Further reading
Studying cybersecurity controls is perhaps one of the most technically interesting aspects of cybersecurity. To further expand your knowledge about cybersecurity controls that can be applied at the ECU level, we recommend the following list of resources:
- [1] CyBOK, The Cyber Security Body of Knowledge: https://www.cybok.org/
- [2] Secure Application Programming in the presence of Side Channel Attacks: https://www.riscure.com/publication/secure-application-programming-presence-side-channel-attacks/
- [3] Development of TEE and Secure Monitor Code: https://www.arm.com/technologies/trustzone-for-cortex-a/tee-and-smc
- [4] Achieving a Root of Trust with Secure Boot in Automotive RH850 and R-Car Devices – Part 1: https://www.renesas.com/us/en/blogs/introduction-about-secure-boot-automotive-mcu-rh850-and-soc-r-car-achieve-root-trust-1
- [5] Securing distributed systems: A survey on access control techniques for cloud, blockchain, IoT and SDN: https...