메뉴 건너뛰기




Volumn 96, Issue 1, 2011, Pages 11-25

Security threats to automotive CAN networksPractical examples and selected short-term countermeasures

Author keywords

Automotive intrusion detection; Automotive IT; Automotive IT forensics; Countermeasures; Interplay between security and safety; Practical attack scenarios

Indexed keywords

ATTACK SCENARIOS; AUTOMOTIVE INTRUSION DETECTION; AUTOMOTIVE IT; AUTOMOTIVE IT-FORENSICS; COUNTERMEASURES; INTERPLAY BETWEEN SECURITY AND SAFETY;

EID: 78649321196     PISSN: 09518320     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ress.2010.06.026     Document Type: Conference Paper
Times cited : (216)

References (26)
  • 1
    • 78649316648 scopus 로고    scopus 로고
    • Eugene Kaspersky, Viruses coming aboard? Viruslist.com [accessed12.07.10]
    • Eugene Kaspersky, Viruses coming aboard? Viruslist.com 〈http://www.viruslist.com/en/weblog?discuss=158190454&return=1〉 ; 2008 [accessed 12.07.10].
    • (2008)
  • 3
    • 78649316438 scopus 로고    scopus 로고
    • Car-2-Car Communication Consortium
    • Car-2-Car Communication Consortium, 〈http://www.car-2-car.org/〉 ; 2008.
  • 4
    • 38149089543 scopus 로고    scopus 로고
    • Future perspectives: The car and its IP-address - A potential safety and security risk assessment
    • Computer safety, reliability, and security Nuremberg, Germany, September 2007 Springer LNCS. pp. 40-53. isbn 978-3-540-75100-7
    • Andreas Lang, Jana Dittmann, Stefan Kiltz, Tobias Hoppe, Future perspectives: the car and its IP-addressa potential safety and security risk assessment. In: Computer safety, reliability, and security, Proceedings of the 26th international conference SAFECOMP 2007, Nuremberg, Germany, September 2007, vol. 4680. Springer LNCS. pp. 4053. isbn 978-3-540-75100-7.
    • Proceedings of the 26th International Conference SAFECOMP 2007 , vol.4680
    • Lang, A.1    Dittmann, J.2    Kiltz, S.3    Hoppe, T.4
  • 5
    • 78649316334 scopus 로고    scopus 로고
    • BOSCH CAN
    • BOSCH CAN, 〈http://www.can.bosch.com/〉 ; 2010
  • 7
    • 34547223428 scopus 로고    scopus 로고
    • State of the art: Embedding security in vehicles
    • Article ID 74706
    • Marko Wolf, Andr Weimerskirch, Thomas Wollinger, State of the art: embedding security in vehicles. EURASIP Journal on Embedded Systems 2007; (2007): 16 pages. Article ID 74706, doi:10.1155/2007/74706.
    • (2007) EURASIP Journal on Embedded Systems 2007 , pp. 16
    • Marko Wolf, A.1
  • 9
    • 78649334636 scopus 로고    scopus 로고
    • Press release of Ruhr-Universitt Bochum
    • Press release of Ruhr-Universitt Bochum. Remote keyless entry system for cars and buildings is hacked 〈http://www.crypto.rub.de/imperia/md/content/ projects/keeloq/keeloq-en.pdf〉 ; 31 May 31 2008.
    • Remote Keyless Entry System for Cars and Buildings Is Hacked
  • 10
    • 78649327344 scopus 로고    scopus 로고
    • HIS: Herstellerinitiative Software
    • HIS: Herstellerinitiative Software, 〈http://www.automotive-his.de/ 〉 ; 2010.
  • 11
    • 78649316826 scopus 로고    scopus 로고
    • Vector Informatik
    • Vector Informatik, 〈http://www.vector-informatik.com/〉 ; 2010.
  • 12
    • 56449111413 scopus 로고    scopus 로고
    • Sniffing/replay attacks on CAN buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy
    • a workshop of the IEEE/ACM EMSOFT'2007 and the Embedded Systems Week October 4
    • Tobias Hoppe, Jana Dittmann, Sniffing/replay attacks on CAN buses: a simulated attack on the electric window lift classified using an adapted CERT taxonomy. In: 2nd Workshop on embedded systems security (WESS'2007), a workshop of the IEEE/ACM EMSOFT'2007 and the Embedded Systems Week October 4; 2007.
    • (2007) 2nd Workshop on Embedded Systems Security (WESS'2007)
    • Hoppe, T.1    Dittmann, J.2
  • 13
    • 37149003756 scopus 로고    scopus 로고
