Tomas Olovsson

Avdelningschef vid Dator- och nätverkssystem

Källa: chalmers.se
Image of Tomas Olovsson

Visar 71 publikationer

2023

The Automotive BlackBox: Towards a Standardization of Automotive Digital Forensics

Kim Strandberg, Ulf Arnljung, Tomas Olovsson
WIFS 2023 - IEEE Workshop on Information Forensics and Security
Paper i proceeding
2023

Gap analysis of ISO/SAE 21434 – Improving the automotive cybersecurity engineering life cycle

Daniel Grimm, Aljoscha Lautenbach, Magnus Almgren et al
IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC, p. 1904-1911
Paper i proceeding
2023

Secure Vehicle Software Updates: Requirements for a Reference Architecture

Kim Strandberg, Ulf Arnljung, Tomas Olovsson et al
IEEE Vehicular Technology Conference. Vol. 2023-June
Paper i proceeding
2023

A Systematic Literature Review on Automotive Digital Forensics: Challenges, Technical Solutions and Data Collection

Kim Strandberg, Nasser Nowdehi, Tomas Olovsson
IEEE Transactions on Intelligent Vehicles. Vol. 8 (2), p. 1350-1367
Artikel i vetenskaplig tidskrift
2022

Future connected vehicles: Communications demands, privacy and cyber-security

Tomas Olovsson, Tommy Svensson, Jiaming Wu
Communications in Transportation Research. Vol. 2
Övrig text i vetenskaplig tidskrift
2021

Security of In-Vehicle Communication Systems

Dennis Dubrefjord, Myeong-jin Jang, Oscar Carlsson et al
Decision Support Systems and Industrial IoT in Smart Grid, Factories, and Cities, p. 162-179
Kapitel i bok
2021

Proposing HEAVENS 2.0 – an automotive risk assessment model

Aljoscha Lautenbach, Magnus Almgren, Tomas Olovsson
Proceedings - CSCS 2021: ACM Computer Science in Cars Symposium
Paper i proceeding
2021

UniSUF: a unified software update framework for vehicles utilizing isolation techniques and trusted execution environments

Kim Strandberg, Dennis Kengo Oka, Tomas Olovsson
19th escar Europe : The World's Leading Automotive Cyber Security Conference, p. 86-100
Paper i proceeding
2021

V2C: A Trust-Based Vehicle to Cloud Anomaly Detection Framework for Automotive Systems

Thomas Rosenstatter, Tomas Olovsson, Magnus Almgren
ACM International Conference Proceeding Series, p. 1-10
Paper i proceeding
2021

Spectra: Detecting Attacks on In-Vehicle Networks through Spectral Analysis of CAN-Message Payloads

Wissam Aoudi, Nasser Nowdehi, Magnus Almgren et al
Proceedings of the ACM Symposium on Applied Computing, p. 1588-1597
Paper i proceeding
2021

Resilient Shield: Reinforcing the Resilience of Vehicles Against Security Threats

Kim Strandberg, Thomas Rosenstatter, Rodi Jolak et al
IEEE Vehicular Technology Conference. Vol. 2021-April
Paper i proceeding
2020

REMIND: A Framework for the Resilient Design of Automotive Systems

Thomas Rosenstatter, Kim Strandberg, Rodi Jolak et al
Proceedings - 2020 IEEE Secure Development, SecDev 2020, p. 81-95
Paper i proceeding
2019

Extending AUTOSAR's Counter-based Solution for Freshness of Authenticated Messages in Vehicles

Thomas Rosenstatter, Christian Sandberg, Tomas Olovsson
Proceedings of IEEE Pacific Rim International Symposium on Dependable Computing, PRDC. Vol. 2019-December, p. 1-109
Paper i proceeding
2019

A Preliminary Security Assessment of 5G V2X

Aljoscha Lautenbach, Nasser Nowdehi, Tomas Olovsson et al
IEEE Vehicular Technology Conference. Vol. 2019-April
Paper i proceeding
2019

Understanding Common Automotive Security Issues and Their Implications

Aljoscha Lautenbach, Magnus Almgren, Tomas Olovsson
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 11552 LNCS, p. 19-34
Paper i proceeding
2019

CASAD: CAN-Aware Stealthy-Attack Detection for In-Vehicle Networks

Nasser Nowdehi, Wissam Aoudi, Magnus Almgren et al
Preprint
2018

What the Stack? On Memory Exploitation and Protection in Resource Constrained Automotive Systems

