{"id":"https://openalex.org/W4416191971","doi":"https://doi.org/10.1016/j.cose.2025.104751","title":"Towards a formal verification of secure vehicle software updates","display_name":"Towards a formal verification of secure vehicle software updates","publication_year":2025,"publication_date":"2025-11-12","ids":{"openalex":"https://openalex.org/W4416191971","doi":"https://doi.org/10.1016/j.cose.2025.104751"},"language":"en","primary_location":{"id":"doi:10.1016/j.cose.2025.104751","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2025.104751","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://doi.org/10.1016/j.cose.2025.104751","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5045746829","display_name":"Mariele Hagen","orcid":null},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Martin Slind Hagen","raw_affiliation_strings":["Computer Science and Engineering, Chalmers University of Technology, Gothenburg, 41296, Sweden"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Chalmers University of Technology, Gothenburg, 41296, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120399042","display_name":"Emil Lundqvist","orcid":"https://orcid.org/0009-0004-0881-8605"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Emil Lundqvist","raw_affiliation_strings":["Computer Science and Engineering, Chalmers University of Technology, Gothenburg, 41296, Sweden"],"raw_orcid":"https://orcid.org/0009-0004-0881-8605","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Chalmers University of Technology, Gothenburg, 41296, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5120648722","display_name":"Alex Phu","orcid":null},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Alex Phu","raw_affiliation_strings":["Computer Science and Engineering, Chalmers University of Technology, Gothenburg, 41296, Sweden"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Chalmers University of Technology, Gothenburg, 41296, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5091150464","display_name":"Y. C. Wang","orcid":"https://orcid.org/0009-0004-1389-1196"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Yenan Wang","raw_affiliation_strings":["Computer Science and Engineering, Chalmers University of Technology, Gothenburg, 41296, Sweden"],"raw_orcid":"https://orcid.org/0009-0004-1389-1196","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Chalmers University of Technology, Gothenburg, 41296, Sweden","institution_ids":["https://openalex.org/I66862912"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5054168383","display_name":"Kim Strandberg","orcid":"https://orcid.org/0000-0003-0892-2600"},"institutions":[{"id":"https://openalex.org/I1340210623","display_name":"Volvo (Sweden)","ror":"https://ror.org/05b6ypc36","country_code":"SE","type":"company","lineage":["https://openalex.org/I1340210623"]},{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":true,"raw_author_name":"Kim Strandberg","raw_affiliation_strings":["Computer Science and Engineering, Chalmers University of Technology, Gothenburg, 41296, Sweden","Department of Research and Development, Volvo Car Corporation, Gothenburg, 40531, Sweden"],"raw_orcid":"https://orcid.org/0000-0003-0892-2600","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Chalmers University of Technology, Gothenburg, 41296, Sweden","institution_ids":["https://openalex.org/I66862912"]},{"raw_affiliation_string":"Department of Research and Development, Volvo Car Corporation, Gothenburg, 40531, Sweden","institution_ids":["https://openalex.org/I1340210623"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5043628304","display_name":"Elad M. Schiller","orcid":"https://orcid.org/0000-0003-3258-3696"},"institutions":[{"id":"https://openalex.org/I66862912","display_name":"Chalmers University of Technology","ror":"https://ror.org/040wg7k59","country_code":"SE","type":"education","lineage":["https://openalex.org/I66862912"]}],"countries":["SE"],"is_corresponding":false,"raw_author_name":"Elad Michael Schiller","raw_affiliation_strings":["Computer Science and Engineering, Chalmers University of Technology, Gothenburg, 41296, Sweden"],"raw_orcid":"https://orcid.org/0000-0003-3258-3696","affiliations":[{"raw_affiliation_string":"Computer Science and Engineering, Chalmers University of Technology, Gothenburg, 