{"title":"2020-2021 Reviewers","authors":"A. Weimerskirch, Kevin Harnett, T. Forest","doi":"10.4271/11-04-02-0006","DOIUrl":"https://doi.org/10.4271/11-04-02-0006","url":null,"abstract":"","PeriodicalId":253463,"journal":{"name":"SAE International Journal of Transportation Cybersecurity and Privacy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2022-01-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131011173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Donghang Lu, Pedro A. Moreno-Sánchez, Pramita Mitra, Ken Feldman, Josh Fodale, Jason Kosofsky, Aniket Kate
{"title":"Toward Privacy-Aware Traceability for Automotive Supply Chains","authors":"Donghang Lu, Pedro A. Moreno-Sánchez, Pramita Mitra, Ken Feldman, Josh Fodale, Jason Kosofsky, Aniket Kate","doi":"10.4271/11-04-02-0004","DOIUrl":"https://doi.org/10.4271/11-04-02-0004","url":null,"abstract":"The lack of traceability in today’s supply chain system for auto components makes counterfeiting a signi cant problem leading to millions of dollars of lost revenue every year and putting the lives of customers at risk. Traditional solutions are usually built upon hardware such as RFID tags and barcodes and these solutions cannot stop attacks from supply chain (insider) parties themselves as they can simply duplicate products in their local database. This industry-academia collaborative work studies the bene ts and challenges associated with the use of distributed ledger (or blockchain) technology towards preventing counterfeiting in the presence of malicious supply chain parties. We illustrate that the provision of a distributed and append-only ledger jointly governed by supply chain parties themselves makes permissioned blockchains such as Hyperledger Fabric a promising approach towards mitigating counterfeiting. Meanwhile, we demonstrate that the privacy of supply chain parties can be preserved as competing supply chain parties strive to protect their businesses from the prying eyes of competitors and counterparties. Besides, we show that the recall process can be achieved e ciently with the help of the blockchain. The proposed solution, Fordchain, overcomes the challenges to achieve the best of both worlds: a solution to the counterfeiting problem using distributed ledger technology while providing accountability and the privacy notions of interest for supply chain parties. Although our e orts to build a blockchain-based counterfeiting prevention system aims at automotive supply chains, the lessons learned are highly applicable to other supply chains. We end-to-end implement our Fordchain solution in the Hyperledger Fabric framework, analyze it over AWS EC2 clusters, and illustrate that the performance of our solution is good enough to be applied in practice.","PeriodicalId":253463,"journal":{"name":"SAE International Journal of Transportation Cybersecurity and Privacy","volume":"3 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-07-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131757293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"2020-2021 Reviewers","authors":"Forest","doi":"10.4271/11-03-02-0009","DOIUrl":"https://doi.org/10.4271/11-03-02-0009","url":null,"abstract":"","PeriodicalId":253463,"journal":{"name":"SAE International Journal of Transportation Cybersecurity and Privacy","volume":"30 2 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2021-05-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116833556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
T. Forest, Kevin Harnett, R. Lambert, A. Weimerskirch
{"title":"Letter from the Co-editors","authors":"T. Forest, Kevin Harnett, R. Lambert, A. Weimerskirch","doi":"10.4271/11-02-02-0007","DOIUrl":"https://doi.org/10.4271/11-02-02-0007","url":null,"abstract":"","PeriodicalId":253463,"journal":{"name":"SAE International Journal of Transportation Cybersecurity and Privacy","volume":"26 4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2020-08-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130415025","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Huaxin Li, Di Ma, B. Medjahed, Y. Kim, Pramita Mitra
{"title":"Data Privacy in the Emerging Connected Mobility Services: Architecture, Use Cases, Privacy Risks, and Countermeasures","authors":"Huaxin Li, Di Ma, B. Medjahed, Y. Kim, Pramita Mitra","doi":"10.4271/11-02-01-0004","DOIUrl":"https://doi.org/10.4271/11-02-01-0004","url":null,"abstract":"","PeriodicalId":253463,"journal":{"name":"SAE International Journal of Transportation Cybersecurity and Privacy","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128759145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Accelerated Secure Boot for Real-Time Embedded Safety Systems","authors":"Ahmad M. K. Nasser, Wonder Gumise, Di Ma","doi":"10.4271/11-02-01-0003","DOIUrl":"https://doi.org/10.4271/11-02-01-0003","url":null,"abstract":"","PeriodicalId":253463,"journal":{"name":"SAE International Journal of Transportation Cybersecurity and Privacy","volume":"82 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115017381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Vulnerability of FlexRay and Countermeasures","authors":"Kishikawa Takeshi, Ryo Hirano, Yoshihiro Ujiie, Tomoyuki Haga, Hideki Matsushima, Kazuya Fujimura, Jun Anzai","doi":"10.4271/11-02-01-0002","DOIUrl":"https://doi.org/10.4271/11-02-01-0002","url":null,"abstract":"","PeriodicalId":253463,"journal":{"name":"SAE International Journal of Transportation Cybersecurity and Privacy","volume":"14 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-05-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131153381","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Comprehensive Attack and Defense Model for the Automotive Domain","authors":"T. Hutzelmann, Sebastian Banescu, A. Pretschner","doi":"10.4271/11-02-01-0001","DOIUrl":"https://doi.org/10.4271/11-02-01-0001","url":null,"abstract":"","PeriodicalId":253463,"journal":{"name":"SAE International Journal of Transportation Cybersecurity and Privacy","volume":"7 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121803015","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Cybersecurity Considerations for Heavy Vehicle Event Data Recorders","authors":"J. Daily, B. Gardiner","doi":"10.4271/11-01-02-0006","DOIUrl":"https://doi.org/10.4271/11-01-02-0006","url":null,"abstract":"","PeriodicalId":253463,"journal":{"name":"SAE International Journal of Transportation Cybersecurity and Privacy","volume":"32 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-12-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124848960","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jürgen Dürrwang, Johannes Braun, Marcel Rumez, R. Kriesten, A. Pretschner
{"title":"Enhancement of Automotive Penetration Testing with Threat Analyses Results","authors":"Jürgen Dürrwang, Johannes Braun, Marcel Rumez, R. Kriesten, A. Pretschner","doi":"10.4271/11-01-02-0005","DOIUrl":"https://doi.org/10.4271/11-01-02-0005","url":null,"abstract":"In this work, we present an approach to support penetration tests by combining safety and security analyses to enhance automotive security testing. Our approach includes a new way to combine safety and threat analyses to derive possible test cases. We reuse outcomes of a performed safety analysis as the input for a threat analysis. We show systematically how to derive test cases and we present the applicability of our approach by deriving and performing test cases for a penetration test of an automotive Electronic Control Unit (ECU). Therefore, we selected an airbag control unit due to its safety-critical functionality. During the penetration test, the selected control unit was installed on a test bench and we were able to successfully exploit a discovered vulnerability, causing the detonation of airbags.","PeriodicalId":253463,"journal":{"name":"SAE International Journal of Transportation Cybersecurity and Privacy","volume":"175 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2018-11-02","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131763053","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}