Aljoscha Lautenbach, Magnus Almgren, Tomas Olovsson
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 10707 LNCS, p. 185-193
Paper i proceeding
2018

Open Problems when Mapping Automotive Security Levels to System Requirements

Thomas Rosenstatter, Tomas Olovsson
Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems . Vol. 2018-March, p. 251-260
Paper i proceeding
2018

Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms

Thomas Rosenstatter, Tomas Olovsson
IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC. Vol. 2018-November, p. 1501-1507
Paper i proceeding
2018

Securing the Connected Car: A Security Enhancement Methodology

Kim Strandberg, Tomas Olovsson, Erland Jonsson
IEEE Vehicular Technology Magazine. Vol. 13 (1), p. 56-65
Artikel i vetenskaplig tidskrift
2017

Joint Subjective and Objective Data Capture and Analytics for Automotive Applications

Mathias Johanson, Jonas Jalminger, Emmanuel Frécon et al
IEEE Vehicular Technology Conference. Vol. 2017-September
Paper i proceeding
2017

In-vehicle CAN message authentication: An evaluation based on industrial criteria

Nasser Nowdehi, Aljoscha Lautenbach, Tomas Olovsson
IEEE Vehicular Technology Conference. Vol. 2017-September, p. 2413-2419
Paper i proceeding
2017

Introducing Differential Privacy to the Automotive Domain: Opportunities and Challenges

Boel Nelson, Tomas Olovsson
IEEE Vehicular Technology Conference. Vol. 2017-September, p. 1-7
Paper i proceeding
2016

Security and Privacy for Big Data: A Systematic Literature Review

Boel Nelson, Tomas Olovsson
2016 IEEE International Conference on Big Data (Big Data), p. 3693-3702
Paper i proceeding
2016

Improving In-Vehicle Network Architectures Using Automated Partitioning Algorithms

Nasser Nowdehi, Pierre Kleberger, Tomas Olovsson
IEEE Vehicular Networking Conference, VNC. Vol. 2016-January, p. 259 - 266
Paper i proceeding
2016

A risk assessment framework for automotive embedded systems

Mafijul Islam, Aljoscha Lautenbach, C. Sandberg et al
CPSS '16: Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, p. 3-14
Paper i proceeding
2015

Towards designing secure in-vehicle network architectures using community detection algorithms

Pierre Kleberger, Nasser Nowdehi, Tomas Olovsson
IEEE Vehicular Networking Conference, VNC. Vol. 2015-January (January), p. 69-76
Paper i proceeding
2014

Experiences from Implementing the ETSI ITS SecuredMessage Service

Nasser Nowdehi, Tomas Olovsson
2014 IEEE Intelligent Vehicles Symposium. June 8 - 11, 2014, Dearborn, Michigan, USA, p. 1055-1060
Paper i proceeding
2014

A Graph-Based Analysis of Medical Queries of a Swedish Health Care Portal

Farnaz Moradi, Ann-Marie Eklund, Dimitrios Kokkinakis et al
Proceedings of the 5th International Workshop on Health Text Mining and Information Analysis, p. 2-10
Paper i proceeding
2014

Securing Vehicle Diagnostics in Repair Shops

Pierre Kleberger, Tomas Olovsson
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8666 LNCS, p. 93-108
Paper i proceeding
2014

Overlapping Communities for Identifying Misbehavior in Network Communications

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8443, p. 398-409
Paper i proceeding
2014

A Local Seed Selection Algorithm for Overlapping Community Detection

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas
The 2014 IEEE/ACM International Conference on Advances in Social Network Analysis and Mining (ASONAM), p. 1-8
Paper i proceeding
2013

A First Security Analysis of a Secure Intermodal Goods Transport System

JONAS ANGHOLT, Mikael Wackerberg, Tomas Olovsson et al
Rapport
2013

Protecting Vehicles Against Unauthorised Diagnostics Sessions Using Trusted Third Parties

Pierre Kleberger, Tomas Olovsson
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 8153 LNCS (8153), p. 70-81
Paper i proceeding
2012

Towards Modeling Legitimate and Unsolicited Email Traffic Using Social Network Properties

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas
Proceedings of the Fifth Workshop on Social Network Systems, SNS'12. 5th Workshop on Social Network Systems, Bern,10 April 2012
Paper i proceeding
2012

