Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3660395.3660435acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaibdfConference Proceedingsconference-collections
research-article

Research on the security of automotive domain controller systems based on trusted execution environment

Published: 01 June 2024 Publication History

Abstract

With the continuous development of automotive technology, the security issues of automotive systems have become increasingly prominent. Traditional automotive systems have many potential security risks, such as remote attacks, vehicle data leakage, and unauthorized access. To address these issues, researchers and car manufacturers have started focusing on the application of trusted execution environments. A trusted execution environment is a secure computing environment that provides hardware and software-level security protection, safeguarding sensitive data and performing critical tasks. Introducing trusted execution environments into automotive domain controllers can effectively enhance the security and reliability of the system. This study aims to explore the security of automotive domain controller systems based on trusted execution environments. We will investigate existing trusted execution environment technologies and analyze their application value in the automotive field, then we will explore the impact of trusted execution environments on the security of automotive domain controller systems as well. By conducting in-depth research on the application of trusted execution environments in the automotive field, we can provide guidance and recommendations to car manufacturers and researchers on how to improve the security of automotive domain controller systems. The ultimate goal is to build more security and more reliable automotive systems, protecting user privacy and data security.

References

[1]
Li Xiaoxia, Wang Jianfeng, Wang Yuanbo. Domain Control-based Electronic and Electrical Architecture Platform [J]. Automotive Electrician, 2023 (08): 37-39.
[2]
Ning Yuqiao, Ma Chao, Liu Tianyu. Research on the Security of Intelligent Connected Vehicle T-Box [J]. Automotive Components, 2020 (05): 98-101.
[3]
Wang Pengcheng, Jia Xianfeng, Liu Tianyu. Analysis of In-Vehicle Bus Communication Security [J]. Automotive Practical Technology, 2022, 47(04): 34-37.
[4]
Guo Zhen, Ma Chao, Wang Guoliang, Current Status and Prospects of Intelligent Automobile Information Security Technology [J]. Automotive Components, 2021 (02): 115-121.
[5]
Antonio M,Ruben R,Rodrigo R, A survey on the (in)security of trusted execution environments[J].Computers Security, 2023, 129
[6]
Tong Hua. Constructing a Depth Defense System for Information Systems [J]. Electronic Technology and Software Engineering, 2022 (04): 45-48.
[7]
Wang Pengcheng, Ma Chao, Liu Tianyu, Analysis of Automotive OTA Application Requirements [J]. Automotive Practical Technology, 2021, 46(06): 23-25.
[8]
Ma Chao, Liu Tianyu, Shi Peiji. Literature Review on Automotive Information Security [J]. Equipment Maintenance Technology, 2019 (02): 25-28.
[9]
Liu Zhijuan, Gao Jun, Ding Qifeng, Research on the Progress of Mobile Terminal TEE Technology [J]. Information Network Security, 2018 (02): 84-91.
[10]
Zaina A,Ahmad A,Adel T .STRIDE threat model-based framework for assessing the vulnerabilities of modern vehicles[J].Computers Security, 2023, 133
[11]
Wang Kerui, Tan Qi, Zhang Dezhi. Research on a Modeling Method for Network Space Security Architecture[J]. Information Security and Communication Confidentiality, 2022 (12): 89-98.
[12]
Zhang,Lu,Taal, A risk-level assessment system based on the STRIDE/DREAD model for digital data marketplaces[J].International Journal of Information Security, 2021, 21(3):1-17.
[13]
Hao Jingjing, Han Guangsheng. Research on Information Security Threat Identification and Protection Methods for Intelligent Connected Vehicles [J]. Modern Electronics Technology, 2021, 44(23): 62-66.

Index Terms

  1. Research on the security of automotive domain controller systems based on trusted execution environment

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    AIBDF '23: Proceedings of the 2023 3rd Guangdong-Hong Kong-Macao Greater Bay Area Artificial Intelligence and Big Data Forum
    September 2023
    577 pages
    ISBN:9798400716362
    DOI:10.1145/3660395
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 June 2024

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article
    • Research
    • Refereed limited

    Conference

    AIBDF 2023

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 11
      Total Downloads
    • Downloads (Last 12 months)11
    • Downloads (Last 6 weeks)6
    Reflects downloads up to 09 Nov 2024

    Other Metrics

    Citations

    View Options

    Get Access

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    HTML Format

    View this article in HTML Format.

    HTML Format

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media