Academic literature on the topic 'Automotive Cybersecurity Regulations'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Automotive Cybersecurity Regulations.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Automotive Cybersecurity Regulations"

1

Luo, Feng, Xuan Zhang, Zhenyu Yang, et al. "Cybersecurity Testing for Automotive Domain: A Survey." Sensors 22, no. 23 (2022): 9211. http://dx.doi.org/10.3390/s22239211.

Full text
Abstract:
Modern vehicles are more complex and interconnected than ever before, which also means that attack surfaces for vehicles have increased significantly. Malicious cyberattacks will not only exploit personal privacy and property, but also affect the functional safety of electrical/electronic (E/E) safety-critical systems by controlling the driving functionality, which is life-threatening. Therefore, it is necessary to conduct cybersecurity testing on vehicles to reveal and address relevant security threats and vulnerabilities. Cybersecurity standards and regulations issued in recent years, such a
APA, Harvard, Vancouver, ISO, and other styles
2

Chlup, Sebastian, Korbinian Christl, Christoph Schmittner, Abdelkader Magdy Shaaban, Stefan Schauer, and Martin Latzenhofer. "THREATGET: Towards Automated Attack Tree Analysis for Automotive Cybersecurity." Information 14, no. 1 (2022): 14. http://dx.doi.org/10.3390/info14010014.

Full text
Abstract:
The automotive domain is moving away from simple isolated vehicles to interconnected networks of heterogeneous systems forming a complex transportation infrastructure. The additional means of communication result in increased attack surfaces which can be exploited by physical as well as remote attackers if not secured thoroughly. Thus, the automotive sector is exposed to new cyber risk factors. Consequently, joint approaches targeting securing vehicles and infrastructure by identifying and mitigating potential threats for the automotive domain have been developed in several research projects.
APA, Harvard, Vancouver, ISO, and other styles
3

Canino, Nicasio, Pierpaolo Dini, Stefano Mazzetti, Daniele Rossi, Sergio Saponara, and Ettore Soldaini. "Cybersecurity of Automotive Wired Networking Systems: Evolution, Challenges, and Countermeasures." Electronics 14, no. 3 (2025): 471. https://doi.org/10.3390/electronics14030471.

Full text
Abstract:
The evolution of Electrical and Electronic (E/E) architectures in the automotive industry has been a significant factor in the transformation of vehicles from traditional mechanical systems to sophisticated, software-defined machines. With increasing vehicle connectivity and the growing threats from cyberattacks that could compromise safety and violate user privacy, the incorporation of cybersecurity into the automotive development process is becoming imperative. As vehicles evolve into sophisticated interconnected systems, understanding their vulnerabilities becomes essential to improve cyber
APA, Harvard, Vancouver, ISO, and other styles
4

Researcher. "CYBERSECURITY IN AUTOMOTIVE NETWORKS: MITIGATING THREATS IN CAN, LIN AND AUTOMOTIVE ETHERNET SYSTEMS." International Journal of Computer Science and Engineering Research and Development (IJCSERD) 13, no. 2 (2025): 77–102. https://doi.org/10.5281/zenodo.14892661.

Full text
Abstract:
The increasing complexity and interconnectivity of modern vehicles have introduced significant cybersecurity challenges in in-vehicle communication networks, particularly in Controller Area Network (CAN), Local Interconnect Network (LIN), and Automotive Ethernet. While these protocols facilitate seamless data exchange between Electronic Control Units (ECUs), they were originally designed without robust security features, making them vulnerable to message spoofing, denial-of-service (DoS) attacks, and unauthorized access. Existing mitigation strategies, including message authentication, hardwar
APA, Harvard, Vancouver, ISO, and other styles
5

Kolodyazhny, Vlаdimir, Andriy Levterov, and Evgen Malashchuk. "Cybersecurity in cars: history of digitalization of cars, current status of the problem, sustainable development goals and standards." Bulletin of Kharkov National Automobile and Highway University, no. 96 (May 24, 2022): 59. http://dx.doi.org/10.30977/bul.2219-5548.2022.96.0.59.

Full text
Abstract:
Problem. At present, information security issues are a priority. The need for specialists with appropriate qualifications is growing, and educational institutions face the task of training students who plan to specialize in cybersecurity technologies, including cybersecurity of road transport and continue to work in the transport industry. Goal. The purpose of this article is to consider the history, current state of the problem and sustainable development of international cooperation in the field of cybersecurity in the automotive industry, which may be of interest to prospective students in
APA, Harvard, Vancouver, ISO, and other styles
6

Puder, Andreas, Jacqueline Henle, and Eric Sax. "Threat Assessment and Risk Analysis (TARA) for Interoperable Medical Devices in the Operating Room Inspired by the Automotive Industry." Healthcare 11, no. 6 (2023): 872. http://dx.doi.org/10.3390/healthcare11060872.

