vehicle computer architecture -- Threats against in-vehicle networks -- CAN -- FlexRay -- Ethernet The Unified Diagnostic Services (UDS) protocol -- SAE J1939 protocols -- SAE J2497 (PLC4TRUCKS) -- Threats against sensors -- Common ECU threats -- Debug ports -- Flash programming -- Power and mode manipulation -- Tampering with machine learning algorithms -- Software attacks -- Disclosure and tampering of cryptographic keys -- Summary -- References -- Part 2: Understanding the Secure Engineering Development Process -- Chapter 4: Exploring the Landscape of Automotive Cybersecurity Standards -- Primary standards -- UNECE WP.29 -- Chinese regulation and standardization -- Secondary standards |
ctrlnum | (OCoLC)1446257932 (DE-599)BVBBV049774234 |
discipline | Verkehr / Transport |
edition | 1st edition |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>00000nmm a2200000 c 4500</leader><controlfield tag="001">BV049774234</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">240709s2023 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781801072632</subfield><subfield code="9">978-1-80107-263-2</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1446257932</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV049774234</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ZO 4250</subfield><subfield code="0">(DE-625)157719:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Nasser, Ahmad MK</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Automotive cybersecurity engineering handbook</subfield><subfield code="b">the automotive engineer's roadmap to cyber-resilient vehicles</subfield><subfield code="c">Dr. Ahmad MK Nasser</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">1st edition</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Birmingham ; Mumbai</subfield><subfield code="b">Packt Publishing</subfield><subfield code="c">October 2023</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xx, 371 Seiten)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes index</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Cover -- Title Page -- Copyright and Credit -- Dedicated -- Table of Contents -- Preface -- Part 1: Understanding the Cybersecurity Relevance of the Vehicle Electrical Architecture -- Chapter 1: Introducing the Vehicle Electrical/Electronic Architecture -- Overview of the basic building blocks of the E/E architecture -- Electronic control units -- Looking at MCU-based ECUs -- Looking at SoC-based ECUs -- Looking inside the MCU and SoC software layers -- ECU domains -- Fuel-based powertrain domain -- Electric drive powertrain domain -- Chassis safety control domain -- Interior cabin domain</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Infotainment and connectivity domain -- Cross-domain -- Exploring the in-vehicle network -- CAN -- FlexRay -- LIN -- UART -- SENT -- GMSL -- I2C -- Ethernet -- J1939 -- Sensors and actuators -- Sensor types -- Actuators -- Exploring the vehicle architecture types -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Zone architecture -- Commercial truck architecture types -- Summary -- Answers to discussion points -- Further reading -- Chapter 2: Cybersecurity Basics for Automotive Use Cases -- Exploring the attack classes -- Passive attacks -- Active attacks</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Identifying security objectives -- Integrity -- Authenticity -- Confidentiality -- Accountability -- Availability -- Cryptography applied to automotive use cases -- Building blocks -- One-way hash functions -- Message authentication code algorithms -- Random number generators -- Public key cryptography -- Key management -- NIST defined security strength -- Chinese cryptography -- PQC algorithms -- Security principles -- Defense in depth -- Domain separation -- Least privilege -- Least sharing -- Mediated access -- Protective defaults -- Anomaly detection -- Distributed privilege</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">Hierarchical protection and zero trust -- Minimal trusted elements -- Least persistence -- Protective failure -- Continuous protection -- Redundancy -- Use of standardized cryptography -- Summary -- Further reading -- Chapter 3: Threat Landscape against Vehicle Components -- Threats against external vehicle interfaces -- Backend-related threats -- Connectivity threats -- Threats against the E/E topology -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Central vehicle computer architecture -- Threats against in-vehicle networks -- CAN -- FlexRay -- Ethernet</subfield></datafield><datafield