CN109344609B - TCU module, TCU system and protection method - Google Patents

TCU module, TCU system and protection method Download PDF

Info

Publication number
CN109344609B
CN109344609B CN201811009179.1A CN201811009179A CN109344609B CN 109344609 B CN109344609 B CN 109344609B CN 201811009179 A CN201811009179 A CN 201811009179A CN 109344609 B CN109344609 B CN 109344609B
Authority
CN
China
Prior art keywords
module
access
tcu
resources
checking
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811009179.1A
Other languages
Chinese (zh)
Other versions
CN109344609A (en
Inventor
江浩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Huizhou Desay SV Automotive Co Ltd
Original Assignee
Huizhou Desay SV Automotive Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Huizhou Desay SV Automotive Co Ltd filed Critical Huizhou Desay SV Automotive Co Ltd
Priority to CN201811009179.1A priority Critical patent/CN109344609B/en
Publication of CN109344609A publication Critical patent/CN109344609A/en
Application granted granted Critical
Publication of CN109344609B publication Critical patent/CN109344609B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/55Detecting local intrusion or implementing counter-measures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/606Protecting data by securing the transmission between two devices or processes
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system
    • G06F9/4881Scheduling strategies for dispatcher, e.g. round robin, multi-level priority queues

Abstract

The invention relates to the technical field of automobile TCUs, and particularly discloses a TCU module, a TCU system and a protection method, which comprise a 4G module, a CPU core processing module and a CAN transceiver which are sequentially connected, wherein the CPU core processing module comprises an application component, a service component connected with the application component and an operating system connected with the service component, the operating system comprises a system interface and a kernel driver connected with the system interface, the kernel driver comprises a control gateway, the control gateway is connected with an access monitoring module and an access request module, and the access monitoring module is connected with an exception handling module.

