Hsesr: Hierarchical software execution state representation for ultra-low-latency threat alerting over internet of things

X Yi, G Li, B Chen, X Lin, Z Peng… - IEEE Internet of Things …, 2024 - ieeexplore.ieee.org
To reduce attack risks in Internet of Things (IoT), many security vendors conduct software
security analysis on IoT devices all the time. However, how to build an ultralow-latency …

Integrating security in hazard analysis using STPA-Sec and GSPN: A case study of automatic emergency braking system

Y Li, C Huang, Q Liu, X Zheng, K Sun - Computers & Security, 2024 - Elsevier
Hazard analysis is a vital step in develo** intelligent connected vehicles, aiming to
eliminate or control hazards in the initial stages of system development and to provide …

[HTML][HTML] Cybersecurity of Automotive Wired Networking Systems: Evolution, Challenges, and Countermeasures

N Canino, P Dini, S Mazzetti, D Rossi, S Saponara… - Electronics, 2025 - mdpi.com
The evolution of Electrical and Electronic (E/E) architectures in the automotive industry has
been a significant factor in the transformation of vehicles from traditional mechanical …

PicaCAN: Reverse Engineering Physical Semantics of Signals in CAN Messages Using Physically-Induced Causalities

Y Ruan, C Zhao, Z Yang, Y Shu… - IEEE Transactions on …, 2025 - ieeexplore.ieee.org
With the rapid development of Connected and Autonomous Vehicles, In-Vehicle Network
attacks have garnered heightened research scrutiny due to vehicles' increasing …

RepFTI: Representation-Fused Function-Type Inference for Vehicular Secure Software Systems

X Yi, G Li, J Li, A Ding - Applied Sciences, 2024 - mdpi.com
To enhance the security of vehicular software systems, inversely identifying the underlying
function types of binary files plays a key role in threat discovery. However, existing function …

Analysis and Modeling of Automotive Cyber Security Attack Trees

J Hao, H Wu, H Sun, B Li - Proceedings of the 2024 4th International …, 2024 - dl.acm.org
The integration of information technology in the automotive industry has led to an escalation
in the vulnerability of automotive cyber security. The analysis and protection of automotive …

Analyzing HTA-Based Security for Automotive Systems

M Kayondo, J Choi, Y Paek - Annual Conference of KIPS, 2024 - koreascience.kr
Recently, automotive security is gerning significant attention due to the gradual surge in
cyberattacks on automotive systems experienced by the industry over the past few years …