Full text
Abstract:
Prevailing trends in the automotive and medical device industry, such as life cycle overarching configurability, connectivity, and automation, require an adaption of development processes, especially regarding the security and safety thereof. The changing requirements imply that interfaces are more exposed to the outside world, making them more vulnerable to cyberattacks or data leaks. Consequently, not only do development processes need to be revised but also cybersecurity countermeasures and a focus on safety, as well as privacy, have become vital. While vehicles are especially exposed to cy
APA, Harvard, Vancouver, ISO, and other styles
7

Kifor, Claudiu Vasile, and Aurelian Popescu. "Automotive Cybersecurity: A Survey on Frameworks, Standards, and Testing and Monitoring Technologies." Sensors 24, no. 18 (2024): 6139. http://dx.doi.org/10.3390/s24186139.

Full text
Abstract:
Modern vehicles are increasingly interconnected through various communication channels, which requires secure access for authorized users, the protection of driver assistance and autonomous driving system data, and the assurance of data integrity against misuse or manipulation. While these advancements offer numerous benefits, recent years have exposed many intrusion incidents, revealing vulnerabilities and weaknesses in current systems. To sustain and enhance the performance, quality, and reliability of vehicle systems, software engineers face significant challenges, including in diverse comm
APA, Harvard, Vancouver, ISO, and other styles
8

De Santis, Marco, Edmund Jochim, Iulia-Cristiana Șodinca, Christian Esposito, and Rahamatullah Khondoker. "Threat Analysis and Risk Assessment of a Driver Monitoring System." Applied Sciences 15, no. 10 (2025): 5571. https://doi.org/10.3390/app15105571.

Full text
Abstract:
The incorporation of Driver Monitoring Systems (DMSs) in vehicles is fundamental to enhancing road safety by continuously assessing driver behavior and identifying signs of fatigue or distraction. However, as these technologies evolve, they also present considerable cybersecurity challenges. This research undertakes an extensive Threat Analysis and Risk Assessment (TARA) of DMSs, adhering to the ISO/SAE 21434 standard, to methodically detect and assess potential security threats. A total of 115 threats were recognized and classified into 95 low-risk, 16 medium-risk, and 4 high-risk scenarios,
APA, Harvard, Vancouver, ISO, and other styles
9

Yakovleva, A. V. "Legal Regulation in the Field of Cybersecurity of Intelligent Transport (Foreign Experience)." Gaps in Russian Legislation 17, no. 3 (2024): 37–43. http://dx.doi.org/10.33693/2072-3164-2024-17-3-037-043.

Full text
Abstract:
Abstract: At present, intelligent transport is a critical part of the modernization of the transport industry around the world. An intelligent transport system combines information technology, electronic technology, data transfer technology and system engineering technology to realize intellectual features, coordinate the elements of traffic system and create an integrated management system for transport, therefore making it a subject of critical information infrastructure. In this regard, data security and its protection from cyber attacks becomes a prerequisite for ensuring reliable and effi
APA, Harvard, Vancouver, ISO, and other styles
10

Gesteira-Miñarro, Roberto, Gregorio López, and Rafael Palacios. "Revisiting Wireless Cyberattacks on Vehicles." Sensors 25, no. 8 (2025): 2605. https://doi.org/10.3390/s25082605.

Full text
Abstract:
The automotive industry has been a prime target for cybercriminals for decades, with attacks becoming more sophisticated as vehicles integrate advanced digital technologies. In response, new standards and regulations have been introduced, requiring manufacturers to implement robust cybersecurity measures to obtain necessary certifications. Modern vehicles have an extensive attack surface due to the increasing number of interconnected electronic components and wireless communication features. While new technologies improve connectivity, automation, and comfort, they also introduce new vulnerabi
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Automotive Cybersecurity Regulations"

1

Schober, Thomas, and Gerhard Griessnig. "Cybersecurity Regulations and Standards in the Automotive Domain." In Communications in Computer and Information Science. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-15559-8_38.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mohamed, Ahmed Adel, Heba Aslan, and Tamer Arafa. "Automotive Cybersecurity Engineering Standardization and Regulation: An Integrated Model." In Communications in Computer and Information Science. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-71139-8_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Alauthman, Mohammad, Mouhammd sharari Alkasassbeh, Saad Alateef, Ahmad al-Qerem, and Ammar Almomani. "Automotive and Autonomous Vehicle Cybersecurity." In Complexities and Challenges for Securing Digital Assets and Infrastructure. IGI Global, 2025. https://doi.org/10.4018/979-8-3373-1370-2.ch016.

