Cyber-Security. The mechanisms developed to mitigate attacks to core parts of the infrastructure for in-vehicle communications have been vetted through the applications of a rigorous mathematical approach. This has allowed the application of automated analysis techniques based on a combination of theorem proving and model checking for the verification of crucial security properties, such as the integrity of messages (https://st.fbk.eu/) that are fundamental also for the safety of vehicles (e.g., to avoid remote vehicle take-over of driving functionalities such as braking or steering). The approach can be extended to evaluate the security of forthcoming V2X applications, i.e. vehicle/vehicle and vehicle/infrastructure communication, in driver-assisted and self-driving applications. Similar approaches have been developed to guarantee the security of identity management solutions deployed by Poste Italiane, Istituto Poligrafico Zecca dello Stato (the Italian Mint), and NATO.


  • Title: V2X Car Threat
  • Rights: FBK Archive

Get the app

Explore museums and play with Art Transfer, Pocket Galleries, Art Selfie, and more


Google apps