Tesi etd-08012016-111739 |
Link copiato negli appunti
Tipo di tesi
Tesi di laurea magistrale
Autore
VARANO, DARIO
URN
etd-08012016-111739
Titolo
Automatic code generation for security requirements in AUTOSAR based on the Crypto Service Manager
Dipartimento
INGEGNERIA DELL'INFORMAZIONE
Corso di studi
COMPUTER ENGINEERING
Relatori
relatore Prof. Dini, Gianluca
relatore Prof.ssa Bernardeschi, Cinzia
relatore Prof.ssa Bernardeschi, Cinzia
Parole chiave
- AUTOSAR
- Crypto Service Manager
Data inizio appello
28/09/2016
Consultabilità
Completa
Riassunto
The increasing complexity and autonomy of modern vehicles make security a key issue of the design and development in the automotive industry. A careful analysis of the security requirements and adequate mechanisms for ensuring integrity and confidentiality of data are required to guarantee safety. In the automotive domain, AUTOSAR (AUTomotive Open System ARchitecture) is the standard de facto. It provides a component-based system design at different levels of abstraction.
In this thesis a library has been developed to implement the Crypto Service Manager (CSM) of AUTOSAR. It offers a standardized access to cryptographic services for applications. The library is implemented in C language and supports the modules for MAC generation/verification and encryption/decryption, according to the standard. In particular, modelling extensions in AUTOSAR are proposed to address confidentiality and integrity security constraints at the design stage. Software components are automatically extended according to security annotations with security elements (ports and interfaces), used to call the CSM functions.
In this thesis a library has been developed to implement the Crypto Service Manager (CSM) of AUTOSAR. It offers a standardized access to cryptographic services for applications. The library is implemented in C language and supports the modules for MAC generation/verification and encryption/decryption, according to the standard. In particular, modelling extensions in AUTOSAR are proposed to address confidentiality and integrity security constraints at the design stage. Software components are automatically extended according to security annotations with security elements (ports and interfaces), used to call the CSM functions.
File
Nome file | Dimensione |
---|---|
Report.pdf | 4.53 Mb |
Contatta l’autore |