Abstract
<div>The secure boot has successfully protected systems from executing untrusted
software (SW), but low-power controllers lack sufficient time to check every
memory cell while satisfying real-time functional safety requirements.
Automotive controllers need to maintain security through multiple cycles of
remote, unsupervised operation and safely reach a secure state when an anomaly
is detected. To accelerate the boot time, we propose Sliced Secure Boot: build
fingerprints by slicing orthogonally through memory blocks, protect each cell
with a reusable fingerprint using a reproducible pattern with sufficient
entropy, and randomly check one fingerprint pattern during boot. We do not claim
that sampling offers equivalent protection to exhaustive checks but demonstrate
that careful sampling can provide a sufficient level of detection while
maintaining compatibility with both startup time and functional safety
requirements.</div>
Subject
Artificial Intelligence,Computer Science Applications,Automotive Engineering,Control and Systems Engineering,General Medicine
Reference41 articles.
1. Checkoway ,
S. ,
McCoy , D. ,
Anderson ,
D. ,
Kantor , B.
et al.
Comprehensive Experimental Analyses of
Automotive Attack Surfaces Proceedings of
the USENIX Security Symposium San Francisco,
CA 2011
2. Miller , C.
and
Valasek , C.
2015 2022 http://illmatics.com/Remote%20Car%20Hacking.pdf
3. ISO
2018 https://www.iso.org/standard/68383.html
4. Nasser , A. ,
Gumise , W. ,
and
Ma , D.
Accelerated Secure Boot for Real-Time Embedded
Safety Systems SAE Int. J. Transp. Cyber. &
Privacy 2 1 2019 35 48 https://doi.org/10.4271/11-02-01-0003
5. Weimerskirch , A.
Secure Software Flashing SAE Int. J. Passeng. Cars – Electron. Electr. Syst. 2 1 2009 83 86 https://doi.org/10.4271/2009-01-0272