Description

TCU module, TCU system and protection method
Technical Field
The invention relates to the technical field of automobile TCUs, in particular to a TCU module, a TCU system and a protection method.
Background
With the rapid development of the internet of vehicles industry, the related technologies thereof are widely applied to the automotive electronics industry, and the development of the internet of vehicles is based on the network communication technology to complete information interconnection and intercommunication between vehicles, vehicles and roads, and vehicles and people. The automobile is no longer a simple vehicle, and is gradually developing into an important component of intelligent travel and vehicle data collection. The network function gradually becomes an important service component, the functions of the vehicle-mounted module are more and more abundant, the interaction with the internet is more frequent, and the potential safety hazard also comes with the network function.
Because the vehicle-mounted network module contains some important personal information and even controls the behavior of the vehicle to a certain extent, the vehicle-mounted network module often becomes a primary attack object of network attack, so that not only personal information is leaked, but also the life and property safety of a driver is possibly threatened. The current vehicle-mounted network module usually has a complex operating system and rich application programs, but the inside of the whole software system lacks effective access authority control and authority level management of each functional block, effective defense and alarm and system isolation cannot be carried out on system intrusion and behavior after the system intrusion, and the complex network security requirement cannot be met.
Disclosure of Invention
Aiming at the technical problems, the invention provides a TCU module, a TCU system and a protection method which can effectively avoid the loss of drivers or property caused by network intrusion.
In order to solve the technical problems, the invention provides the following specific scheme: a TCU module comprises a 4G module, a CPU core processing module and a CAN transceiver which are sequentially connected, wherein the CPU core processing module comprises an application component, a service component connected with the application component and an operating system connected with the service component, the operating system comprises a system interface and a kernel driver connected with the system interface, the kernel driver comprises a control gateway, the control gateway is connected with an access monitoring module and an access request module, and the access monitoring module is connected with an exception handling module.
The invention limits the access of system resources by controlling the gateway, actively analyzes abnormal authority change or illegal access of key resources when the system is invaded, gives an alarm in time after the invasion is confirmed, isolates the system, and blocks the connection with a vehicle body, thereby avoiding the loss of drivers or property caused by network invasion.
Preferably, the control gateway includes a white list management module and an access control module connected to the white list management module, the white list management module effectively configures resources and permissions that need to be accessed for specific applications and services, a network filtering module is formed in the kernel, the network filtering module compares and checks each resource access, issues an access request according with rules, blocks invalid or illegal access, and checks whether the process permission is illegally changed, the control module optimizes performance when accessing the control module, and puts the request passing access into a queue according to priority for resource access.
Preferably, the access request module includes device driver, memory management, file system, process resource and authority management.
The invention also provides a TCU system, which comprises the TCU module as claimed in claim 3 and a vehicle body CAN bus connected with the TCU module, wherein the 4G module is responsible for receiving and sending data with the outside, the CPU core processing module is responsible for analyzing and processing the received data and messages, the CAN transceiver is responsible for transmitting the data sent by the CPU core processing module to the vehicle body CAN bus, and all the modules are communicated through a hardware bus.
The present invention also provides a method for protecting a TCU system according to claim 4, comprising the steps of:
s1, a target program process calls a system interface to access system resources, and a control gateway checks whether the accessed resources are in the process range;
s2, accessing the resources in the process range, performing access operation and returning a result;
if the access resource is not in the process range, jumping to the step S3;
s3, the control gateway informs the access monitoring module to check whether the process accesses hardware peripherals, kernel interfaces or permission change;
if yes, jumping to the step S4; if not, the access operation is refused and the access failure is returned;
s4, the access monitoring module checks whether the process is abnormal or not;
if yes, recording the exception and informing an exception processing module to process the exception; if not, returning and recording the access failure result.
Preferably, the exception handling in step S4 specifically includes: the abnormity processing module sends preset alarm information to a system background and forbids the communication of the CAN transceiver, so that a destructive control instruction is prevented from being issued to a vehicle body through a vehicle body CAN bus, and the aim of protecting the safety of the vehicle is fulfilled.
Preferably, the step S4 of accessing the monitoring module to check whether the process has an exception specifically includes the following steps: checking whether all access records of the process have illegal operation records; checking whether the code is tampered; and checking whether the current process authority and account are valid and whether the current process authority and account are unauthorized.
Preferably, the checking whether the code is tampered or not is specifically: and comparing the program process codes stored in the storage area with the codes in the current memory.
