A Model for Safe and Secure Execution of Downloaded Vehicle Applications
Paper in proceeding, 2010

Existing secure protocols and code signing mechanisms for vehicle systems to download and install software over the air certify only the origin and the integrity of software; thus, they do not address errors that might not be detected in the development process and cannot ensure that the downloaded software do not contain malicious code. In this paper, we identify such possible threats by developing a threat model for the vehicle software architecture. We propose countermeasures against the threats by preventing or modifying inappropriate behaviour caused by, e.g., malicious or poorly designed applications. We propose a model to deploy the approach which is based on modifying the application at the wireless gateway in the vehicle before being installed. As a result, security policies are embedded into the application and intercepts security relevant execution events. Thus, the execution of downloaded vehicle applications is monitored to ensure the safety and security for the vehicle system and to detect potential cyber attacks.

policy enforcement

malicious code

downloaded vehicle applications


Phu Phung

Chalmers, Computer Science and Engineering (Chalmers), Software Engineering and Technology (Chalmers)

Dennis Nilsson

Proceedings of Road Transport Information and Control - RTIC 2010, IET

9781849192422 (ISBN)

Areas of Advance

Information and Communication Technology

Subject Categories

Control Engineering

Computer Science



More information