메뉴 건너뛰기




Volumn , Issue , 2008, Pages 66-72

Simulated attacks on CAN buses: Vehicle virus

Author keywords

Attacks; CAN bus; Simulation; Vehicle; Virus

Indexed keywords

ATTACKS; AUTOMOTIVE MANUFACTURERS; CAN BUS; CYBER ATTACKS; ELECTRONIC CONTROL UNITS; EXTERNAL NETWORKS; FLEET MANAGEMENTS; IN-VEHICLE NETWORKS; OVER THE AIRS; REMOTE DIAGNOSTICS; SIMULATION;

EID: 57749201727     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (58)

References (16)
  • 1
    • 62949213030 scopus 로고    scopus 로고
    • Wireless Multicasting for Remote Software Upload in Vehicles with Realistic Vehicle Movement. Technical report, Electrical and Computer Engineering Department, Wayne State University, Detroit, MI 48202 USA
    • Radovan Miucic and Syed Masud Mahmud. Wireless Multicasting for Remote Software Upload in Vehicles with Realistic Vehicle Movement. Technical report, Electrical and Computer Engineering Department, Wayne State University, Detroit, MI 48202 USA, 2005.
    • (2005)
    • Miucic, R.1    Masud Mahmud, S.2
  • 2
    • 62949135288 scopus 로고    scopus 로고
    • Bosch. CAN Specification 2.0. http://www.dcd.pl/dcdpdf/can2spec.pdf, 1991. Visited August, 2007.
    • Bosch. CAN Specification 2.0. http://www.dcd.pl/dcdpdf/can2spec.pdf, 1991. Visited August, 2007.
  • 3
    • 62949083828 scopus 로고    scopus 로고
    • Konrad Etschberger. CAN-Based Higher Layer Protocols and Profiles, http://www.ixxat. com. Visited October, 2007.
    • Konrad Etschberger. CAN-Based Higher Layer Protocols and Profiles, http://www.ixxat. com. Visited October, 2007.
  • 5
    • 56449111413 scopus 로고    scopus 로고
    • Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy
    • Salzburg, Austria
    • Tobias Hoppe and Jana Dittman. Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy. In Proceedings of the 2nd Workshop on Embedded Systems Security (WESS), Salzburg, Austria, 2007.
    • (2007) Proceedings of the 2nd Workshop on Embedded Systems Security (WESS)
    • Hoppe, T.1    Dittman, J.2
  • 7
    • 0003527984 scopus 로고    scopus 로고
    • Internetworking with TCP/IP
    • Fourth Edition. Prentice Hall PTR, Upper Saddle River, NJ, USA
    • Douglas E. Comer. Internetworking with TCP/IP, Volume 1: Principles, Protocols, and Architectures, Fourth Edition. Prentice Hall PTR, Upper Saddle River, NJ, USA, 2000.
    • (2000) Principles, Protocols, and Architectures , vol.1
    • Comer, D.E.1
  • 8
    • 62949215352 scopus 로고    scopus 로고
    • CIA. CanOpen Application Layer and Communication Profile. http://www.can-cia.org/downloads/ciaspecifications/, 2006. Visited August, 2007.
    • CIA. CanOpen Application Layer and Communication Profile. http://www.can-cia.org/downloads/ciaspecifications/, 2006. Visited August, 2007.
  • 13
    • 62949131976 scopus 로고    scopus 로고
    • John D. Howard and Thomas A. Longstaff. A Common Language for Computer Security Incidents (SAND98-8667), 1998.
    • John D. Howard and Thomas A. Longstaff. A Common Language for Computer Security Incidents (SAND98-8667), 1998.
  • 14
    • 62949097651 scopus 로고    scopus 로고
    • Vector Informatik. CANoe and DENoe 6.1. http://www.vector-worldwide.com/ vi-canoe-en. html, 2007. Visited August, 2007.
    • Vector Informatik. CANoe and DENoe 6.1. http://www.vector-worldwide.com/ vi-canoe-en. html, 2007. Visited August, 2007.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.