메뉴 건너뛰기




Volumn , Issue , 2012, Pages 220-228

EDA for secure and dependable cybercars: Challenges and opportunities

Author keywords

automotive security; CPS security; perspective article

Indexed keywords

AUTOMOTIVE SECURITY; CLOUD SERVICES; CPS SECURITY; CYBERCARS; DEPENDABLE SYSTEMS; DESIGN METHODOLOGY; HARD REAL-TIME CONTROL; INFOTAINMENT; LEGACY PROTOCOL; PARADIGM SHIFTS; PERSPECTIVE ARTICLE; SECURITY REQUIREMENTS; SYSTEM COMPLEXITY; TESTING AND EVALUATION;

EID: 84863550114     PISSN: 0738100X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2228360.2228402     Document Type: Conference Paper
Times cited : (39)

References (59)
  • 3
    • 78449313849 scopus 로고    scopus 로고
    • Technical report, U.S. Department Of Commerce, Bureau Of Industry And Security, Office Of Technology Evaluation
    • Defense industrial base assessment: Counterfeit electronics. Technical report, U.S. Department Of Commerce, Bureau Of Industry And Security, Office Of Technology Evaluation, 2010.
    • (2010) Defense Industrial Base Assessment: Counterfeit Electronics
  • 7
    • 84889905204 scopus 로고    scopus 로고
    • G. Alliance
    • G. Alliance. Genivi. http://www.genivi.org/, 2009.
    • (2009)
  • 9
    • 84863544814 scopus 로고    scopus 로고
    • Unusual car navigation tricks
    • April
    • A. Barisani and D. Bianco. Unusual car navigation tricks. In CanSecWest, April 2007.
    • (2007) CanSecWest
    • Barisani, A.1    Bianco, D.2
  • 13
    • 84889889772 scopus 로고    scopus 로고
    • C. C. Consortium
    • C. C. Consortium. Mirror link. http://www.terminalmode.org/, 2010.
    • (2010) Mirror Link
  • 14
    • 62949120568 scopus 로고    scopus 로고
    • Control, computing and communications: Technologies for the twenty-first century model T
    • J. Cook, I. Kolmanovsky, D. McNamara, E. Nelson, and K. Prasad. Control, computing and communications: Technologies for the twenty-first century model T. Proceedings of the IEEE, 95(2):334-355, 2007.
    • (2007) Proceedings of the IEEE , vol.95 , Issue.2 , pp. 334-355
    • Cook, J.1    Kolmanovsky, I.2    McNamara, D.3    Nelson, E.4    Prasad, K.5
  • 15
    • 84947280693 scopus 로고    scopus 로고
    • Interface theories for component-based design
    • T. Henzinger and C. Kirsch, editors, Embedded Software, Springer Berlin / Heidelberg
    • L. de Alfaro and T. Henzinger. Interface theories for component-based design. In T. Henzinger and C. Kirsch, editors, Embedded Software, volume 2211 of Lecture Notes in Computer Science, pages 148-165. Springer Berlin / Heidelberg, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2211 , pp. 148-165
    • De Alfaro, L.1    Henzinger, T.2
  • 16
    • 33749389311 scopus 로고    scopus 로고
    • Interface-based design
    • M. Broy, J. Grünbauer, D. Harel, and T. Hoare, editors, Engineering Theories of Software Intensive Systems, Springer Netherlands
    • L. de Alfaro and T. Henzinger. Interface-based design. In M. Broy, J. Grünbauer, D. Harel, and T. Hoare, editors, Engineering Theories of Software Intensive Systems, volume 195 of NATO Science Series, pages 83-104. Springer Netherlands, 2005.
    • (2005) NATO Science Series , vol.195 , pp. 83-104
    • De Alfaro, L.1    Henzinger, T.2
  • 18
    • 79955838538 scopus 로고    scopus 로고
    • Research challenges in intervehicular communication: Lessons of the 2010 dagstuhl seminar
    • F. Dressler, F. Kargl, J. Ott, O. Tonguz, and L. Wischhof. Research challenges in intervehicular communication: lessons of the 2010 dagstuhl seminar. Communications Magazine, IEEE, 49(5):158-164, 2011.
    • (2011) Communications Magazine, IEEE , vol.49 , Issue.5 , pp. 158-164
    • Dressler, F.1    Kargl, F.2    Ott, J.3    Tonguz, O.4    Wischhof, L.5
  • 19
    • 51849131973 scopus 로고    scopus 로고
    • On the power of power analysis in the real world: A complete break of the keeloqcode hopping scheme
    • T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, and M. T. M. Shalmani. On the power of power analysis in the real world: A complete break of the keeloqcode hopping scheme. In CRYPTO, pages 203-220, 2008.
    • (2008) CRYPTO , pp. 203-220
    • Eisenbarth, T.1    Kasper, T.2    Moradi, A.3    Paar, C.4    Salmasizadeh, M.5    Shalmani, M.T.M.6
  • 21
    • 84889940324 scopus 로고    scopus 로고
    • Specification and evaluation of e-security relevant use cases
    • The EVITA project Deliverable 2.1, http://evita-project.org/deliverables. html. Specification and evaluation of e-security relevant use cases, 2009.
    • (2009) The EVITA Project Deliverable 2.1
  • 22
    • 84889924296 scopus 로고    scopus 로고
    • Security requirements for automotive on-board networks based on dark-side scenarios
