{"version":"1.0","provider_name":"CESI LINEACT","provider_url":"https:\/\/lineact.cesi.fr\/en\/","author_name":"CESI LINEACT","author_url":"https:\/\/lineact.cesi.fr\/en\/","title":"Security Assessment and Hardening of Autonomous Vehicles - CESI LINEACT","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"L7SlUujvi5\"><a href=\"https:\/\/lineact.cesi.fr\/en\/publications\/security-assessment-and-hardening-of-autonomous-vehicles\/\">Security Assessment and Hardening of Autonomous Vehicles<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/lineact.cesi.fr\/en\/publications\/security-assessment-and-hardening-of-autonomous-vehicles\/embed\/#?secret=L7SlUujvi5\" width=\"600\" height=\"338\" title=\"&#8220;Security Assessment and Hardening of Autonomous Vehicles&#8221; &#8212; CESI LINEACT\" data-secret=\"L7SlUujvi5\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n<\/script>\n","description":"In recent years, experts have noted the risks of hacking the autonomous vehicles. Since the latter become more complex, the number of potential vulnerabilities and the constraints on security algorithms increase. This paper proposes a model checking based framework that relies on a set of predefined attacks and counter measures from where the security requirements [&hellip;]"}