-
3
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
presented at the
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, "Comprehensive experimental analyses of automotive attack surfaces," presented at the USENIX Conf. Security, 2011.
-
USENIX Conf. Security, 2011
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
4
-
-
84872695108
-
LiBrACAN: A lightweight broadcast authentication protocol for Controller Area Networks
-
B. Groza, S. Murvay, A. Van Herrewege, and I. Verbauwhede, "LiBrACAN: A lightweight broadcast authentication protocol for Controller Area Networks," in Proc. Int. Conf. Cryptology Netw. Security, 2012, pp. 185-200.
-
Proc. Int. Conf. Cryptology Netw. Security, 2012
, pp. 185-200
-
-
Groza, B.1
Murvay, S.2
Van Herrewege, A.3
Verbauwhede, I.4
-
5
-
-
78649321196
-
Security threats to automotive CAN networks - Practical examples and selected short-term counter-measures
-
T. Hoppe, S. Kiltz, and J. Dittmann, "Security threats to automotive CAN networks - practical examples and selected short-term counter-measures," in Proc. Int. Conf. Computer Safety, Rel., Security, 2008, pp. 11-25.
-
Proc. Int. Conf. Computer Safety, Rel., Security, 2008
, pp. 11-25
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
6
-
-
79960771504
-
Security aspects of the in-vehicle network in the connected car
-
P. Kleberger, T. Olovsson, and E. Jonsson, "Security aspects of the in-vehicle network in the connected car," in Proc. IEEE Intell. Veh. Symp., 2011, pp. 528-533.
-
Proc. IEEE Intell. Veh. Symp., 2011
, pp. 528-533
-
-
Kleberger, P.1
Olovsson, T.2
Jonsson, E.3
-
7
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, "Experimental security analysis of a modern automobile," in Proc. IEEE Symp. Security Privacy, 2010, pp. 447-462.
-
Proc. IEEE Symp. Security Privacy, 2010
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
8
-
-
84863550114
-
EDA for secure and dependable cybercars: Challenges and opportunities
-
F. Koushanfar, A. Sadeghi, and H. Seudie, "EDA for secure and dependable cybercars: Challenges and opportunities," in Proc. ACM/IEEE Design Autom. Conf., 2012, pp. 220-228.
-
Proc. ACM/IEEE Design Autom. Conf., 2012
, pp. 220-228
-
-
Koushanfar, F.1
Sadeghi, A.2
Seudie, H.3
-
10
-
-
84893388821
-
Security-aware mapping for CAN-based real-time distributed automotive systems
-
C.-W. Lin, Q. Zhu, C. Phung, and A. Sangiovanni-Vincentelli, "Security-aware mapping for CAN-based real-time distributed automotive systems," in Proc. IEEE/ACM Int. Conf. Computer-Aided Design, 2013, pp. 115-121.
-
Proc. IEEE/ACM Int. Conf. Computer-Aided Design, 2013
, pp. 115-121
-
-
Lin, C.-W.1
Zhu, Q.2
Phung, C.3
Sangiovanni-Vincentelli, A.4
-
11
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
presented at the
-
I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar, "Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study," presented at the USENIX Conf. Security, 2010.
-
USENIX Conf. Security, 2010
-
-
Rouf, I.1
Miller, R.2
Mustafa, H.3
Taylor, T.4
Oh, S.5
Xu, W.6
Gruteser, M.7
Trappe, W.8
Seskar, I.9
|