Learn More
This paper considers security requirements for automotive on-board networks and describes the processes used for identifying and prioritizing such requirements. The security engineering process starts from use cases for automotive onboard networks that require wireless communication interfaces and involves an investigation of security threat scenarios and(More)
The software running on electronic devices is regularly updated , these days. A vehicle consists of many such devices, but is operated in a completely different manner than consumer devices. Update operations are safety critical in the automotive domain. Thus, they demand for a very well secured process. We propose an on-board security architecture which(More)
In this paper, we present an algorithm for generating test purpose descriptions in form of MSC's from a given labeled event structure that represents the behavior of a system of asynchronously communicating extended finite state machines. The labeled event structure is a non-interleaving behavior model describing the behavior of a system in terms of the(More)
This paper addresses the problem of evaluating the quality of handwritten signatures used for biometric authentication. It is shown that some signature samples yield significantly worse performance than other samples from the same person. Thus, the importance of good reference samples is emphasized. We also give some examples of features that are related to(More)
This paper presents a method for transforming an extended nite state machine (EFSM) given as an Estelle normal form module into an equivalent expanded EFSM without control variables, i.e. an Estelle normal form module free of provided-clauses. The transformed EFSM allows to apply methods based on the nite state machine (FSM) model for test case generation.(More)
This paper describes a biometric method for user authentication on smart cards. Smart cards are chip cards with the ability for data processing directly on the card. They are not only usable for storing biometric reference data, but biometric user authentication methods can also be performed on card in order to protect security-relevant functions or data on(More)
— This paper revisits Dynamic Time Warping, a method for assessing the dissimilarity of time series. In particular , this paper provides theoretical and experimental evidence showing that uncritical normalizing the length of the time series to be compared has a detrimental effect on the recognition accuracy in application domains such as on-line signature(More)
Control and data flow aspects of a distributed system can be identified through the analysis of control and data dependencies that exist not only within processes, but also across process boundaries. This paper proposes a non-interleaving model that exposes the intra-process as well as inter-process control and data dependencies in a specification of a(More)