Skip to main content
Top
Published in: ATZelectronics worldwide 5/2016

01-10-2016 | Development

Trusted Execution Environments in Vehicles

Authors: Dr.-Ing. Jens Köhler, Henry Förster, M. Eng.

Published in: ATZelectronics worldwide | Issue 5/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Excerpt

Trusted Execution Environments (TEEs) can be applied to harden electronic control unit software against attackers. TEE approaches isolate security-relevant from non-security-relevant software and, thus, reduce the surface for attacks on security-relevant software components. The presented classification and assessment of TEE approaches shows that existing TEE solutions differ significantly with regard to functionality, security properties, and cost. ITK Engineering compares existing TEE approaches and highlights their differences. …

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Worldwide Automotive Package

We make your automotive knowledge compactly!

Get all the international automotive knowledge you need with the Worldwide Automotive Package.

You receive all Automotive Worldwide e-magazines with only one access for you and your colleagues.

Show more products
Literature
[3]
go back to reference Miller, C.; Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA, 2015 Miller, C.; Valasek, C.: Remote exploitation of an unaltered passenger vehicle. Black Hat USA, 2015
[4]
go back to reference Herstellerinitiative Software (HIS): SHE Secure Hardware Extension Version 1.1., 2009 Herstellerinitiative Software (HIS): SHE Secure Hardware Extension Version 1.1., 2009
[5]
go back to reference Henniger, O.: Securing vehicular on-board it systems: The Evita project. VDI/VW Automotive Security Conference, 2009 Henniger, O.: Securing vehicular on-board it systems: The Evita project. VDI/VW Automotive Security Conference, 2009
[6]
go back to reference Trusted Computing Group. TPM Main Part 1 Design Principles, Specification Version 1.2. 2006 Trusted Computing Group. TPM Main Part 1 Design Principles, Specification Version 1.2. 2006
[7]
go back to reference ISO Standard: ISO/IEC 11889 — Information technology — Trusted platform module library, 2015 ISO Standard: ISO/IEC 11889 — Information technology — Trusted platform module library, 2015
[8]
go back to reference Kömmerling, O.; Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors, Smartcard 99, 1999 Kömmerling, O.; Kuhn, M.G.: Design Principles for Tamper-Resistant Smartcard Processors, Smartcard 99, 1999
[9]
go back to reference ARM Limited. Security Technology Building a Secure System Using TrustZone Technology (white paper). ARM Limited, 2009 ARM Limited. Security Technology Building a Secure System Using TrustZone Technology (white paper). ARM Limited, 2009
[11]
go back to reference Barham, P.: Xen and the art of virtualization, ACM SIGOPS Operating Systems Review, 2003 Barham, P.: Xen and the art of virtualization, ACM SIGOPS Operating Systems Review, 2003
[12]
go back to reference Kivity, A.: KVM: The Linux virtual machine monitor. Proceedings of the Linux Symposium, 2007 Kivity, A.: KVM: The Linux virtual machine monitor. Proceedings of the Linux Symposium, 2007
[13]
go back to reference Merkel, D.: Docker: Lightweight linux containers for consistent development and deployment. Linux Journal (239), 2014 Merkel, D.: Docker: Lightweight linux containers for consistent development and deployment. Linux Journal (239), 2014
[14]
go back to reference Wolf, M.; Gendrulli, T.: Design, implementation, and evaluation of a vehicular hardware security module. Information Security and Cryptology (ICISC), 2011 Wolf, M.; Gendrulli, T.: Design, implementation, and evaluation of a vehicular hardware security module. Information Security and Cryptology (ICISC), 2011
[15]
go back to reference Kreuzer, M.; Wenzel-Benner, C.: Trusted Platform Modules und ihr Beitrag zur sicheren internen Kommunikation von Fahrzeugen. 29. VDI/VW-Gemeinschaftstagung, 2013 Kreuzer, M.; Wenzel-Benner, C.: Trusted Platform Modules und ihr Beitrag zur sicheren internen Kommunikation von Fahrzeugen. 29. VDI/VW-Gemeinschaftstagung, 2013
Metadata
Title
Trusted Execution Environments in Vehicles
Authors
Dr.-Ing. Jens Köhler
Henry Förster, M. Eng.
Publication date
01-10-2016
Publisher
Springer Fachmedien Wiesbaden
Published in
ATZelectronics worldwide / Issue 5/2016
Electronic ISSN: 2524-8804
DOI
https://doi.org/10.1007/s38314-016-0074-y

Other articles of this Issue 5/2016

ATZelectronics worldwide 5/2016 Go to the issue

Premium Partner