-
3
-
-
78449313849
-
-
Technical report, U.S. Department Of Commerce, Bureau Of Industry And Security, Office Of Technology Evaluation
-
Defense industrial base assessment: Counterfeit electronics. Technical report, U.S. Department Of Commerce, Bureau Of Industry And Security, Office Of Technology Evaluation, 2010.
-
(2010)
Defense Industrial Base Assessment: Counterfeit Electronics
-
-
-
7
-
-
84889905204
-
-
G. Alliance
-
G. Alliance. Genivi. http://www.genivi.org/, 2009.
-
(2009)
-
-
-
8
-
-
80051967839
-
A formalization of the security features of physical functions
-
F. Armknecht, R. Maes, A.-R. Sadeghi, F.-X. Standaert, and C. Wachsmann. A formalization of the security features of physical functions. In IEEE Symposium on Security and Privacy, pages 397-412, 2011.
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 397-412
-
-
Armknecht, F.1
Maes, R.2
Sadeghi, A.-R.3
Standaert, F.-X.4
Wachsmann, C.5
-
9
-
-
84863544814
-
Unusual car navigation tricks
-
April
-
A. Barisani and D. Bianco. Unusual car navigation tricks. In CanSecWest, April 2007.
-
(2007)
CanSecWest
-
-
Barisani, A.1
Bianco, D.2
-
10
-
-
84900573989
-
A generic Public Key Infrastructure for securing Car-to-X Communication
-
N. Bissmeyer, H. Stuebing, E. Schoch, S. Götz, J. P. Stotz, and B. Lonc. A generic Public Key Infrastructure for securing Car-to-X Communication. In 18th ITS World Congress, Orlando, USA, Oct. 2011.
-
18th ITS World Congress, Orlando, USA, Oct. 2011
-
-
Bissmeyer, N.1
Stuebing, H.2
Schoch, E.3
Götz, S.4
Stotz, J.P.5
Lonc, B.6
-
11
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
S . C. Bono, M. Green, A. S tubblefield, A. Juels, A. D. Rubin, and M. Szydlo. Security analysis of a cryptographically-enabled RFID device. In USENIX Security Symposium, pages 1-16, 2005.
-
(2005)
USENIX Security Symposium
, pp. 1-16
-
-
Bono, S.C.1
Green, M.2
Tubblefield, A.S.3
Juels, A.4
Rubin, A.D.5
Szydlo, M.6
-
12
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. Comprehensive experimental analyses of automotive attack surfaces. In USENIX Security Symposium, 2011.
-
N USENIX Security Symposium, 2011
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
13
-
-
84889889772
-
-
C. C. Consortium
-
C. C. Consortium. Mirror link. http://www.terminalmode.org/, 2010.
-
(2010)
Mirror Link
-
-
-
14
-
-
62949120568
-
Control, computing and communications: Technologies for the twenty-first century model T
-
J. Cook, I. Kolmanovsky, D. McNamara, E. Nelson, and K. Prasad. Control, computing and communications: Technologies for the twenty-first century model T. Proceedings of the IEEE, 95(2):334-355, 2007.
-
(2007)
Proceedings of the IEEE
, vol.95
, Issue.2
, pp. 334-355
-
-
Cook, J.1
Kolmanovsky, I.2
McNamara, D.3
Nelson, E.4
Prasad, K.5
-
15
-
-
84947280693
-
Interface theories for component-based design
-
T. Henzinger and C. Kirsch, editors, Embedded Software, Springer Berlin / Heidelberg
-
L. de Alfaro and T. Henzinger. Interface theories for component-based design. In T. Henzinger and C. Kirsch, editors, Embedded Software, volume 2211 of Lecture Notes in Computer Science, pages 148-165. Springer Berlin / Heidelberg, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2211
, pp. 148-165
-
-
De Alfaro, L.1
Henzinger, T.2
-
16
-
-
33749389311
-
Interface-based design
-
M. Broy, J. Grünbauer, D. Harel, and T. Hoare, editors, Engineering Theories of Software Intensive Systems, Springer Netherlands
-
L. de Alfaro and T. Henzinger. Interface-based design. In M. Broy, J. Grünbauer, D. Harel, and T. Hoare, editors, Engineering Theories of Software Intensive Systems, volume 195 of NATO Science Series, pages 83-104. Springer Netherlands, 2005.
