-
1
-
-
84889026332
-
War texting: Identifying and interacting with devices on the telephone network
-
D. Bailey War texting: identifying and interacting with devices on the telephone network Black Hat (USA 2010) 2010
-
(2010)
Black Hat (USA 2010)
-
-
Bailey, D.1
-
5
-
-
38549133187
-
Security analysis of a cryptographically-enabled rfid device
-
S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo Security analysis of a cryptographically-enabled rfid device USENIX Security 2007
-
(2007)
USENIX Security
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
6
-
-
84888994539
-
-
CAN Bosch specification of can-bus 1991 http://www.semiconductors.bosch. de/media/pdf/canliteratur/can2spec.pdf
-
(1991)
Bosch Specification of Can-bus
-
-
-
8
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
p. 6-6.
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage Comprehensive experimental analyses of automotive attack surfaces Proceedings of the 20th USENIX conference on security. USENIX Association 2011 p. 6-6.
-
(2011)
Proceedings of the 20th USENIX Conference on Security. USENIX Association
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
-
9
-
-
84889075231
-
-
C. Cremers Scyther 2012 people.inf.ethz.ch/cremersc/scyther/index.html
-
(2012)
Scyther
-
-
Cremers, C.1
-
11
-
-
77955760404
-
-
T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, S. Mu, and M. Shalmani Physical cryptanalysis of keeloq code hopping applications 2008 http://eprint.iacr.org/2008/058
-
(2008)
Physical Cryptanalysis of Keeloq Code Hopping Applications
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Mu, S.5
Shalmani, M.6
-
13
-
-
77649181757
-
How to securely break into rbac: The btg-rbac model
-
A. Ferreira, D. Chadwick, P. Farinha, R. Correia, G. Zao, and R. Chilro How to securely break into rbac: the btg-rbac model Computer security applications conference, 2009. ACSAC'09. Annual, IEEE 2009 23 31
-
(2009)
Computer Security Applications Conference, 2009. ACSAC'09. Annual, IEEE
, pp. 23-31
-
-
Ferreira, A.1
Chadwick, D.2
Farinha, P.3
Correia, R.4
Zao, G.5
Chilro, R.6
-
18
-
-
84889030086
-
Secure automotive on-board networks-basis for secure vehicle-to-x communication
-
(From Holland to Hesse without traffic jam)
-
O. Henniger Secure automotive on-board networks-basis for secure vehicle-to-x communication Workshop Staufrei von Holland nach Hessen 2010 (From Holland to Hesse without traffic jam)
-
(2010)
Workshop Staufrei von Holland Nach Hessen
-
-
Henniger, O.1
-
19
-
-
56449111413
-
Sniffing/replay attacks on can buses: A simulated attack on the electric window lift classified using an adapted cert taxonomy
-
T. Hoppe, and J. Dittman Sniffing/replay attacks on can buses: a simulated attack on the electric window lift classified using an adapted cert taxonomy Workshop on embedded systems security 2007 66 72
-
(2007)
Workshop on Embedded Systems Security
, pp. 66-72
-
-
Hoppe, T.1
Dittman, J.2
-
20
-
-
56449088090
-
Security threats to automotive can networks - Practical examples and selected short-term countermeasures
-
T. Hoppe, S. Kiltz, and J. Dittman Security threats to automotive can networks - practical examples and selected short-term countermeasures Proceedings of computer safety, reliability, and security (SAFECOMP) 2008 235 248
-
(2008)
Proceedings of Computer Safety, Reliability, and Security (SAFECOMP)
, pp. 235-248
-
-
Hoppe, T.1
Kiltz, S.2
Dittman, J.3
-
22
-
-
77956249542
-
Applying intrusion detection to automotive it - Early insights and remaining challenges
-
T. Hoppe, S. Kiltz, and J. Dittmann Applying intrusion detection to automotive it - early insights and remaining challenges J Inf Assur Secur 4 2009 226 235
-
(2009)
J Inf Assur Secur
, vol.4
, pp. 226-235
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
23
-
-
44449126213
-
A practical attack on KeeLoq
-
DOI 10.1007/978-3-540-78967-3-1, Advances in Cryptology - EUROCRYPT 2008 - 27th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Proceedings
-
S. Indesteege, N. Keller, O. Dunkelman, E. Biham, and B. Preneel A practical attack on keeloq EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 2008 1 18 (Pubitemid 351762820)
-
(2008)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.LNCS 4965
, pp. 1-18
-
-
Indesteege, S.1
Keller, N.2
Dunkelman, O.3
Biham, E.4
Preneel, B.5
-
24
-
-
84889007482
-
Modint: A compact modular arithmetic java class library for cellular phones, and its application to secure electronic voting
-
IFIP International Federation for Information Processing Springer Boston
-
H. Kikuchi, and J. Nakazato Modint: a compact modular arithmetic java class library for cellular phones, and its application to secure electronic voting Security and protection in information processing systems IFIP International Federation for Information Processing Vol. 147 2004 Springer Boston 177 192
-
(2004)
Security and Protection in Information Processing Systems
, vol.147 VOL.
