{"version":"1.0","provider_name":"CESI LINEACT","provider_url":"https:\/\/lineact.cesi.fr\/en\/","author_name":"Webmaster","author_url":"https:\/\/lineact.cesi.fr\/en\/cv-chercheurs\/plecostomus\/","title":"Securing Autonomous Vehicles - CESI LINEACT","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"YqV1H2dQRU\"><a href=\"https:\/\/lineact.cesi.fr\/en\/publications\/securing-autonomous-vehicles\/\">Securing Autonomous Vehicles<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/lineact.cesi.fr\/en\/publications\/securing-autonomous-vehicles\/embed\/#?secret=YqV1H2dQRU\" width=\"600\" height=\"338\" title=\"&#8220;Securing Autonomous Vehicles&#8221; &#8212; CESI LINEACT\" data-secret=\"YqV1H2dQRU\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","description":"This talk delves into the fundamentals of security for autonomous vehicles, exploring the challenges and existing solutions in this rapidly evolving field. It discusses the limitations of current security measures and introduces the application of formal methods to model safety and security in autonomous vehicles. The talk outlines the process of applying formal methods to [&hellip;]"}