41296, Sweden","institution_ids":["https://openalex.org/I66862912"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":["https://openalex.org/A5054168383"],"corresponding_institution_ids":["https://openalex.org/I1340210623","https://openalex.org/I66862912"],"apc_list":{"value":3190,"currency":"USD","value_usd":3190},"apc_paid":{"value":3190,"currency":"USD","value_usd":3190},"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.39459839,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"161","issue":null,"first_page":"104751","last_page":"104751"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.39820000529289246,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T13295","display_name":"Safety Systems Engineering in Autonomy","score":0.39820000529289246,"subfield":{"id":"https://openalex.org/subfields/2213","display_name":"Safety, Risk, Reliability and Quality"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10761","display_name":"Vehicular Ad Hoc Networks (VANETs)","score":0.34200000762939453,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11099","display_name":"Autonomous Vehicle Technology and Safety","score":0.06419999897480011,"subfield":{"id":"https://openalex.org/subfields/2203","display_name":"Automotive Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/liveness","display_name":"Liveness","score":0.7903000116348267},{"id":"https://openalex.org/keywords/correctness","display_name":"Correctness","score":0.7455999851226807},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.5871000289916992},{"id":"https://openalex.org/keywords/model-checking","display_name":"Model checking","score":0.5802000164985657},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.5733000040054321},{"id":"https://openalex.org/keywords/software-security-assurance","display_name":"Software security assurance","score":0.45879998803138733},{"id":"https://openalex.org/keywords/software-verification","display_name":"Software verification","score":0.45339998602867126},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.40610000491142273},{"id":"https://openalex.org/keywords/bridge","display_name":"Bridge (graph theory)","score":0.3546999990940094}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8479999899864197},{"id":"https://openalex.org/C15569618","wikidata":"https://www.wikidata.org/wiki/Q3561421","display_name":"Liveness","level":2,"score":0.7903000116348267},{"id":"https://openalex.org/C55439883","wikidata":"https://www.wikidata.org/wiki/Q360812","display_name":"Correctness","level":2,"score":0.7455999851226807},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.5871000289916992},{"id":"https://openalex.org/C110251889","wikidata":"https://www.wikidata.org/wiki/Q1569697","display_name":"Model checking","level":2,"score":0.5802000164985657},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.5733000040054321},{"id":"https://openalex.org/C62913178","wikidata":"https://www.wikidata.org/wiki/Q7554361","display_name":"Software security assurance","level":4,"score":0.45879998803138733},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.45339998602867126},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.4178999960422516},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.40610000491142273},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.39559999108314514},{"id":"https://openalex.org/C100776233","wikidata":"https://www.wikidata.org/wiki/Q2532492","display_name":"Bridge (graph theory)","level":2,"score":0.3546999990940094},{"id":"https://openalex.org/C116253237","wikidata":"https://www.wikidata.org/wiki/Q1437424","display_name":"Formal specification","level":2,"score":0.353300005197525},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.34060001373291016},{"id":"https://openalex.org/C35869016","wikidata":"https://www.wikidata.org/wiki/Q846636","display_name":"Software architecture","level":3,"score":0.32850000262260437},{"id":"https://openalex.org/C121822524","wikidata":"https://www.wikidata.org/wiki/Q5157582","display_name":"Computer security model","level":2,"score":0.3174999952316284},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.31610000133514404},{"id":"https://openalex.org/C2779639559","wikidata":"https://www.wikidata.org/wiki/Q7661178","display_name":"Symbolic execution","level":3,"score":0.3082999885082245},{"id":"https://openalex.org/C48002344","wikidata":"https://www.wikidata.org/wiki/Q2919644","display_name":"Verification and validation","level":2,"score":0.29809999465942383},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.29760000109672546},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.28110000491142273},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.2741999924182892},{"id":"https://openalex.org/C184337299","wikidata":"https://www.wikidata.org/wiki/Q1437428","display_name":"Semantics (computer science)","level":2,"score":0.27410000562667847},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.27230000495910645},{"id":"https://openalex.org/C146499914","wikidata":"https://www.wikidata.org/wiki/Q5469969","display_name":"Formal