Assessing the Quality of Packet-Level Traces Collected on Internet Backbone Links

Behrooz Sangchoolie, Mazdak Rajabi Nasab, Tomas Olovsson et al
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7617 LNCS, p. 184-198
Paper i proceeding
2012

An Evaluation of Community Detection Algorithms on Large-Scale Email Traffic

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 7276 LNCS, p. 283-294
Paper i proceeding
2012

An In-Depth Analysis of the Security of the Connected Repair Shop

Pierre Kleberger, Tomas Olovsson, Erland Jonsson
The Seventh International Conference on Systems and Networks Communications (ICSNC), Proceedings. Lisbon, 18-23 November, 2012. IARIA., p. 99-107
Paper i proceeding
2012

Mining Network-Level Communication Patterns of Email Traffic for Spotting Unsolicited Email

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas
Rapport
2012

The anti-social behavior of spam

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas
Proceedings - 2011 7th European Conference on Computer Network Defense, EC2ND 2011, Gothenburg, 6-7 September 2011, p. 57-
Paper i proceeding
2011

A Framework for Assessing the Security of the Connected Car Infrastructure

Pierre Kleberger, ASRIN JAVAHERI, Tomas Olovsson et al
The Sixth International Conference on Systems and Networks Communications (ICSNC), Proceedings. Barcelona, 23-29 October 2011. IARIA., p. 236-241
Paper i proceeding
2011

Mapping Systems Security Research at Chalmers

Magnus Almgren, Zhang Fu, Erland Jonsson et al
First SysSec Workshop (SysSec 2011), p. 67-70
Paper i proceeding
2011

Security aspects of the in-vehicle network in the connected car

Pierre Kleberger, Tomas Olovsson, Erland Jonsson
IEEE Intelligent Vehicles Symposium, Proceedings. Baden-Baden, 5-9 June 2011, p. 528-533
Paper i proceeding
2011

Structural and Temporal Properties of Email and Spam Networks

Farnaz Moradi, Tomas Olovsson, Philippas Tsigas
Rapport
2011

On Collection of Large-Scale Multi-Purpose Datasets on Internet Backbone Links

Farnaz Moradi, Magnus Almgren, Wolfgang John et al
The First Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2011, Salzburg, Austria, 10 April 2011, p. 62-69
Paper i proceeding
2010

Passive Internet Measurement: Overview and Guidelines based on Experiences

Wolfgang John, Sven Tafvelin, Tomas Olovsson
Computer Communications. Vol. 33 (5), p. 533-550
Artikel i vetenskaplig tidskrift
2009

An Analysis of the Robustness and Stability of the Network Stack in Symbian-based Smartphones

Sheikh Mahbub Habib, Jacob Cyril, Tomas Olovsson
Journal of Networks. Vol. Vol 4 (No. 10, 2009), p. 968-975
Artikel i vetenskaplig tidskrift
2009

Access management evolves over 20 years

Tomas Olovsson
Secure Computing Magazine. Vol. 2009 (November), p. 4-5
Artikel i övrig tidskrift
2008

Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic

Wolfgang John, Sven Tafvelin, Tomas Olovsson
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 4979/2008, p. 192-201
Paper i proceeding
2008

A Practical Analysis of the Robustness and Stability of the Network Stack in Smartphones

Sheikh Mahbub Habib, Cyril Jacob, Tomas Olovsson
IEEE International Conference on Computer and Information Technology, ICCIT 2008
Paper i proceeding
2008

Detection of malicious Traffic on Backbone links via Packet Header Analysis

Wolfgang John, Tomas Olovsson
Campus-Wide Information Systems. Vol. 25 (5), p. 342 - 358
Artikel i vetenskaplig tidskrift
2008

De-perimeterization: How to make it a reality in a cost-effective way

Sheikh Mahbub Habib, jakob cyril, Tomas Olovsson
Acia Pacific Networking Group APNG 10th Camp 2008
Paper i proceeding
2005

The Jericho Forum: De-perimeterisation of network resources

Tomas Olovsson, Jamie Bodley-Scott
Black Hat Conference 2005 / Jericho Challenge Winner
Paper i proceeding
1997

A quantitative model of the security intrusion process based on attacker behavior

Erland Jonsson, Tomas Olovsson
IEEE Transactions on Software Engineering. Vol. 23 (4), p. 235-245
Artikel i vetenskaplig tidskrift
1997