    • Exemplary automotive attack scenarios: Trojan horses for electronic throttle control system (ETC) and replay attacks on the power window system
    • 23. VDI/VW Gemeinschaftstagung Automotive Security, Wolfsburg, Germany, 27-28 November 2007. VDI-Verlag; 2007 isbn 978-3-18-092016-0
    • Tobias Hoppe, Stefan Kiltz, Andreas Lang, Jana Dittmann, Exemplary automotive attack scenarios: trojan horses for electronic throttle control system (ETC) and replay attacks on the power window system. In: Automotive SecurityVDI-Berichte 2016, 23. VDI/VW Gemeinschaftstagung Automotive Security, Wolfsburg, Germany, 2728 November 2007. VDI-Verlag; 2007. pp. 165183. isbn 978-3-18-092016-0.
    • Automotive Security - VDI-Berichte 2016 , pp. 165-183
    • Hoppe, T.1    Kiltz, S.2    Lang, A.3    Dittmann, J.4
  • 17
    • 78649329458 scopus 로고    scopus 로고
    • FlexRay, The communication system for advanced automotive control applications
    • FlexRay, The communication system for advanced automotive control applications. 〈http://www.flexray.com/〉 ; 2010.
  • 18
    • 77956249542 scopus 로고    scopus 로고
    • Applying intrusion detection to automotive ITearly insights and remaining challenges
    • Tobias Hoppe, Stefan Kiltz, and Jana Dittmann Applying intrusion detection to automotive ITearly insights and remaining challenges Journal of Information Assurance and Security (JIAS) 4 6 2009 226 235
    • (2009) Journal of Information Assurance and Security (JIAS) , vol.4 , Issue.6 , pp. 226-235
    • Hoppe, T.1    Kiltz, S.2    Dittmann, J.3
  • 19
    • 84867618874 scopus 로고    scopus 로고
    • Forensische Datenarten undanalysen in automotiven Systemen
    • Stefan Kiltz, Mario Hildebrandt, and Jana Dittmann Forensische Datenarten undanalysen in automotiven Systemen Patrick Horster (Hrsg), DACH Security 2009 2009
    • (2009) DACH Security 2009
    • Kiltz, S.1    Hildebrandt, M.2    Dittmann, J.3
  • 21
    • 78649329969 scopus 로고    scopus 로고
    • OSI reference modelthe ISO model of architecture for open systems interconnection
    • Hubert Zimmermann OSI reference modelthe ISO model of architecture for open systems interconnection IEEE Transaction on Communications 2010
    • (2010) IEEE Transaction on Communications
    • Zimmermann, H.1
  • 23
    • 70449586783 scopus 로고    scopus 로고
    • A new forensic model and its application to the collection, extraction and long term storage of screen content off a memory dump
    • IEEE Catalog Number CFP09452-CDR, 5-7 July 2009, Santorini/Greece. isbn 978-1-4244-3298-1
    • Stefan Kiltz, Tobias Hoppe, Jana Dittmann, A new forensic model and its application to the collection, extraction and long term storage of screen content off a memory dump, In: 16th International conference on digital signal processing (DSP2009), IEEE Catalog Number CFP09452-CDR, 57 July 2009, Santorini/Greece. isbn 978-1-4244-3298-1.
    • 16th International Conference on Digital Signal Processing (DSP2009)
    • Kiltz, S.1    Hoppe, T.2    Dittmann, J.3
  • 25
    • 78649327113 scopus 로고    scopus 로고
    • Trusted Computing Group
    • Trusted Computing Group, 〈https://www.trustedcomputinggroup.org/ 〉 ; 2010.
  • 26
    • 37149034453 scopus 로고    scopus 로고
    • Trusted computing for automotive systems
    • 23. VDI/VW Gemeinschaftstagung Automotive Security, Wolfsburg, Germany, 27-28, November 2007, VDI-Verlag isbn 978-3-18-092016-0
    • Bogdanov A, Eisenbarth T, Wolf M, Wollinger T, Trusted computing for automotive systems. In: Automotive securityVDI-Berichte 2016, 23. VDI/VW Gemeinschaftstagung Automotive Security, Wolfsburg, Germany, 2728, November 2007, VDI-Verlag; 2007. pp. 227237. isbn 978-3-18-092016-0
    • (2007) Automotive Security-VDI-Berichte 2016 , pp. 227-237
    • Bogdanov, A.1    Eisenbarth, T.2    Wolf, M.3    Wollinger, T.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.