Preferably, the step S4 of accessing the monitoring module to check whether the process has an exception further includes the following steps: and (4) memory checking, namely checking whether the current code, data and stack segment of the process are in the attribute range set by the segment.
Preferably, the access control module ranks access priorities of device drivers, memory management, file systems, process resources, and rights management.
Compared with the prior art, the invention has the beneficial effects that: the invention adopts the enhanced access control to the TCU module, protects codes and data in a memory layer, continuously monitors illegal access filtered by the enhanced access control, analyzes and checks an access subject, and when an abnormal process is found in the system, the system actively alarms, performs system self-isolation and cuts off communication with a vehicle body so as to prevent a vehicle from being further invaded by issuing an instruction.
Drawings
FIG. 1 is a block diagram of a TCU module according to a first embodiment of the present invention;
FIG. 2 is a block diagram of a TCU system according to a second embodiment of the present invention;
FIG. 3 is a flow chart of a conventional CPU core processing module processing external network messages;
FIG. 4 is a diagram illustrating a control gateway wrapped target application process;
fig. 5 is a flowchart illustrating a third embodiment of the present invention.
Detailed Description
In order to explain the technical solution of the present invention in detail, the technical solution of the embodiment of the present invention will be clearly and completely described below with reference to the accompanying drawings of the embodiment of the present invention. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the described embodiments of the invention without inventive step, are within the scope of protection of the invention.
The first embodiment is as follows:
referring to fig. 1, this embodiment provides a TCU module, which includes a 4G module, a CPU core processing module, and a CAN transceiver connected in sequence, where the CPU core processing module includes an application component, a service component connected to the application component, and an operating system connected to the service component, the operating system includes a system interface and a kernel driver connected to the system interface, the kernel driver includes a control gateway, the control gateway is connected to an access monitoring module and an access request module, the access monitoring module is connected to an exception handling module, the access monitoring module monitors illegal and abnormal resource access and permission transition and determines whether an attack occurs, when an illegal access and abnormal permission change request occurs, it means that a system is attacked or a program is abnormal, at this time, it needs to analyze according to an access record and an access boundary to determine whether a current system is in problem, if a process is abnormal and an intrusion is possible, the exception handling module is notified, and when the monitoring module determines that the current system is attacked or the system is abnormal, the exception handling module calls a network driver interface to send an alarm and cut off a CAN bus connection.
The control gateway comprises a white list management module and an access control module connected with the white list management module, the white list management module effectively configures resources and authorities of specific applications and services to be accessed, a network filtering module is formed in a kernel, each resource access is compared and checked, an access request conforming to a rule is issued, invalid or illegal access is blocked, whether illegal change exists in the process authority is checked, the performance is optimized when the control module is accessed, the requests passing through the access are placed into a queue according to priority for resource access, and the access request module comprises device driving, memory management, a file system, process resources and authority management.
Example two:
referring to fig. 1 and 2, the present embodiment provides a TCU system, including a TCU module in the first embodiment and a vehicle body CAN bus connected to the TCU module, a 4G module in the TCU module is responsible for receiving and sending data from and to the outside, a CPU core processing module is responsible for analyzing and processing received data and messages, a CAN transceiver is responsible for transmitting data sent by the CPU core processing module to the vehicle body CAN bus, and each module performs communication through a hardware bus.
When network attack occurs, an attacker CAN permeate a CPU core processing module through a 4G module in the form of a network message, disguise a normal program process by using a system or program bug, access key resources or promote access authority to control the CPU core processing module by injecting destructive codes, and further transmit destructive instructions to a vehicle body CAN bus through a CAN transceiver, as the CAN transceiver and the 4G module are taken as communication transceiving modules and do not usually have identification and filtering capabilities of the network message, and the attacker usually also takes the control CPU core processing module as an intrusion target, taking a background remote control vehicle as an example, as shown in FIG. 3, a background instruction is driven into the system through APN (access point name) equipment in the form of the network message, the network service module receives the message through a network communication interface provided by an operating system, usually except for transceiving of the message, the module is also responsible for encryption and decryption of communication, and primarily analyzes the message according to a format, the network service module forwards the message to an application program with a corresponding processing function according to the analyzed command word, the remote control processing application further obtains specific instructions and CAN parameters, and issues the instructions through a communication interface of the CAN transceiver; the CAN transceiver communication driving module sends the sent message to a corresponding ECU through a vehicle body CAN bus, when network attack occurs, an attacker CAN acquire access authority by utilizing a vulnerability of an application program, a service program or an operating system, or pretend to be a normal program to carry out system call to access key resources, and then sends a destructive