Sign In Start Free Trial
Account

Add to playlist

Create a Playlist

Modal Close icon
You need to login to use this feature.
  • Book Overview & Buying Automotive Cybersecurity Engineering Handbook
  • Table Of Contents Toc
Automotive Cybersecurity Engineering Handbook

Automotive Cybersecurity Engineering Handbook

By : Dr. Ahmad MK Nasser
4.9 (20)
close
close
Automotive Cybersecurity Engineering Handbook

Automotive Cybersecurity Engineering Handbook

4.9 (20)
By: Dr. Ahmad MK Nasser

Overview of this book

The Automotive Cybersecurity Engineering Handbook introduces the critical technology of securing automotive systems, with a focus on compliance with industry standards like ISO 21434 and UNECE REG 155-156. This book provides automotive engineers and security professionals with the practical knowledge needed to integrate cybersecurity into their development processes, ensuring vehicles remain resilient against cyber threats. Whether you're a functional safety engineer, a software developer, or a security expert transitioning to the automotive domain, this book serves as your roadmap to implementing effective cybersecurity practices within automotive systems. The purpose of this book is to demystify automotive cybersecurity and bridge the gap between safety-critical systems and cybersecurity requirements. It addresses the needs of professionals who are expected to make their systems secure without sacrificing time, quality, or safety. Unlike other resources, this book offers a practical, real-world approach, focusing on the integration of security into the engineering process, using existing frameworks and tools. By the end of this book, readers will understand the importance of automotive cybersecurity, how to perform threat modeling, and how to deploy robust security controls at various layers of a vehicle's architecture.
Table of Contents (15 chapters)
close
close
1
Part 1:Understanding the Cybersecurity Relevance of the Vehicle Electrical Architecture
5
Part 2: Understanding the Secure Engineering Development Process
9
Part 3: Executing the Process to Engineer a Secure Automotive Product

Secure coding practices versus safe coding techniques

Similar to the design principles, coding guidelines between safety and security have a high degree of correlation. Both safety and security engineering approaches aim to reduce code complexity to prevent defects and vulnerabilities. They both require the usage of language subsets to avoid risky features of the programming language that can introduce unexpected or unwanted behavior. This can be enforced by using static code analysis tools based on MISRA C, CERT C/C++, and AUTOSAR C++. Normally, the toolchains support the safety and security guidelines, allowing the developers to check for all coding rule violations in a single run. When it comes to defensive coding techniques, there is a high degree of overlap between several such techniques:

  • Input validation requires all inputs from external sources to be validated to ensure they conform to the expected formats, ranges, and data types. This can help prevent working on implausible...
CONTINUE READING
83
Tech Concepts
36
Programming languages
73
Tech Tools
Icon Unlimited access to the largest independent learning library in tech of over 8,000 expert-authored tech books and videos.
Icon Innovative learning tools, including AI book assistants, code context explainers, and text-to-speech.
Icon 50+ new titles added per month and exclusive early access to books as they are being written.
Automotive Cybersecurity Engineering Handbook
notes
bookmark Notes and Bookmarks search Search in title playlist Add to playlist download Download options font-size Font size

Change the font size

margin-width Margin width

Change margin width

day-mode Day/Sepia/Night Modes

Change background colour

Close icon Search
Country selected

Close icon Your notes and bookmarks

Confirmation

Modal Close icon
claim successful

Buy this book with your credits?

Modal Close icon
Are you sure you want to buy this book with one of your credits?
Close
YES, BUY

Submit Your Feedback

Modal Close icon
Modal Close icon
Modal Close icon