메뉴 건너뛰기




Volumn , Issue , 2012, Pages 12-17

Security and privacy for in-vehicle networks

Author keywords

Binary Instrumentation; Data Flow Tracking; Distributed Tainting; In Vehicle Network Security; On Board Systems; Privacy

Indexed keywords

BINARY INSTRUMENTATIONS; DATA FLOW; DISTRIBUTED TAINTING; IN-VEHICLE NETWORKS; ON-BOARD SYSTEMS;

EID: 84867290358     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/VCSC.2012.6281235     Document Type: Conference Paper
Times cited : (37)

References (26)
  • 2
    • 85076889619 scopus 로고    scopus 로고
    • TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones
    • W. Enck, P. Gilbert, B.-G. Chun, L. P. Cox, L. Jung, P. McDaniel et al., "TaintDroid: An information-flow tracking system for realtime privacy monitoring on smartphones," in 9th OSDI, USENIX, 2010.
    • (2010) 9th OSDI, USENIX
    • Enck, W.1    Gilbert, P.2    Chun, B.-G.3    Cox, L.P.4    Jung, L.5    McDaniel, P.6
  • 7
    • 85040565418 scopus 로고    scopus 로고
    • Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
    • I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu et al., "Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study," in 19th USENIX Security, 2010.
    • (2010) 19th USENIX Security
    • Rouf, I.1    Miller, R.2    Mustafa, H.3    Taylor, T.4    Oh, S.5    Xu, W.6
  • 8
    • 31944440969 scopus 로고    scopus 로고
    • Pin: Building customized program analysis tools with dynamic instrumentation
    • C. Luk, R. Cohn, R. Muth, H. Patil, and A. Klauser, "Pin: building customized program analysis tools with dynamic instrumentation," ACM SIGPLAN, 2005.
    • (2005) ACM SIGPLAN
    • Luk, C.1    Cohn, R.2    Muth, R.3    Patil, H.4    Klauser, A.5
  • 9
    • 34548212308 scopus 로고    scopus 로고
    • Dytan: A generic dynamic taint analysis framework
    • J. Clause, W. Li, and A. Orso, "Dytan: a generic dynamic taint analysis framework," in ISSTA, 2007, pp. 196-206.
    • (2007) ISSTA , pp. 196-206
    • Clause, J.1    Li, W.2    Orso, A.3
  • 11
    • 79959881045 scopus 로고    scopus 로고
    • TaintEraser: Protecting sensitive data leaks using application-level taint tracking
    • D. Zhu, J. Jung, D. Song, and T. Kohno, "TaintEraser: protecting sensitive data leaks using application-level taint tracking," ACM SIGOPS Operating Systems Review, 2011.
    • (2011) ACM SIGOPS Operating Systems Review
    • Zhu, D.1    Jung, J.2    Song, D.3    Kohno, T.4
  • 12
    • 0006100649 scopus 로고    scopus 로고
    • Smashing the stack for fun and profit
    • Aleph One
    • E. Levy (Aleph One), "Smashing the stack for fun and profit," The Phrack Magazine, vol. 49, no. 14, 1996.
    • (1996) The Phrack Magazine , vol.49 , Issue.14
    • Levy, E.1
  • 15
    • 84867327217 scopus 로고    scopus 로고
    • Car2X communication: Securing the last meter - A cost-effective approach for ensuring trust in Car2X applications using in-vehicle symmetric cryptography
    • September
    • H. Schweppe, Y. Roudier, B. Weyl, L. Apvrille, and D. Scheuermann, "Car2X communication: securing the last meter - A cost-effective approach for ensuring trust in Car2X applications using in-vehicle symmetric cryptography" in WIVEC 2011, September 2011.
    • (2011) WIVEC 2011
    • Schweppe, H.1    Roudier, Y.2    Weyl, B.3    Apvrille, L.4    Scheuermann, D.5
  • 18
    • 84867307138 scopus 로고    scopus 로고
    • August
    • "The EVITA project," http://evita-project.org/, August 2008.
    • (2008)
  • 20
    • 78751484536 scopus 로고    scopus 로고
    • G-free: Defeating return-oriented programming through gadget-less binaries
    • K. Onarlioglu, L. Bilge, A. Lanzi, D. Balzarotti, and E. Kirda, "G-free: Defeating return-oriented programming through gadget-less binaries," in 26th ACSAC, 12 2010.
    • (2010) 26th ACSAC , pp. 12
    • Onarlioglu, K.1    Bilge, L.2    Lanzi, A.3    Balzarotti, D.4    Kirda, E.5
  • 21
    • 80455127247 scopus 로고    scopus 로고
    • Taint-exchange: A generic system for cross-process and cross-host taint tracking
    • A. Zavou, G. Portokalidis, and A. Keromytis, "Taint-exchange: a generic system for cross-process and cross-host taint tracking," 6th ACS, 2011.
    • (2011) 6th ACS
    • Zavou, A.1    Portokalidis, G.2    Keromytis, A.3
  • 22
    • 78751468715 scopus 로고    scopus 로고
    • Information Flow for Secure Distributed Applications
    • PhD Thesis
    • W. W.-Y. Cheng, "Information Flow for Secure Distributed Applications," PhD Thesis, MIT, 2009.
    • (2009) MIT
    • Cheng, W.W.-Y.1
  • 23
    • 84927745017 scopus 로고    scopus 로고
    • Towards Practical Avoidance of Information Leakage in Enterprise Networks
    • J. Croft and M. Caesar, "Towards Practical Avoidance of Information Leakage in Enterprise Networks," in 6th USENIX HotSec, 2011.
    • (2011) 6th USENIX HotSec
    • Croft, J.1    Caesar, M.2
  • 24
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. X. Song, "Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software," in NDSS, 2005.
    • (2005) NDSS
    • Newsome, J.1    Song, D.X.2
  • 25
    • 77950788046 scopus 로고    scopus 로고
    • Panorama: Capturing system-wide information flow for malware detection and analysis
    • H. Yin, D. Song, M. Egele, C. Kruegel, and E. Kirda, "Panorama: capturing system-wide information flow for malware detection and analysis," in 14th CCS, 2007, pp. 116-127.
    • (2007) 14th CCS , pp. 116-127
    • Yin, H.1    Song, D.2    Egele, M.3    Kruegel, C.4    Kirda, E.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.