instruction through injecting or tampering the program. Therefore, the network service interface, the network service module and the application program CAN be attacked, so that the defense detection of the CPU core processing module is taken as a main implementation means in the implementation, when an intruder penetrates the CPU core processing module and tries to acquire authority or access key resources in an unauthorized way, when the intruder passes through the firewall and the white list management module, abnormal operation CAN be refused, the system CAN detect abnormal behaviors of the program, the intruded program is actively analyzed, after the intrusion is confirmed, the network service module sends an alarm to a background and isolates the system by a method of cutting off the communication of the CAN transceiver, and a destructive control instruction is prevented from being issued to a vehicle body through a vehicle body CAN bus, so that the aim of protecting the safety of the vehicle is fulfilled.
As shown in fig. 4, in the system, a program is logically wrapped by a control gateway as a target process, and all resource accesses including a memory, a CPU, a Flash, a bus and the like need to be authenticated through the access control gateway and then be readable and writable. Generally, a process loads executable binary code into a memory at startup, reads data from the memory during operation, and places temporary data generated during operation into a stack, where all code and data are placed in different segments according to type, such as code in code segments, temporary data in stacks, constants in data segments, and so on. Therefore, in order to prevent the codes and data of the memory from being tampered, besides configuring the white list management module of the access segment range according to each program process, each memory segment also needs to set a boundary attribute, each process can only access the resources allowed by the white list management module, and when the resources except the white list management module are denied, the access monitoring module records a log and scans whether the process is abnormal or not.
The main prevention of network intrusion in this embodiment is mainly through: (1) The enhanced access control of the program process sets access attribute and authority through a white list management module to prevent an attacker from tampering or injecting codes. For example, when an attacker attempts to modify the memory data with a vulnerability, the read-only property in the memory will refuse the operation; (2) By forcibly accessing and isolating the problem process, after an attacker successfully modifies the application program by using the vulnerability, the attacker is prevented from further damaging the system even if the behavior of the process is controlled due to the limitations of authority and access; (3) When illegal access or unauthorized operation occurs, the system checks the operation or the subject of the access to judge whether the operation or the subject of the access is invaded; (4) And when the system is confirmed to be invaded, actively alarming and cutting off the connection of the vehicle body through the network.
Example three:
the embodiment provides a protection method based on the TCU system in the second embodiment, which includes the following steps: s1, a target program process calls a system interface to access system resources, and a control gateway checks whether the accessed resources are in the process range; s2, accessing the resources in the process range, performing access operation and returning a result; if the access resource is not in the process range, jumping to the step S3; s3, the control gateway informs the access monitoring module to check whether the process accesses hardware peripherals, kernel interfaces or permission change; if yes, jumping to the step S4; if not, refusing the access operation and returning to the access failure; s4, the access monitoring module checks whether the process is abnormal, namely, checks whether all access records of the process have illegal operation records; checking whether the code is tampered, and comparing the program process code stored in the storage area with the code in the current memory; checking whether the current process authority and account are valid and whether the current process authority and account are unauthorized; checking the memory, namely checking whether the current code, data and stack segment of the process are in the attribute range set by the segment; if yes, recording the exception and informing an exception processing module to perform exception processing; if not, returning and recording the access failure result.
The exception handling in step S4 specifically includes: the abnormity processing module sends preset alarm information to a system background and forbids the communication of the CAN transceiver, so that a destructive control instruction is prevented from being issued to a vehicle body through a vehicle body CAN bus, and the aim of protecting the safety of the vehicle is fulfilled.
The access control module arranges the access priorities of the device driver, the memory management, the file system, the process resource and the authority management, and the specific arrangement sequence can be arranged according to the importance of the access priorities, as shown in fig. 5, after the system receives an access request, the control gateway checks whether the accessed resource is in the process range, and if the accessed resource is in the process range, the access control module enters the queue according to the priority, performs access operation and returns a result; if the access resource is not in the process range, judging whether to access key resources or change the authority, wherein the key resources comprise hardware peripherals, kernel interfaces and the like, and if not, refusing the access operation and returning access failure; if yes, checking the access record, checking the process code change and checking the memory interval, and if the result is abnormal, recording the abnormal condition and informing the network module to alarm and cut off the communication of the CAN controller; if not, returning and recording the access failure result.
The embodiments of the present invention have been described in detail with reference to the drawings, but the present invention is not limited to the above embodiments, and various changes can be made within the knowledge of those skilled in the art without departing from the gist of the present invention.