-
(2005)
NATO Science Series
, vol.195
, pp. 83-104
-
-
De Alfaro, L.1
Henzinger, T.2
-
18
-
-
79955838538
-
Research challenges in intervehicular communication: Lessons of the 2010 dagstuhl seminar
-
F. Dressler, F. Kargl, J. Ott, O. Tonguz, and L. Wischhof. Research challenges in intervehicular communication: lessons of the 2010 dagstuhl seminar. Communications Magazine, IEEE, 49(5):158-164, 2011.
-
(2011)
Communications Magazine, IEEE
, vol.49
, Issue.5
, pp. 158-164
-
-
Dressler, F.1
Kargl, F.2
Ott, J.3
Tonguz, O.4
Wischhof, L.5
-
19
-
-
51849131973
-
On the power of power analysis in the real world: A complete break of the keeloqcode hopping scheme
-
T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, and M. T. M. Shalmani. On the power of power analysis in the real world: A complete break of the keeloqcode hopping scheme. In CRYPTO, pages 203-220, 2008.
-
(2008)
CRYPTO
, pp. 203-220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.T.M.6
-
21
-
-
84889940324
-
Specification and evaluation of e-security relevant use cases
-
The EVITA project Deliverable 2.1, http://evita-project.org/deliverables. html. Specification and evaluation of e-security relevant use cases, 2009.
-
(2009)
The EVITA Project Deliverable 2.1
-
-
-
22
-
-
84889924296
-
Security requirements for automotive on-board networks based on dark-side scenarios
-
The EVITA project Deliverable 2.3, http://evita-project.org/deliverables. html. Security requirements for automotive on-board networks based on dark-side scenarios, 2009.
-
(2009)
The EVITA Project Deliverable 2.3
-
-
-
23
-
-
84889935029
-
Security and trust model
-
The EVITA project Deliverable 3.1, http://evita-project.org/deliverables. html. Security and trust model, 2009.
-
(2009)
The EVITA Project Deliverable 3.1
-
-
-
24
-
-
0038341105
-
Silicon physical random functions
-
B. Gassend, D. Clarke, M. van Dijk, and S. Devadas. Silicon physical random functions. In ACM Computer and Communications Security Conference (CCS), pages 148-160, 2002.
-
(2002)
ACM Computer and Communications Security Conference (CCS)
, pp. 148-160
-
-
Gassend, B.1
Clarke, D.2
Van Dijk, M.3
Devadas, S.4
-
25
-
-
0024089972
-
The confused deputy (or why capabilities might have been invented)
-
N. Hardy. The confused deputy (or why capabilities might have been invented). Operating Systems Review, 22(4):36-38, 1988.
-
(1988)
Operating Systems Review
, vol.22
, Issue.4
, pp. 36-38
-
-
Hardy, N.1
-
26
-
-
56449111413
-
Sniffing/replay attacks on CAN buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy
-
T. Hoppe and J. Dittman. Sniffing/replay attacks on CAN buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy. In Workshop on Embedded Systems Security (WESS), 2007.
-
Workshop on Embedded Systems Security (WESS), 2007
-
-
Hoppe, T.1
Dittman, J.2
-
27
-
-
56449088090
-
Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures
-
T. Hoppe, S. Kiltz, and J. Dittmann. Security threats to automotive CAN networks - practical examples and selected short-term countermeasures. In Computer Safety, Reliability, and Security (SAFECOMP), pages 235-248, 2008.
-
(2008)
Computer Safety, Reliability, and Security (SAFECOMP)
, pp. 235-248
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
28
-
-
70350456312
-
Automotive IT-security as a challenge: Basic attacks from the black box perspective on the example of privacy threats
-
T. Hoppe, S. Kiltz, and J. Dittmann. Automotive IT-security as a challenge: Basic attacks from the black box perspective on the example of privacy threats. In Computer Safety, Reliability, and Security (SAFECOMP), pages 145-158, 2009.