Security intrusion process: an empirical model

Erland Jonsson, Tomas Olovsson
IEEE Aerospace and Electronic Systems Magazine. Vol. 12 (4), p. 7-17
Artikel i vetenskaplig tidskrift
1996

An analysis of a secure system based on trusted components

Ulf Lindqvist, Tomas Olovsson, Erland Jonsson
IEEE Proceedings of the Eleventh Annual Conference on Computer Assurance, COMPASS '96, p. 213-223
Paper i proceeding
1996

Security Assessment Based on Attacker Behavior

Erland Jonsson, Tomas Olovsson
Nordic Workshop on Secure Computer Systems, NORDSEC '96
Paper i proceeding
1996

An Empirical Model of the Security Intrusion Process

Erland Jonsson, Tomas Olovsson
Proceedings of the Eleventh Annual Conference on Computer Assurance, 1996. COMPASS 1996., p. 176-186
Artikel i vetenskaplig tidskrift
1996

On the modelling of preventive security based on a PC network intrusion experiment

Ulf Gustafson, Erland Jonsson, Tomas Olovsson
ACISP '96 Proceedings of the First Australasian Conference on Information Security and Privacy. Vol. 1172, p. 242-252
Paper i proceeding
1996

Security Evaluation of a PC Network based on Intrusion Experiments

Ulf Gustafson, Erland Jonsson, Tomas Olovsson
SECURICOM 1996 - 14th Worldwide Congress on Computer and Communications Security Protection
Artikel i vetenskaplig tidskrift
1995

Towards operational measures of computer security: Experimentation and modelling

Tomas Olovsson, Erland Jonsson, Sarah Brocklehurst et al
Predictably Secure Computing Systems, p. 555-572
Kapitel i bok
1995

Security Evaluation of a PC Network based on Intrusion Experiments

Ulf Gustafson, Erland Jonsson, Tomas Olovsson
Proc. 14th Int'l Congress on Computer and Communications Security, SECURICOM '96, Paris, France, p. 187-203
Paper i proceeding
1994

Security in a Dependability Perspective

Erland Jonsson, Tomas Olovsson
Nordic Seminar on Dependable Computing Systems 1994 (NSDCS '94), Lyngby, Denmark, p. 175-186
Paper i proceeding
1994

On measurement of operational security

Sarah Brocklehurst, Bev Littlewood, Tomas Olovsson et al
IEEE Aerospace and Electronic Systems Magazine. Vol. 9 (10), p. 7-16
Artikel i vetenskaplig tidskrift
1993

Security and Dependability - A Comparison of Concepts

Tomas Olovsson
IASTED International Conference on Reliability, Quality Control and Risk Assessment, Cambridge, MA, USA., p. 167-172
Paper i proceeding
1993

Data Collection for Security Fault Forecasting - Pilot Experiment

Tomas Olovsson, Erland Jonsson, Sarah Brocklehurst et al
Predictably Dependable Computing Systems (PDCS) First Year Report, p. 515-560
Artikel i vetenskaplig tidskrift
1992

A Structured Approach to Computer Security

Tomas Olovsson
Rapport
1992

Security forms for protection against vulnerabilities in computer systems

Tomas Olovsson, Erland Jonsson
IASTED International conference on Reliability, Quality control and Risk Assessment, Washington DC, USA., p. 138-143
Paper i proceeding
1992

On the Integration of Security and Dependability in Computer Systems

Erland Jonsson, Tomas Olovsson
IASTED International Conference on Reliability, Quality Control and Risk Assessment Washington DC, USA, 1992, ISBN 0-88986-171-4, p. 93-97
Paper i proceeding

Ladda ner publikationslistor

Du kan ladda ner denna lista till din dator.

Filtrera och ladda ner publikationslista

Som inloggad användare hittar du ytterligare funktioner i MyResearch.

Du kan även exportera direkt till Zotero eller Mendeley genom webbläsarplugins. Dessa hittar du här:

Zotero Connector
Mendeley Web Importer

Tjänsten SwePub erbjuder uttag av Researchs listor i andra format, till exempel kan du få uttag av publikationer enligt Harvard och Oxford i .RIS, BibTex och RefWorks-format.

Det finns inga projekt att visa.
Det kan finnas fler projekt där Tomas Olovsson medverkar, men du måste vara inloggad som anställd på Chalmers för att kunna se dem.