Claims (8)

1. The utility model provides a TCU module, includes 4G module, CPU core processing module and the CAN transceiver that connects gradually, its characterized in that: the CPU core processing module comprises an application component, a service component connected with the application component and an operating system connected with the service component, wherein the operating system comprises a system interface and a kernel driver connected with the system interface, the kernel driver comprises a control gateway, the control gateway is connected with an access monitoring module and an access request module, and the access monitoring module is connected with an exception processing module; the program is taken as a target process and logically wrapped by the control gateway, and the access of hardware resources needs to be verified by the access control gateway and then read and written;
the TCU module is used for executing the following protection methods:
s1, a target program process calls a system interface to access system resources, and a control gateway checks whether the accessed resources are in the range of the process;
s2, accessing the resources within the process range, performing access operation and returning a result;
if the access resource is not in the range of the process, jumping to the step S3;
s3, the control gateway informs the access monitoring module to check whether the process accesses hardware peripherals, kernel interfaces or permission change;
if yes, jumping to the step S4; if not, the access operation is refused and the access failure is returned;
s4, the access monitoring module checks whether the process is abnormal or not;
if yes, recording the exception and informing an exception processing module to process the exception; if not, returning and recording the access failure result;
the step S4 of accessing the monitoring module to check whether the process is abnormal specifically includes the following steps: checking whether all access records of the process have illegal operation records; checking whether the code is tampered; checking whether the current process authority and account are valid and whether the current process authority and account are unauthorized;
the control gateway checks whether the accessed resource is in the range of the process, including:
if the access resource is not in the range of the process, judging whether to access key resources or change the authority, wherein the key resources comprise hardware peripherals and kernel interfaces, and if not, refusing the access operation and returning access failure; if yes, checking the access record, checking the process code change and checking the memory interval, and if the result is abnormal, recording the abnormal condition and informing the network module to alarm and cut off the communication of the CAN controller; if not, returning and recording the access failure result.
2. The TCU module of claim 1, wherein: the control gateway comprises a white list management module and an access control module connected with the white list management module.
3. The TCU module of claim 2, wherein: the access request module comprises device driving, memory management, a file system, process resources and authority management.
4. The TCU module according to claim 1, wherein the exception handling in step S4 specifically comprises: and the abnormity processing module sends preset alarm information to a system background and prohibits the communication of the CAN transceiver.
5. The TCU module of claim 1, wherein the checking whether the code is tampered with is specifically: the program process code stored in the memory area is compared with the code currently in memory.
6. The TCU module of claim 1, wherein the step S4 of checking the process for exceptions by the access monitor module further comprises the following steps: and (4) memory checking, namely checking whether the current code, data and stack segment of the process are in the attribute range set by the segment.
7. The TCU module of claim 1, wherein: the access control module ranks access priorities of device drivers, memory management, file systems, process resources, and rights management.
8. A TCU system, comprising: comprising a TCU module according to claim 3 and a body CAN bus connected to the TCU module.
CN201811009179.1A 2018-08-31 2018-08-31 TCU module, TCU system and protection method Active CN109344609B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811009179.1A CN109344609B (en) 2018-08-31 2018-08-31 TCU module, TCU system and protection method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811009179.1A CN109344609B (en) 2018-08-31 2018-08-31 TCU module, TCU system and protection method

Publications (2)

Publication Number Publication Date
CN109344609A CN109344609A (en) 2019-02-15
CN109344609B true CN109344609B (en) 2023-02-28

Family

ID=65292108

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811009179.1A Active CN109344609B (en) 2018-08-31 2018-08-31 TCU module, TCU system and protection method

Country Status (1)

Country Link
CN (1) CN109344609B (en)