-
(2009)
Computer Safety, Reliability, and Security (SAFECOMP)
, pp. 145-158
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
29
-
-
57449086537
-
Secure vehicular communication systems: Implementation, performance, and research challenges
-
F. Kargl, P. Papadimitratos, L. Buttyan, M. Muter, E. Schoch, B. Wiedersheim, T.-V. Thong, G. Calandriello, A. Held, A. Kung, and J.-P. Hubaux. Secure vehicular communication systems: implementation, performance, and research challenges. IEEE Communications Magazine, 46(11):110-118, 2008.
-
(2008)
IEEE Communications Magazine
, vol.46
, Issue.11
, pp. 110-118
-
-
Kargl, F.1
Papadimitratos, P.2
Buttyan, L.3
Muter, M.4
Schoch, E.5
Wiedersheim, B.6
Thong, T.-V.7
Calandriello, G.8
Held, A.9
Kung, A.10
Hubaux, J.-P.11
-
31
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. Experimental security analysis of a modern automobile. In IEEE Symposium on Security and Privacy (S& P), pages 447-462, 2010.
-
(2010)
IEEE Symposium on Security and Privacy (S& P)
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
32
-
-
84855943309
-
Provably secure active ic metering techniques for piracy avoidance and digital rights management
-
F. Koushanfar. Provably secure active ic metering techniques for piracy avoidance and digital rights management. IEEE Transactions on Information Forensics and Security, 7(1):51-63, 2012.
-
(2012)
IEEE Transactions on Information Forensics and Security
, vol.7
, Issue.1
, pp. 51-63
-
-
Koushanfar, F.1
-
33
-
-
84863550104
-
Can EDA combat the rise of electronic counterfeiting?
-
F. Koushanfar, S. Fazzari, C. McCants, W. Bryson, M. Sale, P. Song, and M. Potkonjak. Can EDA combat the rise of electronic counterfeiting? In Design Automation Conference (DAC), 2012.
-
Design Automation Conference (DAC), 2012
-
-
Koushanfar, F.1
Fazzari, S.2
McCants, C.3
Bryson, W.4
Sale, M.5
Song, P.6
Potkonjak, M.7
-
34
-
-
38149089543
-
Future perspectives: The car and its IP-address - A potential safety and security risk assessment
-
A. Lang, J. Dittmann, S. Kiltz, and T. Hoppe. Future perspectives: The car and its IP-address - a potential safety and security risk assessment. In International Conference Computer Safety, Reliability, and Security (SAFECOMP), pages 40-53, 2007.
-
(2007)
International Conference Computer Safety, Reliability, and Security (SAFECOMP)
, pp. 40-53
-
-
Lang, A.1
Dittmann, J.2
Kiltz, S.3
Hoppe, T.4
-
37
-
-
58149105204
-
Efficient in-vehicle delayed data authentication based on compound message authentication codes
-
D. K. Nilsson, U. Larson, and E. Jonsson. Efficient in-vehicle delayed data authentication based on compound message authentication codes. In VTC Fall'08, pages 1-5, 2008.
-
(2008)
VTC Fall'08
, pp. 1-5
-
-
Nilsson, D.K.1
Larson, U.2
Jonsson, E.3
-
40
-
-
33947627712
-
Timing analysis of the FlexRay communication protocol
-
T. Pop, P. Pop, P. Eles, Z. Peng, and A. Andrei. Timing analysis of the FlexRay communication protocol. In Euromicro Conference on Real-Time Systems, pages 203-216, 2006.
-
(2006)
Euromicro Conference on Real-Time Systems
, pp. 203-216
-
-
Pop, T.1
Pop, P.2
Eles, P.3
Peng, Z.4
Andrei, A.5
-
42
-
-
33845564340
-
Securing vehicular communications
-
M. Raya, P. Papadimitratos, and J.-P. Hubaux. Securing vehicular communications. IEEE Wireless Communications,, 13(5):8-15, 2006.