tag="505" ind1="8" ind2=" "><subfield code="a">The Unified Diagnostic Services (UDS) protocol -- SAE J1939 protocols -- SAE J2497 (PLC4TRUCKS) -- Threats against sensors -- Common ECU threats -- Debug ports -- Flash programming -- Power and mode manipulation -- Tampering with machine learning algorithms -- Software attacks -- Disclosure and tampering of cryptographic keys -- Summary -- References -- Part 2: Understanding the Secure Engineering Development Process -- Chapter 4: Exploring the Landscape of Automotive Cybersecurity Standards -- Primary standards -- UNECE WP.29 -- Chinese regulation and standardization -- Secondary standards</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">Accelerate your journey of securing safety-critical automotive systems through practical and standard-compliant methods Key Features Understand how automotive systems can become vulnerable to cyberattacks Apply security controls to all vehicle layers for mitigating cybersecurity risks Find out how systematic secure engineering mitigates cyber risks while ensuring compliance Purchase of the print or Kindle book includes a free PDF eBook Book Description Replete with exciting challenges, automotive cybersecurity is an emerging domain, and cybersecurity is a foundational enabler for current and future connected vehicle features. This book addresses the severe talent shortage faced by the industry in meeting the demand for building cyber-resilient systems by consolidating practical topics on securing automotive systems to help automotive engineers gain a competitive edge.</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Automotive computers / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Automobile industry and trade / Technological innovations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Automated vehicles</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Ordinateurs de bord / Sécurité / Mesures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Automobiles / Industrie et commerce / Innovations</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Véhicules autonomes</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Automated vehicles</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Automobile industry and trade / Technological innovations</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Kraftfahrzeugindustrie</subfield><subfield code="0">(DE-588)4032690-1</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Computersicherheit</subfield><subfield code="0">(DE-588)4274324-2</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Kraftfahrzeugindustrie</subfield><subfield code="0">(DE-588)4032690-1</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">978-1-80107-653-1</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-PQE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-035115351</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://ebookcentral.proquest.com/lib/th-deggendorf/detail.action?docID=30973271</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-30-PQE</subfield><subfield code="q">FHD01_PQE_Kauf</subfield><subfield code="x">Aggregator</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV049774234 |
illustrated | Not Illustrated |
indexdate | 2024-11-05T17:02:15Z |
institution | BVB |
isbn | 9781801072632 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-035115351 |
oclc_num | 1446257932 |
open_access_boolean | |
owner | DE-1050 |
owner_facet | DE-1050 |
physical | 1 Online-Ressource (xx, 371 Seiten) |
psigel | ZDB-30-PQE ZDB-30-PQE FHD01_PQE_Kauf |
publishDate | 2023 |
publishDateSearch | 2023 |
publishDateSort | 2023 |
publisher | Packt Publishing |
record_format | marc |
spelling | Nasser, Ahmad MK Verfasser aut Automotive cybersecurity engineering handbook the automotive engineer's roadmap to cyber-resilient vehicles Dr. Ahmad MK Nasser 1st edition Birmingham ; Mumbai Packt Publishing October 2023 1 Online-Ressource (xx, 371 Seiten) txt rdacontent c rdamedia cr rdacarrier Includes index Cover -- Title Page -- Copyright and Credit -- Dedicated -- Table of Contents -- Preface -- Part 1: Understanding the Cybersecurity Relevance of the Vehicle Electrical Architecture -- Chapter 1: Introducing the Vehicle Electrical/Electronic Architecture -- Overview of the basic building blocks of the E/E architecture -- Electronic control units -- Looking at MCU-based ECUs -- Looking at SoC-based ECUs -- Looking inside the MCU and SoC software layers -- ECU domains -- Fuel-based powertrain domain -- Electric drive powertrain domain -- Chassis safety control domain -- Interior cabin domain Infotainment