-
1
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
May
-
Karl Koscher, Alexei Czeskis, and Franziska Roesner, Experimental Security Analysis of a Modern Automobile, IEEE Symposium on Security and Privacy, pp.447-462, May. 2010.
-
(2010)
IEEE Symposium on Security and Privacy
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
-
2
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
Aug
-
Stephen Checkoway, Damon McCoy, and et al., Comprehensive Experimental Analyses of Automotive Attack Surfaces, Proceedings of USENIX Security, Portland, USA, pp.77-92, Aug. 2011.
-
(2011)
Proceedings of USENIX Security, Portland, USA
, pp. 77-92
-
-
Checkoway, S.1
McCoy, D.2
-
3
-
-
84946215307
-
-
https://www.defcon.org/html/defcon-21/dc-21-news.html
-
-
-
-
5
-
-
37149003756
-
Exemplary automotive attack scenarios: Trojan horses for electronic throttle control system (ETC) and replay attacks on the power window system
-
Wolfsburg, Germany Nov
-
T. Hoppe, S. Kiltz, A. Lang and J. Dittman, Exemplary Automotive Attack Scenarios: Trojan horses for Electronic Throttle Control System (ETC) and replay attacks on the power window system, the Proceedings of the 23. VDI/VW Gemeinschaftstagung Automotive Security, Wolfsburg, Germany, pp.165-184, Nov. 2007.
-
(2007)
The Proceedings of the 23. VDI/VW Gemeinschaftstagung Automotive Security
, pp. 165-184
-
-
Hoppe, T.1
Kiltz, S.2
Lang, A.3
Dittman, J.4
-
6
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
Aug
-
I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar, Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study, the proceedings of USENIX Security 2010, pp. 323338, Aug. 2010.
-
(2010)
The Proceedings of USENIX Security 2010
, pp. 323-338
-
-
Rouf, I.1
Miller, R.2
Mustafa, H.3
Taylor, T.4
Oh, S.5
Xu, W.6
Gruteser, M.7
Trappe, W.8
Seskar, I.9
-
7
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
Aug
-
S. Bono, M. Green, A. Stubblefield, A. Juels, A. Rubin, and M. Szydlo, Security analysis of a cryptographically-enabled RFID device, the proceedings of the 14th USENIX Security Symposium, pp. 116. Aug. 2005
-
(2005)
The Proceedings of the 14th USENIX Security Symposium
, pp. 116
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.5
Szydlo, M.6
-
8
-
-
51849131973
-
On the power of power analysis in the real world: A complete break of the KEELOQ code hopping scheme
-
Thomas Eisenbarth, Timo Kasper, Amir Moradi, Christof Paar, Mahmoud Salmasizadeh, and Mohammad T. Manzuri Shalmani, On the power of power analysis in the real world: a complete break of the KEELOQ code hopping scheme, Advances in Cryptology CRYPTO 2008, Lecture Notes in Computer Science Vol. 5157, pp 203-220, 2008
-
(2008)
Advances in Cryptology CRYPTO 2008, Lecture Notes in Computer Science Vol. 5157
, pp. 203-220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Shalmani, M.T.M.6
-
9
-
-
79959948198
-
Classes of attacks in VANET
-
Apr
-
I. A. Sumra, I. A. Ahmad, H. Hasbullah and J.-L. bin Ab Manan, "Classes of attacks in VANET," Proceedings of the Saudi International Electronics, Communications and Photonics Conference (SIECPC 2011), Saudi Arabia, Riyadh, pp. 1-5, Apr. 2011.
-
(2011)
Proceedings of the Saudi International Electronics, Communications and Photonics Conference (SIECPC 2011), Saudi Arabia, Riyadh
, pp. 1-5
-
-
Sumra, I.A.1
Ahmad, I.A.2
Hasbullah, H.3
Manan, J.-L.4
-
10
-
-
38149089543
-
Future perspectives: The car and its IP-address-A potential safety and security risk assessment
-
Aug
-
A. Lang, J Dittmann, S. Kiltz, and T. Hoppe, Future Perspectives: The Car and Its IP-Address-A Potential Safety and Security Risk Assessment, Proceedings of SAFECOM 2007, LNCS4680, pp.40-53, Aug. 2007.
-
(2007)
Proceedings of SAFECOM 2007, LNCS4680
, pp. 40-53
-
-
Lang, A.1
Dittmann, J.2
Kiltz, S.3
Hoppe, T.4
-
11
-
-
84946232330
-
Adaptive dynamic reaction to automotive it security incidents using multimedia car environment
-
Jun
-
T. Hoppe, S. Kiltz, and J. Dittmann, Adaptive Dynamic Reaction to Automotive IT Security Incidents using Multimedia Car Environment, Proceedings of the Fourth Conference on Information and Assurance and Security, Miyazaki. Japan, pp.295-298, Jun. 2010.
-
(2010)
Proceedings of the Fourth Conference on Information and Assurance and Security, Miyazaki. Japan
, pp. 295-298
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
12
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
Aug
-
I. Rouf, T. Taylor, and et. al., Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study, Proceedings of 19th USENIX Symposium, San Jose, USA, pp.323-338, Aug. 2010.
-
(2010)
Proceedings of 19th USENIX Symposium, San Jose, USA
, pp. 323-338
-
-
Rouf, I.1
Taylor, T.2
-
13
-
-
85084160847
-
OCTANE: Open car testbed and network experiments bringing cyber-physical security research to researchers and students
-
Washington D.C., USA, Aug
-
C. E. Everett and D. McCoy, OCTANE: Open Car Testbed and Network Experiments Bringing Cyber-Physical Security Research to Researchers and Students Proceedings of 6th Workshop on Cyber Security Experimentation and Test, pp.1-8, Washington D.C., USA, Aug. 2013.
-
(2013)
Proceedings of 6th Workshop on Cyber Security Experimentation and Test
, pp. 1-8
-
-
Everett, C.E.1
McCoy, D.2
-
14
-
-
84864682117
-
Implementation, and evaluation of a vehicular hardware security module
-
Wolf, M. and Gendrullis, T, Design, implementation, and evaluation of a vehicular hardware security module, Information Security and Cryptology-ICISC 2011, LNCS 7259, pp. 302-318, 2012.
-
(2012)
Information Security and Cryptology-ICISC 2011, LNCS 7259
, pp. 302-318
-
-
Wolf, M.1
Design, G.T.2
-
15
-
-
84865013177
-
A method of preventing unauthorized data transmission in controller area network
-
(VTC Spring) IEEE, Yokohama, Japan, May
-
Matsumoto, T., Hata, M., Tanabe, M., Yoshioka, K., and Oishi, K., A method of preventing unauthorized data transmission in controller area network, Proceedings of Vehicular Technology Conference (VTC Spring), pp. 15. IEEE, Yokohama, Japan, May 2012
-
(2012)
Proceedings of Vehicular Technology Conference
, pp. 15
-
-
Matsumoto, T.1
Hata, M.2
Tanabe, M.3
Yoshioka, K.4
Oishi, K.5
|