Benjamin Glas

Learn More
For improving the security of embedded systems, trusted computing is a promising technology. For the area of microprocessors in general and personal computers in particular the Trusted Computing Group (TCG) has published detailed specifications. The resulting hardware has been available for some years. This contribution discusses the feasibility of(More)
Today’s vehicle has become a very complex good, offering performance and reliability thanks to a sophisticated network of Electronic Control Units. Each year car makers develop new automotive features for use inside and outside of the car. But improving this infrastructure each time adds new costs and overhead to the system. A promising solution resides in(More)
Recently, demonstrated attacks on automotive communication systems have made security a necessary requirement for future products. In this paper, we are concern with the problem of designing efficient integrity assuring mechanisms for highly constrained automotive (internal) network environments, such as for example the CAN bus standard. In particular,(More)
Known proposals for key establishment schemes based on combinatorial group theory are often formulated in a rather informal manner. Typically, issues like the choice of a session identifier and parallel protocol executions are not addressed, and no security proof in an established model is provided. Successful attacks against proposed parameter sets for(More)
The ever increasing complexity of automotive vehicular systems, their connection to external networks, to the internet of things as well as their greater internal networking opens doors to hacking and malicious attacks. Security and privacy risks in modern automotive vehicular systems are well publicized by now. That violation of security could lead to(More)
While research and standardization in the area of car-toX (C2X) communication gains interest steadily, realization and integration in On-Board-Units (OBU) becomes an issue. Lacking existing testbeds, the evaluation, test, and rapid prototyping of such systems relies on stimulation from simulated environments. We present an extension of an open-source(More)
Driven by increasing connectivity, complexity, and distribution of functions in vehicles, automotive security is steadily gaining attention. While in other domains there is a harmonized notion on security requirements and there are even broad information security management standards, in the automotive domain there is so far no common structured approach to(More)