-
1
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
May
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. Experimental Security Analysis of a Modern Automobile. In IEEE Symp. on Security and Privacy (SP), pages 447-462, May 2010.
-
(2010)
IEEE Symp. on Security and Privacy (SP)
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
2
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner, Tadayoshi Kohno, et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces. In USENIX Security Symposium, 2011.
-
(2011)
USENIX Security Symposium
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
3
-
-
77950451220
-
Security requirements for automotive on-board networks
-
Olaf Henniger, Ludovic Apvrille, Andreas Fuchs, Yves Roudier, Alastair Ruddle, and Benjamin Weyl. Security requirements for automotive on-board networks. In Proc. Int. Conf. on Intelligent Transport System Telecommunications (ITST), 2009.
-
(2009)
Proc. Int. Conf. on Intelligent Transport System Telecommunications (ITST)
-
-
Henniger, O.1
Apvrille, L.2
Fuchs, A.3
Roudier, Y.4
Ruddle, A.5
Weyl, B.6
-
5
-
-
84885965762
-
Survey on security threats and protection mechanisms in embedded automotive networks
-
Ivan Studnia, Vincent Nicomette, Eric Alata, Yves Deswarte, Mohamed Kaaniche, and Youssef Laarouchi. Survey on security threats and protection mechanisms in embedded automotive networks. In Proc. Conf. on Dependable Systems and Networks Workshop (DSN-W), 2013.
-
(2013)
Proc. Conf. on Dependable Systems and Networks Workshop (DSN-W)
-
-
Studnia, I.1
Nicomette, V.2
Alata, E.3
Deswarte, Y.4
Kaaniche, M.5
Laarouchi, Y.6
-
6
-
-
84862149386
-
Securing car2X applications with effective hardware software codesign for vehicular on-board networks
-
Hendrik Schweppe, Benjamin Weyl, Yves Roudier, Muhammad Sabir Idrees, Timo Gendrullis, Marko Wolf, Gabriel Serme, Santana Anderson De Oliveira, Herve Grall, Mario Sudholt, et al. Securing car2X applications with effective hardware software codesign for vehicular on-board networks. VDI Automotive Security, 27, 2011.
-
(2011)
VDI Automotive Security
, vol.27
-
-
Schweppe, H.1
Weyl, B.2
Roudier, Y.3
Sabir Idrees, M.4
Gendrullis, T.5
Wolf, M.6
Serme, G.7
De Oliveira, S.A.8
Grall, H.9
Sudholt, M.10
-
7
-
-
83755181752
-
A formal methodology applied to secure over-The-air automotive applications
-
IEEE
-
Gabriel Pedroza, Muhammad Sabir Idrees, Ludovic Apvrille, and Yves Roudier. A Formal Methodology Applied to Secure Over-The-Air Automotive Applications. In Proc. Vehicular Technology Conference (VTC Fall), pages 1-5. IEEE, 2011.
-
(2011)
Proc. Vehicular Technology Conference (VTC Fall)
, pp. 1-5
-
-
Pedroza, G.1
Idrees, M.S.2
Apvrille, L.3
Roudier, Y.4
-
8
-
-
70449553428
-
Secure and authentic communication on existing in-vehicle networks
-
Andre Groll and Christoph Ruland. Secure and authentic communication on existing in-vehicle networks. In IEEE Intelligent Vehicles Symp., 2009.
-
(2009)
IEEE Intelligent Vehicles Symp
-
-
Groll, A.1
Ruland, C.2
-
9
-
-
34547513175
-
Sevecom-secure vehicle communication
-
Tim Leinmüller, Levente Buttyan, Jean-Pierre Hubaux, Frank Kargl, Rainer Kroh, Panos Papadimitratos, Maxim Raya, and Elmar Schoch. Sevecom-secure vehicle communication. In Proc. of IST Mobile Summit, volume 2006, 2006.
-
(2006)
Proc. of IST Mobile Summit, Volume 2006
-
-
Leinmüller, T.1
Buttyan, L.2
Hubaux, J.-P.3
Kargl, F.4
Kroh, R.5
Papadimitratos, P.6
Raya, M.7
Schoch, E.8
-
10
-
-
84864682117
-
Design, implementation, and evaluation of a vehicular hardware security module
-
Springer
-
Marko Wolf and Timo Gendrullis. Design, implementation, and evaluation of a vehicular hardware security module. In Proc. Information Security and Cryptology (ICISC), pages 302-318. Springer, 2012.
-
(2012)
Proc. Information Security and Cryptology (ICISC)
, pp. 302-318
-
-
Wolf, M.1
Gendrullis, T.2
-
12
-
-
84923181749
-
Extensible flexray communication controller for FPGA-based automotive systems
-
S. Shreejith and S.A. Fahmy. Extensible FlexRay Communication Controller for FPGA-Based Automotive Systems. IEEE Transactions on Vehicular Technology, 64(2):453-465, 2015.
-
(2015)
IEEE Transactions on Vehicular Technology
, vol.64
, Issue.2
, pp. 453-465
-
-
Shreejith, S.1
Fahmy, S.A.2
-
13
-
-
63149190310
-
PRESENT: An ultra-lightweight block cIPher
-
A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe. PRESENT: An ultra-lightweight block cIPher. In Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES), 2007.
-
(2007)
Proc. Workshop on Cryptographic Hardware and Embedded Systems (CHES)
-
-
Bogdanov, A.1
Knudsen, L.R.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.J.B.6
Seurin, Y.7
Vikkelsoe, C.8
|