Page not found. Your pixels are in another canvas.
A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.
This is a page not in th emain menu
Published in International Symposium on Smart Electric Distribution Systems and Technologies (EDST), 2015
Abstract: IEC 61499 is an open standard based on function blocks applied for distributed automation solutions. In this paper we discuss the application of IEC 61499 for designing and implementing event-based Smart Grid applications. We show that IEC 61499 is well suited in the context of Smart Grids at the example of the concrete use case of power exchange between several peers of the Smart Grid. The feasibility of IEC 61499 in the context of this use case is assessed on the basis of a prototypical implementation using the open source framework 4DIAC. We conclude that IEC 61499 is a powerful tool for engineering event-based Smart Grid applications.
Recommended citation: T. Rosenstatter, R. Wanger, S. Huber, T. Heistracher and D. Engel, "Applicability of IEC 61499 for event based Smart Grid applications," 2015 International Symposium on Smart Electric Distribution Systems and Technologies (EDST), Vienna, 2015, pp. 278-283. https://doi.org/10.1109/SEDST.2015.7315221
Published in IEEE Transactions on Intelligent Transportation Systems (Volume: 19, Issue: 4, April 2018), 2017
Vehicle-to-vehicle communication is a key technology for achieving increased perception for automated vehicles, where the communication enables virtual sensing by means of sensors in other vehicles. This paper presents a trust system that allows a cooperative and automated vehicle that uses V2V communication to make more reliable and safe decisions. Read more.
Recommended citation: T. Rosenstatter and C. Englund, "Modelling the Level of Trust in a Cooperative Automated Vehicle Control System," in IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 4, pp. 1237-1247, April 2018. https://doi.org/10.1109/TITS.2017.2749962
Published in IEEE Transactions on Intelligent Transportation Systems (Volume: 19, Issue: 4, April 2018), 2018
This paper is an experience report of team Halmstad from the participation in a competition organised by the i-GAME project, the Grand Cooperative Driving Challenge 2016. The competition was held in Helmond, The Netherlands, during the last weekend of May 2016. We give an overview of our car’s control and communication system that was developed for the competition following the requirements and specifications of the i-GAME project. Read more.
Recommended citation: M. Aramrattana et al., "Team Halmstad Approach to Cooperative Driving in the Grand Cooperative Driving Challenge 2016," in IEEE Transactions on Intelligent Transportation Systems, vol. 19, no. 4, pp. 1248-1261, April 2018. https://doi.org/10.1109/TITS.2017.2752359
Published in 4th International Conference on Vehicle Technology and Intelligent Transport Systems, VEHITS, 2018
We describe open problems that need to be addressed in a prospective security framework for the automotive domain. Based on a study of several safety and security standards from other areas as well as suggested automotive security models, we propose an appropriate representation of security levels which is similar to, and will work in parallel with traditional safety, and a method to perform the mapping to a set of predefined system requirements, design rules and security mechanisms. Read more.
Recommended citation: T. Rosenstatter and T. Olovsson, "Open Problems when Mapping Automotive Security Levels to System Requirements," 4th International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS), Funchal, 2018, pp. 251-260. https://dx.doi.org/10.5220/0006665302510260
Published in 21st International Conference on Intelligent Transportation Systems (ITSC), 2018
We first suggest that the risk assessment process should result in five security levels. Further, we identify suitable security mechanisms and design rules for automotive system design and associate them with appropriate security levels. Our proposed methodology is as much as possible aligned with ISO 26262 and we believe that it should therefore be realistic to deploy in existing organizations. Read more.
Recommended citation: T. Rosenstatter and T. Olovsson, "Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms," 2018 21st International Conference on Intelligent Transportation Systems (ITSC), Maui, HI, USA, 2018, pp. 1501-1507. https://doi.org/10.1109/ITSC.2018.8569679
Published in Project Deliverable of HoliSec HOLIstic Approach to Improve Data SECurity, 2019
This document presents a summary of our achievements in the area of security mechanisms for connected vehicles. We contribute to different areas, such as internal communication, requirements engineering, software development, and V2X communication. Read more.
Published in Technical report L - Department of Computer Science and Engineering, Chalmers University of Technology and Göteborg University: 198 , 2019
In this thesis we study various safety and security standards and proposed frameworks from different industrial domains with respect to their way of classifying demands in the form of levels and their methods to derive requirements. In our proposed framework, we suggest security levels appropriate for automotive systems and continue with a mapping between these security levels and identified security mechanisms and design rules to provide basic security. We further study in detail a mechanism which provides freshness to authenticated messages, namely AUTOSAR SecOC Profile 3, and present a novel extension that offers a faster synchronisation between ECUs and reduces the number of required messages for synchronisation. Read more.
