Personal information

Biography

Associate professor at Chalmers University of Technology

Activities

Employment (1)

Chalmers University of Technology: Gothenburg, SE

Employment
Source: Self-asserted source
0000-0001-9548-819X

Works (41)

A Systematic Literature Review on Automotive Digital Forensics: Challenges, Technical Solutions and Data Collection

IEEE Transactions on Intelligent Vehicles
2023-02 | Journal article
Contributors: Kim Strandberg; Nasser Nowdehi; Tomas Olovsson
Source: check_circle
Crossref

Future connected vehicles: Communications demands, privacy and cyber-security

Communications in Transportation Research
2022-12 | Journal article
Contributors: Tomas Olovsson; Tommy Svensson; Jiaming Wu
Source: check_circle
Crossref

Security of In-Vehicle Communication Systems

2021 | Book chapter
Contributors: Dennis Dubrefjord; Myeong-jin Jang; Oscar Carlsson; Hayder Hadi; Tomas Olovsson
Source: check_circle
Crossref

A preliminary security assessment of 5G V2X

IEEE Vehicular Technology Conference
2019 | Conference paper
EID:

2-s2.0-85068968628

Contributors: Lautenbach, A.; Nowdehi, N.; Olovsson, T.; Zaragatzky, R.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Understanding Common Automotive Security Issues and Their Implications

2019 | Book chapter
Contributors: Aljoscha Lautenbach; Magnus Almgren; Tomas Olovsson
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

In-vehicle CAN message authentication: An evaluation based on industrial criteria

IEEE Vehicular Technology Conference
2018 | Conference paper
EID:

2-s2.0-85045267869

Contributors: Nowdehi, N.; Lautenbach, A.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Introducing differential privacy to the automotive domain: Opportunities and challenges

IEEE Vehicular Technology Conference
2018 | Conference paper
EID:

2-s2.0-85045254353

Contributors: Nelson, B.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Joint subjective and objective data capture and analytics for automotive applications

IEEE Vehicular Technology Conference
2018 | Conference paper
EID:

2-s2.0-85045271948

Contributors: Johanson, M.; Jalminger, J.; Frécon, E.; Nelson, B.; Olovsson, T.; Gjertz, M.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Open Problems when Mapping Automotive Security Levels to System Requirements

VEHITS 2018 - Proceedings of the 4th International Conference on Vehicle Technology and Intelligent Transport Systems
2018 | Conference paper
EID:

2-s2.0-85051967629

Contributors: Rosenstatter, T.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Securing the Connected Car: A Security-Enhancement Methodology

IEEE Vehicular Technology Magazine
2018 | Journal article
EID:

2-s2.0-85041395995

Contributors: Strandberg, K.; Olovsson, T.; Jonsson, E.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Towards a Standardized Mapping from Automotive Security Levels to Security Mechanisms

IEEE Conference on Intelligent Transportation Systems, Proceedings, ITSC
2018 | Conference paper
EID:

2-s2.0-85060453612

Contributors: Rosenstatter, T.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

What the stack? On memory exploitation and protection in resource constrained automotive systems

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2018 | Book
EID:

2-s2.0-85053890432

Contributors: Lautenbach, A.; Almgren, M.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

A risk assessment framework for automotive embedded systems

CPSS 2016 - Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, Co-located with Asia CCS 2016
2016 | Conference paper
EID:

2-s2.0-84978864209

Contributors: Islam, M.M.; Lautenbach, A.; Sandberg, C.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Improving in-vehicle network architectures using automated partitioning algorithms

IEEE Vehicular Networking Conference, VNC
2016 | Conference paper
EID:

2-s2.0-84961989643

Contributors: Nowdehi, N.; Kleberger, P.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Security and privacy for big data: A systematic literature review

Proceedings - 2016 IEEE International Conference on Big Data, Big Data 2016
2016 | Conference paper
EID:

2-s2.0-85015167993

Contributors: Nelson, B.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Towards designing secure in-vehicle network architectures using community detection algorithms

IEEE Vehicular Networking Conference, VNC
2015 | Conference paper
EID:

2-s2.0-84936866998

Contributors: Kleberger, P.; Nowdehi, N.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

A local seed selection algorithm for overlapping community detection

ASONAM 2014 - Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
2014 | Conference paper
EID:

2-s2.0-84911061794

Contributors: Moradi, F.; Olovsson, T.; Tsigas, P.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Experiences from implementing the ETSI ITS SecuredMessage service

IEEE Intelligent Vehicles Symposium, Proceedings
2014 | Conference paper
EID:

2-s2.0-84905407637

Contributors: Nowdehi, N.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Overlapping communities for identifying misbehavior in network communications

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84901271896

Contributors: Moradi, F.; Olovsson, T.; Tsigas, P.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Securing vehicle diagnostics in repair shops

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2014 | Book
EID:

2-s2.0-84907076042

Contributors: Kleberger, P.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Protecting vehicles against unauthorised diagnostics sessions using trusted third parties

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2013 | Book
EID:

