Browse > Article
http://dx.doi.org/10.13089/JKIISC.2015.25.4.793

A Study on Supply Chain Risk Management of Automotive  

Kim, Dong-won (Graduate School of Information Security, Korea University)
Han, Keun-hee (Graduate School of Convergence Software, Korea University)
Jeon, In-seok (Graduate School of Information Security, Korea University)
Choi, Jin-yung (Graduate School of Convergence Software, Korea University)
Abstract
Due to the rise of automotive security problems following automotive safety and the progress of the internet technology leading to a hyper-connected society, guaranteeing the safety of automotive requires security plans in the supply chain assurance and automotive software, and risk management plans for identifying, evaluating, and controlling the risks that may occur from the supply chain since the modern automotive is a Safety Critical system. In this paper, we propose a study on Automotive Supply Chain Risk Management (A-SCRM) procedures by person interested within the automotive Life-Cycle.
Keywords
Automotive Supply Chain Risk Management; A-SCRM; SSCA;
Citations & Related Records
연도 인용수 순위
  • Reference
1 Seonghyun Yun, "A study on international standards and safety requirements for the development of automotive safety-related software," KSAE, pp. 1884-1890, Sep. 2009.
2 Younho Kim, "A Method of System Requirements Specification Corresponding to ISO 26262 Functional Safety," KSAE, pp. 1548-1553, Sep. 2011.
3 Automotive SPICE, www.automotivespice.com, Introduction, 2013.
4 IEC 61508, "Functional safety of E/E/PE safety-related systems," IEC, Part 1-7, 1999.
5 ISO CD 26262, "Road vehicles Functional Safety," ISO, Part 1-9, Nov. 2011.
6 AUTOSAR, "Main Requirements," Sep. 2008.
7 AUTOSAR, "Specification of operating system," Jun. 2008.
8 Stephen Checkoway, "Comprehensive Experimental Analyses of Automotive Attack Surfaces," USENIX Security, pp.1-16, Nov. 2011.
9 Kari Koscher, "Experimental Security Analysis of a Moderm Automobile," IEEE Symposium of Security and Privacy, pp. 16-19, May. 2010.
10 Ishtiaq Rouf, "Security and Privcy Vulnerabilities of In-Car Wireless Network: A Tire Pressure Monitoring System Case Study," USENIX Security, pp.1-16, Aug. 2010.
11 Kang-suk Kim, "Analysis of potential external threats vehicle ECU via CAN communications eavesdropping and manipulation," Master. Thesis, Korea University, Dec, 2010,
12 US: Researchers hack BMW, OnStar, Ford SYNC and Hyundai telematics, "http://telematicsnews.info/2011/07/29/us-researchers-hack-bmw-onstar-ford-sync-and-hyundai-telematics_jl2291," Telematicsnews, July. 2011.
13 Hacker Disables More Than 100 Cars Remotely, "http://www.wired.com/threatlevel/2010/03/hacker-bricks-cars," WIRED,
14 Hackers steal Subaru Outback with smartphone, "http://content.usatoday.com/communities/driveon/post/2011/08/hackers-show-you-could-steal-a-subaru-with-your-smart-phone-black-hat-unlock-start/1#.VcB3YvntlBc," DRIVEON, Aug. 2011.
15 SBS News, "http://news.sbs.co.kr/section_news/news_read.jsp?news_id=N1001371173," Sep. 2012.
16 hankooki.com, "http://news.hankooki.com/lpage/world/201303/h2013032502344222450.htm," hankooki, Mar. 2013.
17 Police admit they're 'stumped' by mystery car thefts, "http://www.today.com/news/police-admit-theyre-stumped-mystery-car-thefts-6C10169993," TODAY, Jun. 2013.
18 Won-jong Kim, "Car Securtiy Technology," NIPA, Week Technology Trends, vol. 1601, pp. 10-20, Jun. 2013.
19 Software Assurance, "Software Assurance in Acquisition and Contract Language," buildsecurityin.us-cert.gov, Acquisition & Outsourcing, Vol. 1, May. 2012.
20 Guan-tak Lim, "On the Improvement and Application of the FMEA Process in ISO 26262," Ph.D. Thesis, AJOU University, Dec. 2013.
21 Rome, NY: Data and Analysis Center for Software, "Software Development Security: A Risk Management Perspective," in The DOD Software Tech News Secure Software Engineering 8, no. 2, July. 2005.
22 NIST SP800-161, "Supply Chain Risk Management Practices for Federal Information Systems and Organizations(Second Draft)." NIST, June. 2014.
23 IPA "Approaches for Embedded System Information Security(2010 revised Edition)," IPA, Sep. 2010.
24 EVITA, "Security requirements for automotive on-board networks based on dark-side scenarios," EVITA, July. 2008.
25 IPA, "Approaches for Vehicle Information Security," IPA, Aug. 2013.
26 Young-Hun Ki, "Implementation of the Integrated ESP and ACC in a CAN-Based Control System," KSAE, pp. 2231-2236, Jun. 2007.