IT Security in Automotive Software Development

In the last years, automotive systems evolved to be more and more software-intensive systems. As a result, considerable attention has been paid to establish an efficient software development process of such systems, where reliability is an important criterion. Hence, model-driven development (MDD), software engineering and requirements engineering (amongst others) found their way into the systems engineering domain. However, one important aspect regarding the reliability of such systems, has been largely neglected on a holistic level: the IT security. In this paper, we introduce a potential approach for integrating IT security in the requirements engineering process of automotive software development using function net modeling.

[1]  John B. Shoven,et al.  I , Edinburgh Medical and Surgical Journal.

[2]  Hartmut Ehrig,et al.  Fundamentals of Algebraic Graph Transformation , 2006, Monographs in Theoretical Computer Science. An EATCS Series.

[3]  ThielSteffen,et al.  Modeling and Using Product Line Variability in Automotive Systems , 2002 .

[4]  Aaas News,et al.  Book Reviews , 1893, Buffalo Medical and Surgical Journal.

[5]  Andreas Müller,et al.  Why does it take that long? Establishing Product Lines in the Automotive Domain , 2007, 11th International Software Product Line Conference (SPLC 2007).

[6]  Manfred Broy,et al.  Ein Wegweiser für Forschung und Lehre im Software-Engineering eingebetteter Systeme , 2003, Informatik-Spektrum.

[7]  Mirko Conrad,et al.  Experiences with model and autocode reviews in model-based software development , 2006, SEAS '06.

[8]  Manfred Broy,et al.  Software Engineering for Automotive Systems: A Roadmap , 2007, Future of Software Engineering (FOSE '07).

[9]  Andreas Müller,et al.  Why does it take that long? Establishing Product Lines in the Automotive Domain , 2007 .

[10]  Jana Dittmann,et al.  Future Perspectives: The Car and Its IP-Address - A Potential Safety and Security Risk Assessment , 2007, SAFECOMP.

[11]  Michael von der Beeck,et al.  Model based requirements engineering for embedded software , 2002, Proceedings IEEE Joint International Conference on Requirements Engineering.

[12]  Tobias Hoppe,et al.  Exemplary Automotive Attack Scenarios : Trojan Horses for Electronic Throttle Control System ( ETC ) and Replay Attacks on the Power Window System , 2007 .

[13]  Herbert Hanselmann,et al.  Challenges in automotive software engineering , 2008, ICSE Companion '08.

[14]  Andreas Hein,et al.  Modeling and Using Product Line Variability in Automotive Systems , 2002, IEEE Softw..

[15]  Michael von der Beeck Function Net Modeling with UML-RT: Experiences from an Automotive Project at BMW Group , 2004, UML Satellite Activities.

[16]  Jana Dittmann,et al.  Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..

[17]  Eva Geisberger,et al.  Interdisciplinary Requirements Analysis Using the Model-based RM Tool AUTORAID , 2006, International Automotive Requirements Engineering Workshop (AURE'06 - RE'06 Workshop).