Recommended citation: T. Rosenstatter, "Towards a Standardised Framework for Securing Connected Vehicles," Licentiate Thesis, Chalmers University of Technology, Sweden, 2019. https://research.chalmers.se/publication/511915
Published in 24th Pacific Rim International Symposium on Dependable Computing (PRDC), 2020
We analyse AUTOSAR SecOC Profile 3, a solution to provide freshness for authenticated messages, and further propose an extension of this security profile that copes with the limitations identified in our analysis. The extended profile provides a faster resynchronisation of the freshness value and consumes less bandwidth due to the reduction of the number of synchronisation messages needed. We evaluated our solution based on two demonstrators, one communicating via CAN bus and one communicating over Ethernet. Read more.
Recommended citation: T. Rosenstatter, C. Sandberg and T. Olovsson, "Extending AUTOSAR's Counter-Based Solution for Freshness of Authenticated Messages in Vehicles," 2019 IEEE 24th Pacific Rim International Symposium on Dependable Computing (PRDC), Kyoto, Japan, 2019, pp. 1-109. https://doi.org/10.1109/PRDC47002.2019.00012
Published in IEEE Secure Development Conference, 2020
In this paper, we contribute to supporting the design of resilient automotive systems. We review and analyze scientific literature on resilience techniques, fault tolerance, and dependability. As a result, we present the REMIND resilience framework providing techniques for attack detection, mitigation, recovery, and resilience endurance. Moreover, we provide guidelines on how the REMIND framework can be used against common security threats and attacks and further discuss the trade-offs when applying these guidelines. Read more.
Recommended citation: T. Rosenstatter, K. Strandberg, R. Jolak, R. Scandariato, T. Olovsson, "REMIND: A Framework for the Resilient Design of Automotive Systems," 2020 IEEE Secure Development Conference (SecDev), Atlanta, GA, USA, 2020, pp. 81-95. https://doi.org/10.1109/SecDev45635.2020.00028
Published in IEEE 91th Vehicular Technology Conference (VTC2021-Spring), 2021
In this paper, we perform a comprehensive threat and risk analysis on published attacks against vehicles and further derive necessary security and resilience techniques. In addition, we map between asset, attack, threat actor, threat category, and required mitigation mechanism for each attack, which results in a presentation of a secure and resilient vehicle design. Ultimately, we present the Resilient Shield a novel framework to justify and ensure security and resilience within the automotive domain. Read more.
Recommended citation: K. Strandberg, T. Rosenstatter, R. Jolak, N. Nowdehi, T. Olovsson, "Resilient Shield: Reinforcing the Resilience of Vehicles Against Security Threats," 2021 IEEE 93rd Vehicular Technology Conference (VTC2021-Spring), Helsinki, Finland, 2021, pp 1-7. https://doi.org/10.1109/VTC2021-Spring51267.2021.9449029
Published in 16th International Conference on Availability, Reliability and Security (ARES), 2021
In our proposed V2C Anomaly Detection framework, peer vehicles assess each other based on their perceived behavior in traffic and V2X-enabled interactions, and upload these assessments to the cloud for analysis. This framework consists of four modules. For each module we define functional demands, interfaces and evaluate solutions proposed in literature allowing manufacturers and fleet owners to choose appropriate techniques. We detail attack scenarios where this type of framework is particularly useful in detecting and identifying potential attacks and failing software and hardware. Furthermore, we describe what basic vehicle data the cloud analysis can be based upon. Read more.
Recommended citation: T. Rosenstatter, T. Olovsson, M. Almgren, "V2C: A trust-based vehicle to cloud anomaly detection framework for automotive systems," 16th International Conference on Availability, Reliability and Security (ARES 2021), Association for Computing Machinery, New York, NY, USA, Article 23, 1–10. https://doi.org/10.1145/3465481.3465750
Vehicular security was long limited to physical security - to prevent theft. However, the trend of adding more comfort functions and delegating advanced driving tasks back to the vehicle increased the magnitude of attacks, making cybersecurity inevitable. Attackers only need to find one vulnerability in the myriad of electronic control units (ECUs) and communication technologies used in a vehicle to compromise its functions. Vehicles might also be attacked by the owners, who want to modify or even disable certain vehicle functions.
We already have best practices and mechanisms for functional safety in place, however, a structured or standardised approach for identifying specific security mechanisms mandatory to be implemented are missing for the automotive domain. Our proposed approach covers basic security demands and enables a closer cooperation between safety and security work.
Master's course, Responsible for lab work, Chalmers University of Technology, CSE, 2019
Master's course, Teaching Assistant, Chalmers University of Technology, CSE, 2019
Elective Bachelor and Master's course, Teaching Assistant, Chalmers University of Technology, CSE, 2019