    • The EVITA project Deliverable 2.3, http://evita-project.org/deliverables. html. Security requirements for automotive on-board networks based on dark-side scenarios, 2009.
    • (2009) The EVITA Project Deliverable 2.3
  • 23
    • 84889935029 scopus 로고    scopus 로고
    • Security and trust model
    • The EVITA project Deliverable 3.1, http://evita-project.org/deliverables. html. Security and trust model, 2009.
    • (2009) The EVITA Project Deliverable 3.1
  • 25
    • 0024089972 scopus 로고
    • The confused deputy (or why capabilities might have been invented)
    • N. Hardy. The confused deputy (or why capabilities might have been invented). Operating Systems Review, 22(4):36-38, 1988.
    • (1988) Operating Systems Review , vol.22 , Issue.4 , pp. 36-38
    • Hardy, N.1
  • 26
    • 56449111413 scopus 로고    scopus 로고
    • Sniffing/replay attacks on CAN buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy
    • T. Hoppe and J. Dittman. Sniffing/replay attacks on CAN buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy. In Workshop on Embedded Systems Security (WESS), 2007.
    • Workshop on Embedded Systems Security (WESS), 2007
    • Hoppe, T.1    Dittman, J.2
  • 27
    • 56449088090 scopus 로고    scopus 로고
    • Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures
    • T. Hoppe, S. Kiltz, and J. Dittmann. Security threats to automotive CAN networks - practical examples and selected short-term countermeasures. In Computer Safety, Reliability, and Security (SAFECOMP), pages 235-248, 2008.
    • (2008) Computer Safety, Reliability, and Security (SAFECOMP) , pp. 235-248
    • Hoppe, T.1    Kiltz, S.2    Dittmann, J.3
  • 28
    • 70350456312 scopus 로고    scopus 로고
    • Automotive IT-security as a challenge: Basic attacks from the black box perspective on the example of privacy threats
    • T. Hoppe, S. Kiltz, and J. Dittmann. Automotive IT-security as a challenge: Basic attacks from the black box perspective on the example of privacy threats. In Computer Safety, Reliability, and Security (SAFECOMP), pages 145-158, 2009.
    • (2009) Computer Safety, Reliability, and Security (SAFECOMP) , pp. 145-158
    • Hoppe, T.1    Kiltz, S.2    Dittmann, J.3
  • 32
    • 84855943309 scopus 로고    scopus 로고
    • Provably secure active ic metering techniques for piracy avoidance and digital rights management
    • F. Koushanfar. Provably secure active ic metering techniques for piracy avoidance and digital rights management. IEEE Transactions on Information Forensics and Security, 7(1):51-63, 2012.
    • (2012) IEEE Transactions on Information Forensics and Security , vol.7 , Issue.1 , pp. 51-63
    • Koushanfar, F.1
  • 37
    • 58149105204 scopus 로고    scopus 로고
    • Efficient in-vehicle delayed data authentication based on compound message authentication codes
    • D. K. Nilsson, U. Larson, and E. Jonsson. Efficient in-vehicle delayed data authentication based on compound message authentication codes. In VTC Fall'08, pages 1-5, 2008.
    • (2008) VTC Fall'08 , pp. 1-5
    • Nilsson, D.K.1    Larson, U.2    Jonsson, E.3
  • 47
    • 34547824056 scopus 로고    scopus 로고
    • Quo Vadis, SLD? Reasoning about the trends and challenges of system level design
    • A. L. Sangiovanni-Vincentelli. Quo Vadis, SLD? reasoning about the trends and challenges of system level design. Proceedings of the IEEE, 95(3):467-506, 2007.
    • (2007) Proceedings of the IEEE , vol.95 , Issue.3 , pp. 467-506
    • Sangiovanni-Vincentelli, A.L.1
  • 48
    • 36249000551 scopus 로고    scopus 로고
    • Embedded system design for automotive applications
    • A. L. Sangiovanni-Vincentelli and M. Di Natale. Embedded system design for automotive applications. IEEE Computer, 40(10):42-51, 2007.
    • (2007) IEEE Computer , vol.40 , Issue.10 , pp. 42-51
    • Sangiovanni-Vincentelli, A.L.1    Di Natale, M.2
  • 54
    • 77955207434 scopus 로고    scopus 로고
    • A spy under the hood: Controlling risk and automotive EDR
    • P. R. Thorn and C. A. MacCarley. A spy under the hood: Controlling risk and automotive EDR. In Risk Management, 2008.
    • (2008) Risk Management
    • Thorn, P.R.1    MacCarley, C.A.2
  • 56
    • 84889893599 scopus 로고    scopus 로고
    • VDAT. Der deutsche tuningmarkt. http: //www.vdat.org/tuningmarkt- deutschland.php/, 2010.
    • (2010) Der Deutsche Tuningmarkt
  • 59
    • 0036199902 scopus 로고    scopus 로고
    • Telematics: Safe and fun driving
    • jan/feb
    • Y. Zhao. Telematics: safe and fun driving. IEEE Intelligent Systems, 17(1):10-14, jan/feb 2002.
    • (2002) IEEE Intelligent Systems , vol.17 , Issue.1 , pp. 10-14
    • Zhao, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.