semantics (linguistics)","level":2,"score":0.27000001072883606},{"id":"https://openalex.org/C202973057","wikidata":"https://www.wikidata.org/wiki/Q7380130","display_name":"Runtime verification","level":3,"score":0.26170000433921814},{"id":"https://openalex.org/C62460635","wikidata":"https://www.wikidata.org/wiki/Q5508853","display_name":"Functional verification","level":3,"score":0.257099986076355}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1016/j.cose.2025.104751","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2025.104751","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},{"id":"pmh:oai:arXiv.org:2511.15479","is_oa":true,"landing_page_url":"http://arxiv.org/abs/2511.15479","pdf_url":"https://arxiv.org/pdf/2511.15479","source":{"id":"https://openalex.org/S4393918464","display_name":"ArXiv.org","issn_l":"2331-8422","issn":["2331-8422"],"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"}],"best_oa_location":{"id":"doi:10.1016/j.cose.2025.104751","is_oa":true,"landing_page_url":"https://doi.org/10.1016/j.cose.2025.104751","pdf_url":null,"source":{"id":"https://openalex.org/S12529635","display_name":"Computers & Security","issn_l":"0167-4048","issn":["0167-4048","1872-6208"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320990","host_organization_name":"Elsevier BV","host_organization_lineage":["https://openalex.org/P4310320990"],"host_organization_lineage_names":["Elsevier BV"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Computers &amp; Security","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320321030","display_name":"VINNOVA","ror":"https://ror.org/01kd5m353"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W2029693536","https://openalex.org/W2115309705","https://openalex.org/W2233768317","https://openalex.org/W2544274814","https://openalex.org/W2790954596","https://openalex.org/W2915352631","https://openalex.org/W2918693378"],"related_works":[],"abstract_inverted_index":{"\u2022":[0,21],"We":[1,22,137],"show":[2],"how":[3],"to":[4,79,96,143,182],"verify":[5,24],"a":[6,98,131,150],"large":[7],"and":[8,18,29,39,75,141,148,168,190],"complex":[9],"system,":[10],"named":[11],"UniSUF,":[12],"by":[13],"employing":[14],"problem":[15],"decomposition":[16],"techniques":[17],"rigorous":[19],"reasoning.":[20],"formally":[23,154],"that":[25,102,153,179],"UniSUF":[26,110,180],"ensures":[27],"security":[28,133,160,185,194],"correctness":[30,189],"in":[31],"terms":[32],"of":[33,44,135,192],"confidentiality,":[34,163],"integrity,":[35,164],"authenticity,":[36,165],"freshness,":[37,166],"order,":[38,167],"liveness.":[40],"With":[41],"the":[42,57,73,89,183,188],"rise":[43],"software-defined":[45],"vehicles":[46],"(SDVs),":[47],"where":[48],"software":[49,61],"governs":[50],"most":[51],"vehicle":[52],"functions":[53],"alongside":[54],"enhanced":[55],"connectivity,":[56],"need":[58],"for":[59],"secure":[60,99],"updates":[62],"has":[63,111],"become":[64],"increasingly":[65],"critical.":[66],"Software":[67,91],"vulnerabilities":[68],"can":[69],"severely":[70],"impact":[71],"safety,":[72],"economy,":[74],"society.":[76],"In":[77],"response":[78],"this":[80,127],"challenge,":[81],"Strandberg":[82],"et":[83],"al.":[84],"[escar":[85],"Europe,":[86],"2021]":[87],"introduced":[88],"Unified":[90],"Update":[92],"Framework":[93],"(UniSUF),":[94],"designed":[95],"provide":[97],"update":[100],"framework":[101,152],"integrates":[103],"seamlessly":[104],"with":[105,158],"existing":[106],"vehicular":[107],"infrastructures.":[108],"Although":[109],"previously":[112],"been":[113],"evaluated":[114],"regarding":[115],"cybersecurity,":[116],"these":[117],"assessments":[118],"have":[119],"not":[120],"employed":[121],"formal":[122,132],"verification":[123],"methods.":[124],"To":[125],"bridge":[126],"gap,":[128],"we":[129],"perform":[130],"analysis":[134],"UniSUF.":[136],"model":[138],"UniSUF\u2019s":[139,156],"architecture":[140],"assumptions":[142],"reflect":[144],"real-world":[145],"automotive":[146],"systems":[147],"develop":[149],"ProVerif-based":[151],"verifies":[155],"compliance":[157],"essential":[159],"requirements":[161],"\u2014":[162],"liveness":[169],"\u2014demonstrating":[170],"their":[171],"satisfiability":[172],"through":[173],"symbolic":[174],"execution.":[175],"Our":[176],"results":[177],"demonstrate":[178],"adheres":[181],"specified":[184],"guarantees,":[186],"ensuring":[187],"reliability":[191],"its":[193],"framework.":[195]},"counts_by_year":[],"updated_date":"2026-02-22T13:39:03.778224","created_date":"2025-11-12T00:00:00"}
