A Study on Supply Chain Risk Management of Automotive |
Kim, Dong-won
(Graduate School of Information Security, Korea University)
Han, Keun-hee (Graduate School of Convergence Software, Korea University) Jeon, In-seok (Graduate School of Information Security, Korea University) Choi, Jin-yung (Graduate School of Convergence Software, Korea University) |
1 | Seonghyun Yun, "A study on international standards and safety requirements for the development of automotive safety-related software," KSAE, pp. 1884-1890, Sep. 2009. |
2 | Younho Kim, "A Method of System Requirements Specification Corresponding to ISO 26262 Functional Safety," KSAE, pp. 1548-1553, Sep. 2011. |
3 | Automotive SPICE, www.automotivespice.com, Introduction, 2013. |
4 | IEC 61508, "Functional safety of E/E/PE safety-related systems," IEC, Part 1-7, 1999. |
5 | ISO CD 26262, "Road vehicles Functional Safety," ISO, Part 1-9, Nov. 2011. |
6 | AUTOSAR, "Main Requirements," Sep. 2008. |
7 | AUTOSAR, "Specification of operating system," Jun. 2008. |
8 | Stephen Checkoway, "Comprehensive Experimental Analyses of Automotive Attack Surfaces," USENIX Security, pp.1-16, Nov. 2011. |
9 | Kari Koscher, "Experimental Security Analysis of a Moderm Automobile," IEEE Symposium of Security and Privacy, pp. 16-19, May. 2010. |
10 | Ishtiaq Rouf, "Security and Privcy Vulnerabilities of In-Car Wireless Network: A Tire Pressure Monitoring System Case Study," USENIX Security, pp.1-16, Aug. 2010. |
11 | Kang-suk Kim, "Analysis of potential external threats vehicle ECU via CAN communications eavesdropping and manipulation," Master. Thesis, Korea University, Dec, 2010, |
12 | US: Researchers hack BMW, OnStar, Ford SYNC and Hyundai telematics, "http://telematicsnews.info/2011/07/29/us-researchers-hack-bmw-onstar-ford-sync-and-hyundai-telematics_jl2291," Telematicsnews, July. 2011. |
13 | Hacker Disables More Than 100 Cars Remotely, "http://www.wired.com/threatlevel/2010/03/hacker-bricks-cars," WIRED, |
14 | Hackers steal Subaru Outback with smartphone, "http://content.usatoday.com/communities/driveon/post/2011/08/hackers-show-you-could-steal-a-subaru-with-your-smart-phone-black-hat-unlock-start/1#.VcB3YvntlBc," DRIVEON, Aug. 2011. |
15 | SBS News, "http://news.sbs.co.kr/section_news/news_read.jsp?news_id=N1001371173," Sep. 2012. |
16 | hankooki.com, "http://news.hankooki.com/lpage/world/201303/h2013032502344222450.htm," hankooki, Mar. 2013. |
17 | Police admit they're 'stumped' by mystery car thefts, "http://www.today.com/news/police-admit-theyre-stumped-mystery-car-thefts-6C10169993," TODAY, Jun. 2013. |
18 | Won-jong Kim, "Car Securtiy Technology," NIPA, Week Technology Trends, vol. 1601, pp. 10-20, Jun. 2013. |
19 | Software Assurance, "Software Assurance in Acquisition and Contract Language," buildsecurityin.us-cert.gov, Acquisition & Outsourcing, Vol. 1, May. 2012. |
20 | Guan-tak Lim, "On the Improvement and Application of the FMEA Process in ISO 26262," Ph.D. Thesis, AJOU University, Dec. 2013. |
21 | Rome, NY: Data and Analysis Center for Software, "Software Development Security: A Risk Management Perspective," in The DOD Software Tech News Secure Software Engineering 8, no. 2, July. 2005. |
22 | NIST SP800-161, "Supply Chain Risk Management Practices for Federal Information Systems and Organizations(Second Draft)." NIST, June. 2014. |
23 | IPA "Approaches for Embedded System Information Security(2010 revised Edition)," IPA, Sep. 2010. |
24 | EVITA, "Security requirements for automotive on-board networks based on dark-side scenarios," EVITA, July. 2008. |
25 | IPA, "Approaches for Vehicle Information Security," IPA, Aug. 2013. |
26 | Young-Hun Ki, "Implementation of the Integrated ESP and ACC in a CAN-Based Control System," KSAE, pp. 2231-2236, Jun. 2007. |