-
(2006)
IEEE Wireless Communications
, vol.13
, Issue.5
, pp. 8-15
-
-
Raya, M.1
Papadimitratos, P.2
Hubaux, J.-P.3
-
43
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar. Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In USENIX Security Symposium, 2010.
-
USENIX Security Symposium, 2010
-
-
Rouf, I.1
Miller, R.2
Mustafa, H.3
Taylor, T.4
Oh, S.5
Xu, W.6
Gruteser, M.7
Trappe, W.8
Seskar, I.9
-
47
-
-
34547824056
-
Quo Vadis, SLD? Reasoning about the trends and challenges of system level design
-
A. L. Sangiovanni-Vincentelli. Quo Vadis, SLD? reasoning about the trends and challenges of system level design. Proceedings of the IEEE, 95(3):467-506, 2007.
-
(2007)
Proceedings of the IEEE
, vol.95
, Issue.3
, pp. 467-506
-
-
Sangiovanni-Vincentelli, A.L.1
-
48
-
-
36249000551
-
Embedded system design for automotive applications
-
A. L. Sangiovanni-Vincentelli and M. Di Natale. Embedded system design for automotive applications. IEEE Computer, 40(10):42-51, 2007.
-
(2007)
IEEE Computer
, vol.40
, Issue.10
, pp. 42-51
-
-
Sangiovanni-Vincentelli, A.L.1
Di Natale, M.2
-
50
-
-
79953252420
-
-
Technical Report Deliverable D3.3, EVITA Project
-
H. Schweppe, M. Idrees, Y. Roudier, B. Weyl, R. El Khayari, O. Henniger, D. Scheuermann, G. Pedroza, L. Apvrille, H. Seudié, H. Platzdasch, and M. Sall. Secure on-board protocols specification. Technical Report Deliverable D3.3, EVITA Project, 2010.
-
(2010)
Secure On-board Protocols Specification
-
-
Schweppe, H.1
Idrees, M.2
Roudier, Y.3
Weyl, B.4
El Khayari, R.5
Henniger, O.6
Scheuermann, D.7
Pedroza, G.8
Apvrille, L.9
Seudié, H.10
Platzdasch, H.11
Sall, M.12
-
54
-
-
77955207434
-
A spy under the hood: Controlling risk and automotive EDR
-
P. R. Thorn and C. A. MacCarley. A spy under the hood: Controlling risk and automotive EDR. In Risk Management, 2008.
-
(2008)
Risk Management
-
-
Thorn, P.R.1
MacCarley, C.A.2
-
56
-
-
84889893599
-
-
VDAT. Der deutsche tuningmarkt. http: //www.vdat.org/tuningmarkt- deutschland.php/, 2010.
-
(2010)
Der Deutsche Tuningmarkt
-
-
-
57
-
-
79953236789
-
-
Technical Report Deliverable D3.2, EVITA Project
-
B. Weyl, M. Wolf, F. Zweers, T. Gendrullis, M. Idrees, Y. Roudier, H. Schweppe, H. Platzdasch, R. El Khayari, O. Henniger, D. Scheuermann, A. Fuchs, L. Apvrille, G. Pedroza, H. Seudié, J. Shokrollahi, and A. Keil. Secure on-board architecture specification. Technical Report Deliverable D3.2, EVITA Project, 2010.
-
(2010)
Secure On-board Architecture Specification
-
-
Weyl, B.1
Wolf, M.2
Zweers, F.3
Gendrullis, T.4
Idrees, M.5
Roudier, Y.6
Schweppe, H.7
Platzdasch, H.8
El Khayari, R.9
Henniger, O.10
Scheuermann, D.11
Fuchs, A.12
Apvrille, L.13
Pedroza, G.14
Seudié, H.15
Shokrollahi, J.16
Keil, A.17
-
59
-
-
0036199902
-
Telematics: Safe and fun driving
-
jan/feb
-
Y. Zhao. Telematics: safe and fun driving. IEEE Intelligent Systems, 17(1):10-14, jan/feb 2002.
-
(2002)
IEEE Intelligent Systems
, vol.17
, Issue.1
, pp. 10-14
-
-
Zhao, Y.1
|