- Jeremy Bryans gave an invited talk recently at Chatham House, where he spoke about his recent paper on "The Internet of Automotive Things: vulnerabilities, risks, and policy implications”.
- Call for Papers: Special Issue on Smart Cities and Connected and Autonomous Vehicles (IJDSN)
- Universities to lead on research to underpin UK’s cybersecurity policymaking (RISCS Blog)
- Samsung self-driving car trial in South Korea approved. BBC, May 2nd, 2017
- We are working with local firm EmbedUK, and they have provided us with their telematics development toolsuite and hardware to experiment with rapid prototyping of secure software.
- Dr. Jeremy Bryans is speaking on “From Automotive Safety to Automotive Security: Progress, Possibilities and Pitfalls” at the IMechE Event on ISO 26262: Functional Safety for Engineering on 24th May 2017
- The paper titled “Towards A Testbed for Automotive Cybersecurity”, by Dan Fowler, Madeline Cheah, Jeremy Bryans and Siraj Shaikh, has won the Best Industry Paper Award at the 10th IEEE International Conference on Software Testing, Verification and Validation, March 2017, Tokyo, Japan
- AutoCAN Security, a commercial proposition by Dr. Jeremy Bryans and Dr. Siraj Shaikh, has been awarded a place in the second cohort of CSIT Labs to receive three months of product engineering resource from CSIT’s security engineering team, February 21st, 2017
- CyberOwl, a Coventry University spinout, has been chosen for the very first GCHQ Cyber Accelerator, BBC News, January 11th, 2017
- Why are the tech giants struggling to build their own driverless cars? The Conversation, October 21st, 2016
- Madeline Cheah and Dan Fowler are both working with HORIBA MIRA on automotive cybersecurity challenges, March 10th, 2016.
In an increasingly uncertain world, the need for the security of citizens, data and critical infrastructure is a major concern. A parallel but not unrelated body of research acknowledges safety needs requiring rigorous engineering, fail-proof mechanisms and protection systems to ensure a dependable design and reliable operation. The Cyber Security Group at the Centre for Mobility and Transport (CMT) at Coventry University is a team of multi-disciplinary researchers addressing issues of systems security for automotive, rail and connected infrastructure. Over the past 6 years, the group has been involved in a number of projects including:
- CyberOwl, a new commercial venture spun-out of the group in 2016 that is developing early warning systems for the cyberspace;
- Automotive Cyber Security collaboration with HORIBA MIRA, involving a number of doctoral students investigating both testing and design aspects of security on vehicular platforms;
- App Collusion Detection (ACiD) (2015-2017), which is funded by the EPSRC, in collaboration with City and Swansea Universities, and with Intel Security as industrial partner. The aim of this work is to develop novel theoretical methods and tools to detect Android applications of suspected collusion;
- Knowledge Elicitation for Railway Safety (KEEP SAFE) (2013-2014), which was funded by the RSSB to assess the use of safety-related data for effective safety decision-making for rail safety and security;
- Unmanned Distribution Capability (2011-2013), which was funded by the MoD to investigate communication resilience for semi-autonomous military logistics vehicles;
- Efficient and Reliable Transportation of Consignments (ERTOC) (2010-2012), which was funded by InnovateUK and EPSRC, and led by Ricardo, to build an open-API data-centric approach to logistics routing and payload sharing aimed at reducing carbon footprint.
Automotive cybersecurity poses a major challenge to connected and autonomous vehicles. This course addresses the wider challenge of increasing digital and software components on connected platforms and focusses specifically on threat intelligence and engineering aspects of automotive systems. Issues of policy and personal data are also explored.
This course is for engineers, scientists and consultants with an interest in cybersecurity of connected and autonomous vehicles; automotive manufacturers, electronics designers and suppliers, components manufacturers and software tool developers; and policy makers, academics and researchers.
- Fowler, D.S, Bryans, J., Shaikh, S.A. Automating fuzz test generation to improve the security of the Controller Area Network. ACM Chapters Computer Science in Cars Symposium (CSCS 2017), Munich, Germany, July 6, 2017. (Poster. Accepted)
- Asavoae, I.M., Blasco, J., Chen, T.M., Kalutarage, H.K., Muttik, I., Nguyen, H.N., Roggenbach, M. Shaikh, S.A. Detecting Malicious Collusion Between Mobile Software Applications: The Android Case. Data Analytics and Decision Support for Cybersecurity: Trends, Methodologies and Applications 2017. Springer. (Peer-Reviewed Book Chapter. In Press)
- Asavoae, I.M., Nguyen, H.N., Roggenbach, M., Shaikh, S.A. Software Model Checking: A Promising Approach to Verify Mobile App Security. 19th Workshop on Formal Techniques for Java-like Programs (FTfJP 2017) held as part of the European Conference on Object-Oriented Programming (ECOOP 2017), 20th June 2017.
- Cheah, M., Bryans, J., Fowler, D.S., Shaikh, S.A. Threat Intelligence for Bluetooth-enabled Systems with Automotive Applications: An Empirical Study. 3rd Workshop on Safety and Security of Intelligent Vehicles (SSIV) to be held in conjunction with 47th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN) 2017.
- Kalutarage, H.K., Nguyen, H.N., and Shaikh, S.A. Towards a threat assessment framework for apps collusion. Telecommunication Systems. Open Access (2017).
- Cheah, M., Shaikh, S.A, Haas, O., and Ruddle, A. Towards a systematic security evaluation of the automotive Bluetooth interface. Vehicular Communications. Volume 9, July 2017, Pages 8–18. Elsevier.
- Fowler, D., Cheah, M., Shaikh, S.A., and Bryans, J. Towards a Testbed for Automotive Cybersecurity. 10th IEEE International Conference on Software Testing, Verification and Validation 2017. Best Industry Paper Award.
- Cheah, M., Shaikh, S.A., Bryans, J., and Nguyen, H.N. Combining third party components securely in automotive systems. In 10th International Conference on Information Security Theory and Practice (WISTP'2016), 26-27 September 2016, Heraklion, Crete, Greece, Lecture Notes in Computer Science. Springer, 2016
- Holt, J., Perry, S., Payne, R.J., Bryans, J., Hallerstede, S., and Hansen, F.O. A Model-Based Approach for Requirements Engineering for Systems of Systems. IEEE Systems Journal (2015) 9 (1):252-262
- James, P., Moller, F., Nguyen, H.N., Roggenbach, M., Schneider, S., and Treharne, H. On modelling and verifying railway interlockings: Tracking train lengths. Science of Computer Programming (2014) 96(3):315-336
- James, P., Moller, F., Nguyen, H.N. et al. Techniques for modelling and verifying railway interlockings. International Journal on Software Tools for Technology Transfer (2014) 16: 685-711.