of Sensory Data: from Traditional Sensors to Social
Sensors, funded by the University of Pisa.
REFERENCES
Adelsbach, A., Huber, U., and Sadeghi, A.-R. (2006). Se-
cure software delivery and installation in embedded
systems. In Embedded Security in Cars, pages 27–49.
Springer.
AUTOSAR (a). http://www.autosar.org.
AUTOSAR (b). https://www.autosar.org/fileadmin/files/
releases/2-0/software-architecture/rte/standard/
autosar sws rte.pdf.
Avvenuti, M., Bernardeschi, C., De Francesco, N., and
Masci, P. (2012). Jcsi: A tool for checking secure
information flow in java card applications. Journal of
Systems and Software, 85(11):24792493.
Barbuti, R., Bernardeschi, C., and De Francesco, N.
(2002). Abstract interpretation of operational seman-
tics for secure information flow. Inf. Process. Lett.,
83(2):101–108.
Bernardeschi, C., De Francesco, N., Lettieri, G., and Mar-
tini, L. (2004). Checking secure information flow in
java bytecode by code transformation and standard
bytecode verification. Software - Practice and Expe-
rience, 34(13):1225–1255.
Bernardeschi, C., Del Vigna, G., Di Natale, M., Dini,
G., and Varano, D. (2016). Using AUTOSAR High-
Level Specifications for the Synthesis of Security
Components in Automotive Systems, pages 101–117.
Springer International Publishing, Cham.
Checkoway, S., McCoy, D., Kantor, B., Anderson, D.,
Shacham, H., Savage, S., Koscher, K., Czeskis, A.,
Roesner, F., Kohno, T., et al. (2011). Comprehensive
experimental analyses of automotive attack surfaces.
In USENIX Security Symposium. San Francisco.
Cousot, P. and Cousot., R. (1992). Abstract interpreta-
tion frameworks. Journal of Logic and Computation,
4(2):511–547.
D. E. Denning, P. J. D. (1977). Certification of programs
for secure information flow. Communications of the
ACM, 7(20):504–513.
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno,
T., Checkoway, S., McCoy, D., Kantor, B., Anderson,
D., Shacham, H., et al. (2010). Experimental security
analysis of a modern automobile. In Security and Pri-
vacy (SP), 2010 IEEE Symposium on, pages 447–462.
IEEE.
Leino, K. and Joshi., R. (1998). A semantic approach to se-
cure information flow. In Proc. 4th International Con-
ference, Mathematics of Program Construction, LNCS
1422, pages 254–271. Springer Verlag.
Lemke, K., Paar, C., and Wolf, M. (2006). Embedded secu-
rity in cars. Springer.
MathWorks (a). Generate autosar-compliant
code for multiple runnable entities
(https://it.mathworks.com/help/ecoder/examples/
autosar-code-generation-for-multiple-runnable-
entities.html).
Nielson, F., Nielson, H. R., and Hankin, C. (2005). Princi-
ples of Program Analysis. Springer.
Sabelfeld, A. and Mayers, A. (2003). Language-based
information-flow security. IEEE journal on selected
areas in communications, 21(1).
Stephan, W., Richter, S., and Muller, M. (2006). Aspects of
secure vehicle software flashing. In Embedded Secu-
rity in Cars, pages 17–26. Springer.
Volpano, D., Smith, G., and Irvine, C. (1992). A sound type
system for secure flow analysis. Journal of Computer
Security, 4(3):167–187.
Wyglinski, A. M., Huang, X., Padir, T., Lai, L., Eisenbarth,
T. R., and Venkatasubramanian, K. (2013). Security of
autonomous systems employing embedded computing
and sensors. Micro, IEEE, 33(1):80–86.
Verifying Data Secure Flow in AUTOSAR Models by Static Analysis
713