Testing security of embedded software through virtual processor instrumentation

2Citations
Citations of this article
5Readers
Mendeley users who have this article in their library.
Get full text

Abstract

More and more functionality that demands remote access on a vehicle is integrated into modern cars. Fleet management, infotainment, updates-over-the-air and the upcoming functionality for autonomous driving need gateways that enable a car-2-x communication. Misuse is a threat. Consequently, security mechanisms play an increasing important role. But how can we show and prove the effectiveness of these security functions? Therefore, in this paper we will show an approach to test security aspects, based on virtual instrumentation. The approach is to use a framework that executes the application under development on a virtual model of the target micro controller. An interception library generates scenarios systematically, whereas the effects on registers and memory are monitored. We are intercepting the running software at vulnerable functions and variables to detect potential malfunctions. This will detect security vulnerabilities of all internal failure even if no malicious behavior at the interfaces occur.

Author supplied keywords

Cite

CITATION STYLE

APA

Lauber, A., & Sax, E. (2018). Testing security of embedded software through virtual processor instrumentation. In Lecture Notes in Networks and Systems (Vol. 22, pp. 85–94). Springer. https://doi.org/10.1007/978-3-319-64352-6_9

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free