, pp. 177-192
-
-
Kikuchi, H.1
Nakazato, J.2
-
26
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, and S. Checkoway Experimental security analysis of a modern automobile IEEE Symposium on security and privacy, Oakland, CA 2010 447 462
-
(2010)
IEEE Symposium on Security and Privacy, Oakland, CA
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
-
30
-
-
1542275320
-
A secure electronic voting protocol for general elections
-
H.-T. Liaw A secure electronic voting protocol for general elections J Comput Secur 23 2 2004 107 119
-
(2004)
J Comput Secur
, vol.23
, Issue.2
, pp. 107-119
-
-
Liaw, H.-T.1
-
32
-
-
84881760192
-
-
McAfee, Tech. rep. McAfee
-
McAfee Caution: Malware ahead Tech. rep. 2011 McAfee
-
(2011)
Caution: Malware Ahead
-
-
-
33
-
-
78049397804
-
Risk-adaptable access control (radac)
-
NIST-National Institute of Standards and Technology-Information Technology Laboratory
-
R.W. McGraw Risk-adaptable access control (radac) Privilege (Access) management Workshop 2009 NIST-National Institute of Standards and Technology-Information Technology Laboratory
-
(2009)
Privilege (Access) Management Workshop
-
-
McGraw, R.W.1
-
37
-
-
84888991757
-
Car immobilizer security
-
K. Nohl Car immobilizer security ESCAR 2010 2010
-
(2010)
ESCAR 2010
-
-
Nohl, K.1
-
38
-
-
67249166234
-
New attestation based security architecture for in-vehicle communication
-
H. Oguma, A. Yoshioka, M. Nishikawa, R. Shigetomi, A. Otsuka, and H. Imai New attestation based security architecture for in-vehicle communication IEEE GLOBECOM 2008 1909 1914
-
(2008)
IEEE GLOBECOM
, pp. 1909-1914
-
-
Oguma, H.1
Yoshioka, A.2
Nishikawa, M.3
Shigetomi, R.4
Otsuka, A.5
Imai, H.6
-
43
-
-
0002904487
-
-
Elsevier Inc
-
W.B. Ribbens, N.P. Mansour, G. Luecke, C.W. Battle, E.C. Jones, and L.E. Mansir Understanding automotive electronics 2003 Elsevier Inc
-
(2003)
Understanding Automotive Electronics
-
-
Ribbens, W.B.1
Mansour, N.P.2
Luecke, G.3
Battle, C.W.4
Jones, E.C.5
Mansir, L.E.6
-
44
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
I. Rouf, R. Miller, R. Mustafa, T. Taylor, S. Oh, and W. Xu Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study Proceedings of the 19th USENIX security symposium, Washington, DC 2010 21
-
(2010)
Proceedings of the 19th USENIX Security Symposium, Washington, DC
, pp. 21
-
-
Rouf, I.1
Miller, R.2
Mustafa, R.3
Taylor, T.4
Oh, S.5
Xu, W.6
-
46
-
-
70449878108
-
Flexible multicast authentication for time-triggered embedded control network applications in dependable systems networks
-
C. Szilagyi, and P. Koopman Flexible multicast authentication for time-triggered embedded control network applications in dependable systems networks IEEE/IFIP Int Conf on dependable systems networks 2009 165 174
-
(2009)
IEEE/IFIP Int Conf on Dependable Systems Networks
, pp. 165-174
-
-
Szilagyi, C.1
Koopman, P.2
-
49
-
-
84889818635
-
Secure in-vehicle communication
-
K. Lemke, C. Paar, M. Wolf, Springer-Verlag
-
A. Weimerskirch, C. Paar, and M. Wolf Secure in-vehicle communication K. Lemke, C. Paar, M. Wolf, Embedded security in cars 2006 Springer-Verlag
-
(2006)
Embedded Security in Cars
-
-
Weimerskirch, A.1
Paar, C.2
Wolf, M.3
-
50
-
-
84889063511
-
State of the art: Embedding security in vehicles
-
[Special Issue on Embedded Systems for Intelligent Vehicles]
-
Weimerskirch A, Wolf M, Wollinger T. State of the art: embedding security in vehicles. EURASIP J Embed Syst, [Special Issue on Embedded Systems for Intelligent Vehicles].
-
EURASIP J Embed Syst
-
-
Weimerskirch, A.1
Wolf, M.2
Wollinger, T.3
-
52
-
-
84864682117
-
Design, implementation, and evaluation of a vehicular hardware security module
-
M. Wolf, and T. Gendrullis Design, implementation, and evaluation of a vehicular hardware security module Proceeding of the ICISC 2011 302 318
-
(2011)
Proceeding of the ICISC
, pp. 302-318
-
-
Wolf, M.1
Gendrullis, T.2
|