and connectivity domain -- Cross-domain -- Exploring the in-vehicle network -- CAN -- FlexRay -- LIN -- UART -- SENT -- GMSL -- I2C -- Ethernet -- J1939 -- Sensors and actuators -- Sensor types -- Actuators -- Exploring the vehicle architecture types -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Zone architecture -- Commercial truck architecture types -- Summary -- Answers to discussion points -- Further reading -- Chapter 2: Cybersecurity Basics for Automotive Use Cases -- Exploring the attack classes -- Passive attacks -- Active attacks Identifying security objectives -- Integrity -- Authenticity -- Confidentiality -- Accountability -- Availability -- Cryptography applied to automotive use cases -- Building blocks -- One-way hash functions -- Message authentication code algorithms -- Random number generators -- Public key cryptography -- Key management -- NIST defined security strength -- Chinese cryptography -- PQC algorithms -- Security principles -- Defense in depth -- Domain separation -- Least privilege -- Least sharing -- Mediated access -- Protective defaults -- Anomaly detection -- Distributed privilege Hierarchical protection and zero trust -- Minimal trusted elements -- Least persistence -- Protective failure -- Continuous protection -- Redundancy -- Use of standardized cryptography -- Summary -- Further reading -- Chapter 3: Threat Landscape against Vehicle Components -- Threats against external vehicle interfaces -- Backend-related threats -- Connectivity threats -- Threats against the E/E topology -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Central vehicle computer architecture -- Threats against in-vehicle networks -- CAN -- FlexRay -- Ethernet The Unified Diagnostic Services (UDS) protocol -- SAE J1939 protocols -- SAE J2497 (PLC4TRUCKS) -- Threats against sensors -- Common ECU threats -- Debug ports -- Flash programming -- Power and mode manipulation -- Tampering with machine learning algorithms -- Software attacks -- Disclosure and tampering of cryptographic keys -- Summary -- References -- Part 2: Understanding the Secure Engineering Development Process -- Chapter 4: Exploring the Landscape of Automotive Cybersecurity Standards -- Primary standards -- UNECE WP.29 -- Chinese regulation and standardization -- Secondary standards Accelerate your journey of securing safety-critical automotive systems through practical and standard-compliant methods Key Features Understand how automotive systems can become vulnerable to cyberattacks Apply security controls to all vehicle layers for mitigating cybersecurity risks Find out how systematic secure engineering mitigates cyber risks while ensuring compliance Purchase of the print or Kindle book includes a free PDF eBook Book Description Replete with exciting challenges, automotive cybersecurity is an emerging domain, and cybersecurity is a foundational enabler for current and future connected vehicle features. This book addresses the severe talent shortage faced by the industry in meeting the demand for building cyber-resilient systems by consolidating practical topics on securing automotive systems to help automotive engineers gain a competitive edge. Automotive computers / Security measures Automobile industry and trade / Technological innovations Automated vehicles Ordinateurs de bord / Sécurité / Mesures Automobiles / Industrie et commerce / Innovations Véhicules autonomes Automated vehicles fast Automobile industry and trade / Technological innovations fast Kraftfahrzeugindustrie (DE-588)4032690-1 gnd rswk-swf Computersicherheit (DE-588)4274324-2 gnd rswk-swf Computersicherheit (DE-588)4274324-2 s Kraftfahrzeugindustrie (DE-588)4032690-1 s DE-604 Erscheint auch als Druck-Ausgabe 978-1-80107-653-1 |
spellingShingle | Nasser, Ahmad MK Automotive cybersecurity engineering handbook the automotive engineer's roadmap to cyber-resilient vehicles Cover -- Title Page -- Copyright and Credit -- Dedicated -- Table of Contents -- Preface -- Part 1: Understanding the Cybersecurity Relevance of the Vehicle Electrical Architecture -- Chapter 1: Introducing the Vehicle Electrical/Electronic Architecture -- Overview of the basic building blocks of the E/E architecture -- Electronic control units -- Looking at MCU-based ECUs -- Looking at SoC-based ECUs -- Looking inside the MCU and SoC software layers -- ECU domains -- Fuel-based powertrain domain -- Electric drive powertrain domain -- Chassis safety control domain -- Interior cabin domain Infotainment and connectivity domain -- Cross-domain -- Exploring the in-vehicle network -- CAN -- FlexRay -- LIN -- UART -- SENT -- GMSL -- I2C -- Ethernet -- J1939 -- Sensors and actuators -- Sensor types -- Actuators -- Exploring the vehicle architecture types -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Zone architecture -- Commercial truck architecture types -- Summary -- Answers to discussion points -- Further reading -- Chapter 2: Cybersecurity Basics for Automotive Use Cases -- Exploring the attack classes -- Passive attacks -- Active attacks Identifying security objectives -- Integrity -- Authenticity -- Confidentiality -- Accountability -- Availability -- Cryptography applied to automotive use cases -- Building blocks -- One-way hash functions -- Message authentication code algorithms -- Random number generators -- Public key cryptography -- Key management -- NIST defined security strength -- Chinese cryptography -- PQC algorithms -- Security principles -- Defense in depth -- Domain separation -- Least privilege -- Least sharing -- Mediated access -- Protective defaults -- Anomaly detection -- Distributed privilege Hierarchical protection and zero trust -- Minimal trusted elements -- Least persistence -- Protective failure -- Continuous protection -- Redundancy -- Use of standardized cryptography -- Summary -- Further reading -- Chapter 3: Threat Landscape against Vehicle Components -- Threats against external vehicle interfaces -- Backend-related threats -- Connectivity threats -- Threats against the E/E topology -- Highly distributed E/E architecture -- Domain-centralized E/E architecture -- Central vehicle computer architecture -- Threats against in-vehicle networks -- CAN -- FlexRay -- Ethernet The Unified Diagnostic Services (UDS) protocol -- SAE J1939 protocols -- SAE J2497 (PLC4TRUCKS) -- Threats against sensors -- Common ECU threats -- Debug ports -- Flash programming -- Power and mode manipulation -- Tampering with machine learning algorithms -- Software attacks -- Disclosure and tampering of cryptographic keys -- Summary -- References -- Part 2: Understanding the Secure Engineering Development Process -- Chapter 4: Exploring the Landscape of Automotive Cybersecurity Standards -- Primary standards -- UNECE WP.29 -- Chinese regulation and standardization -- Secondary standards Automotive computers / Security measures Automobile industry and trade / Technological innovations Automated vehicles Ordinateurs de bord / Sécurité / Mesures Automobiles / Industrie et commerce / Innovations Véhicules autonomes Automated vehicles fast Automobile industry and trade / Technological innovations fast Kraftfahrzeugindustrie (DE-588)4032690-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
subject_GND | (DE-588)4032690-1 (DE-588)4274324-2 |
title | Automotive cybersecurity engineering handbook the automotive engineer's roadmap to cyber-resilient vehicles |
title_auth | Automotive cybersecurity engineering handbook the automotive engineer's roadmap to cyber-resilient vehicles |
title_exact_search | Automotive cybersecurity engineering handbook the automotive engineer's roadmap to cyber-resilient vehicles |
title_full | Automotive cybersecurity engineering handbook the automotive engineer's roadmap to cyber-resilient vehicles Dr. Ahmad MK Nasser |
title_fullStr | Automotive cybersecurity engineering handbook the automotive engineer's roadmap to cyber-resilient vehicles Dr. Ahmad MK Nasser |
title_full_unstemmed | Automotive cybersecurity engineering handbook the automotive engineer's roadmap to cyber-resilient vehicles Dr. Ahmad MK Nasser |
title_short | Automotive cybersecurity engineering handbook |
title_sort | automotive cybersecurity engineering handbook the automotive engineer s roadmap to cyber resilient vehicles |
title_sub | the automotive engineer's roadmap to cyber-resilient vehicles |
topic | Automotive computers / Security measures Automobile industry and trade / Technological innovations Automated vehicles Ordinateurs de bord / Sécurité / Mesures Automobiles / Industrie et commerce / Innovations Véhicules autonomes Automated vehicles fast Automobile industry and trade / Technological innovations fast Kraftfahrzeugindustrie (DE-588)4032690-1 gnd Computersicherheit (DE-588)4274324-2 gnd |
topic_facet | Automotive computers / Security measures Automobile industry and trade / Technological innovations Automated vehicles Ordinateurs de bord / Sécurité / Mesures Automobiles / Industrie et commerce / Innovations Véhicules autonomes Kraftfahrzeugindustrie Computersicherheit |
work_keys_str_mv | AT nasserahmadmk automotivecybersecurityengineeringhandbooktheautomotiveengineersroadmaptocyberresilientvehicles |