2-s2.0-84886441058

Contributors: Kleberger, P.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

An evaluation of community detection algorithms on large-scale email traffic

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | Book
EID:

2-s2.0-84864350728

Contributors: Moradi, F.; Olovsson, T.; Tsigas, P.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Assessing the quality of packet-level traces collected on internet backbone links

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2012 | Book
EID:

2-s2.0-84868350506

Contributors: Sangchoolie, B.; Nasab, M.R.; Olovsson, T.; John, W.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

The anti-social behavior of spam

Proceedings - 2011 7th European Conference on Computer Network Defense, EC2ND 2011
2012 | Conference paper
EID:

2-s2.0-84872258529

Contributors: Moradi, F.; Olovsson, T.; Tsigas, P.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Towards modeling legitimate and unsolicited email traffic using social network properties

Proceedings of the 5th Workshop on Social Network Systems, SNS'12
2012 | Conference paper
EID:

2-s2.0-84860738810

Contributors: Moradi, F.; Olovsson, T.; Tsigas, P.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Mapping systems security research at Chalmers

Proceedings - 1st SysSec Workshop, SysSec 2011
2011 | Conference paper
EID:

2-s2.0-83755178344

Contributors: Almgren, M.; Fu, Z.; Jonsson, E.; Kleberger, P.; Larsson, A.; Moradi, F.; Olovsson, T.; Papatriantafilou, M.; Pirzadeh, L.; Tsigas, P.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

On collection of large-scale multi-purpose datasets on internet backbone links

Proceedings of the 1st Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2011
2011 | Conference paper
EID:

2-s2.0-79958713285

Contributors: Moradi, F.; Almgren, M.; John, W.; Olovsson, T.; Tsigas, P.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Security aspects of the in-vehicle network in the connected car

IEEE Intelligent Vehicles Symposium, Proceedings
2011 | Conference paper
EID:

2-s2.0-79960771504

Contributors: Kleberger, P.; Olovsson, T.; Jonsson, E.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Passive internet measurement: Overview and guidelines based on experiences

Computer Communications
2010 | Journal article
EID:

2-s2.0-74849136745

Contributors: John, W.; Tafvelin, S.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

An analysis of the robustness and stability of the network stack in symbian-based smartphones

Journal of Networks
2009 | Journal article
EID:

2-s2.0-78651527844

Contributors: Habib, S.M.; Jacob, C.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

A practical analysis of the robustness and stability of the network stack in smartphones

Proceedings of 11th International Conference on Computer and Information Technology, ICCIT 2008
2008 | Conference paper
EID:

2-s2.0-66149163213

Contributors: Habib, S.M.; Jacob, C.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Detection of malicious traffic on back-bone links via packet header analysis

Campus-Wide Information Systems
2008 | Journal article
EID:

2-s2.0-57049097472

Contributors: John, W.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Trends and differences in connection-behavior within classes of internet backbone traffic

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
2008 | Book
EID:

2-s2.0-43949137599

Contributors: John, W.; Tafvelin, S.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Analysis of a secure system based on trusted components

Doktorsavhandlingar vid Chalmers Tekniska Hogskola
1999 | Journal article
EID:

2-s2.0-0033295037

Contributors: Lindqvist, Ulf; Olovsson, Tomas; Jonsson, Erland
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

A quantitative model of the security intrusion process based on attacker behavior

IEEE Transactions on Software Engineering
1997 | Journal article
EID:

2-s2.0-0031123773

Contributors: Jonsson, E.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Security intrusion process: An empirical model

IEEE Aerospace and Electronic Systems Magazine
1997 | Journal article
EID:

2-s2.0-0031121872

Contributors: Jonsson, E.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Analysis of a secure system based on trusted components

COMPASS - Proceedings of the Annual Conference on Computer Assurance
1996 | Conference paper
EID:

2-s2.0-0029725003

Contributors: Lindqvist, Ulf; Olovsson, Tomas; Jonsson, Erland
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Empirical model of the security intrusion process

COMPASS - Proceedings of the Annual Conference on Computer Assurance
1996 | Conference paper
EID:

2-s2.0-0029712750

Contributors: Jonsson, Erland; Olovsson, Tomas
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

On the modelling of preventive security based on a PC network intrusion experiment

Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
1996 | Book
EID:

2-s2.0-84947925731

Contributors: Gustafson, U.; Jonsson, E.; Olovsson, T.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

On measurement of operational security

COMPASS - Proceedings of the Annual Conference on Computer Assurance
1994 | Conference paper
EID:

2-s2.0-0028576333

Contributors: Brocklehurst, Sarah; Littlewood, Bev; Olovsson, Tomas; Jonsson, Erland
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

On Measurement of Operational Security

IEEE Aerospace and Electronic Systems Magazine
1994 | Journal article
EID:

2-s2.0-0028518284

Contributors: Brocklehurst, S.; Littlewood, B.; Olovsson, T.; Jonsson, E.
Source: Self-asserted source
0000-0001-9548-819X via Scopus - Elsevier

Peer review (1 review for 1 publication/grant)

Review activity for International journal of information security. (1)