Full text
Abstract:
Modern vehicles incorporate increasingly complex software and communication systems that expose them to evolving cyber threats. Attackers target crucial components like vehicle networks, sensors, and remote software update channels to compromise functionality and safety. This chapter investigates the urgent need to protect connected and autonomous vehicles from malicious activities. The authors examined present vulnerabilities, existing regulations, and next-generation defensive strategies to determine how effectively the industry addresses cybersecurity risks. Findings revealed both progress
APA, Harvard, Vancouver, ISO, and other styles
4

Gadi, Anil Lokesh. "Addressing cybersecurity, data governance, and ethical concerns in automotive digital transformation." In Deep Science Publishing. Deep Science Publishing, 2025. https://doi.org/10.70593/978-93-49307-21-6_11.

Full text
Abstract:
The automotive industry is undergoing a profound transformation due to advancing digitalisation and new mobility models alongside the changing expectations of vehicle users. Automotive OEMs are increasingly adopting new digital technologies, including over-the-air software updates, embedded electronics, connected vehicles, and mobility services to implement the above digitalisation technologies. This transformation is expected to create significant new opportunities and threats. It is projected that by 2030, the vehicle park in Europe and the USA will slightly decline from 2020 levels, but the
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Automotive Cybersecurity Regulations"

1

Faschang, Thomas, Georg Macher, and Omar Veledar. "A Comprehensive Training Approach for Automotive Cybersecurity Engineering." In WCX SAE World Congress Experience. SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2800.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">Cybersecurity assumes a major role in the context of the automotive domain, where both existing and forthcoming regulations are heightening the need for robust security engineering. A significant milestone in advancing cybersecurity within the automotive industry is the release of the first international standard for automotive cybersecurity ISO/SAE 21434:2021 ‘Road Vehicles — Cybersecurity Engineering’. A recently published type approval regulation for automotive cybersecurity (UN R155) is also tailored for member count
APA, Harvard, Vancouver, ISO, and other styles
2

Oka, Dennis Kengo, and Tommi Makila. "A Practical Guide to Fuzz Testing Embedded Software in a CI Pipeline." In FISITA World Congress 2021. FISITA, 2021. http://dx.doi.org/10.46720/f2021-dgt-044.

Full text
Abstract:
"Software, including open-source software, is transforming the automotive industry. The Zephyr Project RTOS aims to be the first open-source real time operating system to achieve functional safety certifications making it applicable for use in automotive embedded systems. In terms of connectivity, Zephyr supports among others Bluetooth, Wi-Fi, IP, Ethernet and CAN. With the recent developments of cybersecurity standards and regulations such as “ISO/SAE 21434 Cybersecurity Engineering” and “UN Regulation 155 Cybersecurity”, it becomes paramount for automotive organizations to consider employing
APA, Harvard, Vancouver, ISO, and other styles
3

Zachos, Mark, Vishal Bajpai, and Preeti Agarwal. "Cybersecurity Rating Framework and Its Application to J1939-91C Standard." In WCX SAE World Congress Experience. SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2803.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">Connectivity is becoming increasingly prevalent in the automotive industry, and with that comes a growing awareness among consumers and regulators of the potential risks. Present-day automobiles are becoming smart and more software-driven. Conversely, every line of code equals a possible threat to the vehicle, the passenger, or the original equipment manufacturer (OEM). To hit the brakes on the alarming increase in cyber threats, government bodies have introduced standards and regulations globally. The United Nations Eco
APA, Harvard, Vancouver, ISO, and other styles
4

Hellstern, Mona, Stefan Langhanki, Florian Grün, Reiner Kriesten, and Eric Sax. "Cybersecurity Approval Criteria: Application of UN R155." In 2024 Stuttgart International Symposium. SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2983.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">The UN R155 regulation is the first automotive cybersecurity regulation and has made security a mandatory approval criterion for new vehicle types. This establishes internationally harmonized security requirements for market approval, presenting a challenge for manufacturers and suppliers to demonstrate compliance throughout the product life cycle. An issued type approval is internationally recognized by the member states of the UN 1958 Agreement. International recognition implies that uniform assessment criteria are app
APA, Harvard, Vancouver, ISO, and other styles
5

Mairaj ud din, Qazi, and Qadeer Ahmed. "Automated TARA Framework for Cybersecurity Compliance of Heavy Duty Vehicles." In WCX SAE World Congress Experience. SAE International, 2024. http://dx.doi.org/10.4271/2024-01-2809.

Full text
Abstract:
<div class="section abstract"><div class="htmlview paragraph">Recent advancements towards autonomous heavy-duty vehicles are directly associated with increased interconnectivity and software driven features. Consequently, rise of this technological trend is bringing forth safety and cybersecurity challenges in form of new threats, hazards and vulnerabilities. As per the recent UN vehicle regulation 155, several risk-based security models and assessment frameworks have been proposed to counter the growing cybersecurity issues, however, the high budgetary cost to develop the tool and
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!