TUM Logo

Leveraging In-Car Security by Combining Information Flow Monitoring Techniques

Modern automobiles are increasingly connected tothe world and integrate always more electronic components man-aging simultaneously infotainment and safety functions. Muchmore than just a simple transportation mean, the car is nowcustomizable and like current smartphones, it will soon allowto load and install third-party applications directly from theInternet, which raises some security issues. Until now, the carmanufacturer has full control over the development process ofthe in-car software and in particular can perform any requiredsecurity tests before the car production. The integration of un-trusted pieces of code requires from now on new dynamic securitymechanisms operating during the life time of the car. In thispaper, we present the integration of data flow tracking tools inan automotive middleware allowing dynamic security monitoringof untrusted applications. We describe the implementation andintegration of these mechanisms and provide their evaluation.Index Terms—automotive applications, security, privacy, infor-mation flow controls, data flow tracking

Leveraging In-Car Security by Combining Information Flow Monitoring Techniques

Second International Conference on Advances in Vehicular Systems Technologies and Applications (VEHICULAR 2013)

Authors: Alexandre Bouard, Hendrik Schweppe, Benjamin Weyl, and Claudia Eckert
Year/month: 2013/
Booktitle: Second International Conference on Advances in Vehicular Systems Technologies and Applications (VEHICULAR 2013)
Fulltext: Bouarddftcamready.pdf

Abstract

Modern automobiles are increasingly connected tothe world and integrate always more electronic components man-aging simultaneously infotainment and safety functions. Muchmore than just a simple transportation mean, the car is nowcustomizable and like current smartphones, it will soon allowto load and install third-party applications directly from theInternet, which raises some security issues. Until now, the carmanufacturer has full control over the development process ofthe in-car software and in particular can perform any requiredsecurity tests before the car production. The integration of un-trusted pieces of code requires from now on new dynamic securitymechanisms operating during the life time of the car. In thispaper, we present the integration of data flow tracking tools inan automotive middleware allowing dynamic security monitoringof untrusted applications. We describe the implementation andintegration of these mechanisms and provide their evaluation.Index Terms—automotive applications, security, privacy, infor-mation flow controls, data flow tracking

Bibtex:

@inproceedings { Bouard2013b,
author = { Alexandre Bouard and Hendrik Schweppe and Benjamin Weyl and Claudia Eckert},
title = { Leveraging In-Car Security by Combining Information Flow Monitoring Techniques },
year = { 2013 },
booktitle = { Second International Conference on Advances in Vehicular Systems Technologies and Applications (VEHICULAR 2013) },
url = {https://www.sec.in.tum.de/i20/publications/leveraging-in-car-security-by-combining-information-flow-monitoring-techniques/@@download/file/Bouarddftcamready.pdf}
}