Families Citing this family (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2020167607A (en) * 2019-03-29 2020-10-08 マツダ株式会社 Automobile arithmetic system and reception data processing method
CN110266717A (en) * 2019-07-03 2019-09-20 北京百度网讯科技有限公司 Information detecting method and device
CN111314354B (en) * 2020-02-19 2021-11-16 北京天融信网络安全技术有限公司 Intelligent vehicle communication method and device, electronic equipment and readable storage medium
CN111464417A (en) * 2020-04-09 2020-07-28 东风汽车集团有限公司 Vehicle-mounted network architecture based on gigabit Ethernet bus and communication method
CN112258683B (en) * 2020-10-20 2022-07-01 云账户技术(天津)有限公司 Inspection method and device for business system
CN115223273B (en) * 2021-04-21 2024-02-23 广州汽车集团股份有限公司 TCU data monitoring method and device, terminal equipment and storage medium
CN115102706B (en) * 2022-04-27 2023-10-20 麦格纳斯太尔汽车技术(上海)有限公司 HOST-IDS safety detection system and method of vehicle ECU

Family Cites Families (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP5138949B2 (en) * 2007-02-07 2013-02-06 日立オートモティブシステムズ株式会社 In-vehicle gateway device
CN101446830A (en) * 2008-12-25 2009-06-03 奇瑞汽车股份有限公司 Vehicle fault diagnosis instrument and fault diagnosis method
CN102416872A (en) * 2011-10-14 2012-04-18 奇瑞汽车股份有限公司 Method and device for acquiring vehicle speed signal for automobile combination instrument
US9173100B2 (en) * 2011-11-16 2015-10-27 Autoconnect Holdings Llc On board vehicle network security
CN103112459B (en) * 2011-11-17 2015-07-29 中国北车股份有限公司 Locomotive control device, system and method
CN105867314A (en) * 2015-01-20 2016-08-17 株式会社日立制作所 Remote monitoring system and communication method thereof
CN105553946B (en) * 2015-12-08 2018-08-14 严威 Onboard system based on CAN bus fire wall and its control method
CN106357633A (en) * 2016-09-07 2017-01-25 惠州市德赛西威汽车电子股份有限公司 Method and device for protecting car TCU data

Also Published As

Publication number Publication date
CN109344609A (en) 2019-02-15

Similar Documents

Publication Publication Date Title
CN109344609B (en) TCU module, TCU system and protection method
KR102642875B1 (en) Systems and methods for providing security to in-vehicle networks
US11574043B2 (en) Context-based secure controller operation and malware prevention
CN111448787B (en) System and method for providing a secure in-vehicle network
JP7253663B2 (en) MONITORING DEVICE, MONITORING SYSTEM AND MONITORING METHOD
US11379587B2 (en) Method and system for setting electronic controller security function
CN111010384A (en) Self-security defense system and security defense method for terminal of Internet of things
KR102433928B1 (en) System for Managing Cyber Security of Autonomous Ship
US11938900B2 (en) Auto-immobilization of machines capable of moving
CN116708210A (en) Operation and maintenance processing method and terminal equipment
Hamad et al. Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System.
KR20110100839A (en) System and method for logically separating servers from clients on network using virtualization of client
CN108090376B (en) CAN bus data protection method and system based on TrustZone
Strandberg et al. Resilient shield: Reinforcing the resilience of vehicles against security threats
CN111291425B (en) Chip protection method and device, storage medium and vehicle-mounted chip
EP3904161A1 (en) Information processing device
Hamad et al. Intrusion response system for vehicles: Challenges and vision
Chen et al. Classified security protection evaluation for vehicle information system
Park et al. Case study for defining security goals and requirements for automotive security parts using threat modeling
KR20210103972A (en) System and method for intrusion detection on in-vehicle network
Okuyama Formulation of a Comprehensive Threat Model for Automated Driving Systems Including External Vehicular Attacks such as V2X and the Establishment of an Attack Evaluation Method through Telecommunication
CN106789932B (en) Network system safety protection method and device based on component hopping
Kawanishi et al. A study of the risk quantification method focusing on direct-access attacks in cyber-physical systems
JP2022024266A (en) Log analyzer
CN113141612B (en) High-reliability management and control method and system for mobile terminal

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant