Benjamin Glas

Learn More
For improving the security of embedded systems, trusted computing is a promising technology. For the area of microprocessors in general and personal computers in particular the Trusted Computing Group (TCG) has published detailed specifications. The resulting hardware has been available for some years. This contribution discusses the feasibility of(More)
—Today's vehicle has become a very complex good, offering performance and reliability thanks to a sophisticated network of Electronic Control Units. Each year car makers develop new automotive features for use inside and outside of the car. But improving this infrastructure each time adds new costs and overhead to the system. A promising solution resides in(More)
Known proposals for key establishment schemes based on combinatorial group theory are often formulated in a rather informal manner. Typically, issues like the choice of a session identifier and parallel protocol executions are not addressed, and no security proof in an established model is provided. Successful attacks against proposed parameter sets for(More)
The ever increasing complexity of automotive vehicular systems, their connection to external networks, to the internet of things as well as their greater internal networking opens doors to hacking and malicious attacks. Security and privacy risks in modern automotive vehicular systems are well publicized by now. That violation of security could lead to(More)
—Recently, demonstrated attacks on automotive communication systems have made security a necessary requirement for future products. In this paper, we are concern with the problem of designing efficient integrity assuring mechanisms for highly constrained automotive (internal) network environments, such as for example the CAN bus standard. In particular,(More)