-
1
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
Berkeley, CA, USA: USENIX Association
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, "Comprehensive experimental analyses of automotive attack surfaces," in Proceedings of the 20th USENIX Conference on Security, ser. SEC'11. Berkeley, CA, USA: USENIX Association, 2011, pp. 6-6. [Online]. Available: http://dl.acm.org/citation.cfm?id=2028067.2028073
-
(2011)
Proceedings of the 20th USENIX Conference on Security, Ser. SEC'11
, pp. 6-6
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
2
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
Washington, DC, USA: IEEE Computer Society
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage, "Experimental security analysis of a modern automobile," in Proceedings of the 2010 IEEE Symposium on Security and Privacy, ser. SP '10. Washington, DC, USA: IEEE Computer Society, 2010, pp. 447-462. [Online]. Available: http://dx.doi.org/10.1109/SP.2010.34
-
(2010)
Proceedings of the 2010 IEEE Symposium on Security and Privacy, Ser. SP '10
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
3
-
-
56449088090
-
Security threats to automotive can networks - Practical examples and selected short-term countermeasures
-
Berlin, Heidelberg: Springer-Verlag
-
T. Hoppe, S. Kiltz, and J. Dittmann, "Security threats to automotive can networks - practical examples and selected short-term countermeasures," in Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security, ser. SAFECOMP '08. Berlin, Heidelberg: Springer-Verlag, 2008, pp. 235-248. [Online]. Available: http://dx.doi.org/10.1007/978-3-540-87698-4 21
-
(2008)
Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security, Ser. SAFECOMP '08
, pp. 235-248
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
4
-
-
70449821045
-
Security in automotive bus systems
-
M. Wolf, A. Weimerskirch, C. Paar, and M. Bluetooth, "Security in automotive bus systems," in Proceedings of the Workshop on Embedded Security in Cars (ESCAR), 2004.
-
(2004)
Proceedings of the Workshop on Embedded Security in Cars (ESCAR)
-
-
Wolf, M.1
Weimerskirch, A.2
Paar, C.3
Bluetooth, M.4
-
5
-
-
58149105785
-
A first simulation of attacks in the automotive network communications protocol flexray
-
E. Corchado, R. Zunino, P. Gastaldo, and l. Herrero, Eds., Springer
-
D. K. Nilsson, U. Larson, F. Picasso, and E. Jonsson, "A first simulation of attacks in the automotive network communications protocol flexray." in CISIS, ser. Advances in Soft Computing, E. Corchado, R. Zunino, P. Gastaldo, and l. Herrero, Eds., vol. 53. Springer, 2008, pp. 84-91. [Online]. Available: http: //dblp.uni-trier.de/db/conf/cisis-spain/cisis2008.html#NilssonLPJ08
-
(2008)
CISIS, Ser. Advances in Soft Computing
, vol.53
, pp. 84-91
-
-
Nilsson, D.K.1
Larson, U.2
Picasso, F.3
Jonsson, E.4
-
6
-
-
84924230245
-
How to hack your mini cooper: Reverse engineering controller area network (can) messages on passenger automobiles
-
J. Staggs, "How to hack your mini cooper: reverse engineering controller area network (can) messages on passenger automobiles," in DEFCON, 2013. [Online]. Available: https://www.defcon.org/images/defcon-21/dc-21-presentations/Staggs/DEFCON-21-Staggs-How-to-Hack-Your-Mini-Cooper-WP.pdf
-
(2013)
DEFCON
-
-
Staggs, J.1
-
7
-
-
84901675643
-
Demo: Adventures in automotive networks and control units
-
C. Miller and C. Valasek, "Demo: Adventures in automotive networks and control units," in DEFCON, 2013.
-
(2013)
DEFCON
-
-
Miller, C.1
Valasek, C.2
-
8
-
-
70449878108
-
Flexible multicast authentication for time-triggered embedded control network applications
-
IEEE
-
C. Szilagyi and P. Koopman, "Flexible multicast authentication for time-triggered embedded control network applications." in DSN. IEEE, 2009, pp. 165-174. [Online]. Available: http://dblp.uni-trier.de/db/conf/dsn/dsn2009.html#SzilagyiK09
-
(2009)
DSN
, pp. 165-174
-
-
Szilagyi, C.1
Koopman, P.2
-
10
-
-
84882243859
-
Broadcast authentication in a low speed controller area network
-
M. Obaidat, J. Sevillano, and J. Filipe, Eds. Springer Berlin Heidelberg
-
-, "Broadcast authentication in a low speed controller area network," in E-Business and Telecommunications, ser. Communications in Computer and Information Science, M. Obaidat, J. Sevillano, and J. Filipe, Eds. Springer Berlin Heidelberg, 2012, vol. 314, pp. 330-344. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-35755-8 23
-
(2012)
E-Business and Telecommunications, Ser. Communications in Computer and Information Science
, vol.314
, pp. 330-344
-
-
Groza, B.1
Murvay, P.-S.2
-
11
-
-
78650090602
-
Low cost multicast authentication via validity voting in time-triggered embedded control networks
-
New York, NY, USA: ACM
-
C. Szilagyi and P. Koopman, "Low cost multicast authentication via validity voting in time-triggered embedded control networks," in Proceedings of the 5th Workshop on Embedded Systems Security, ser. WESS '10. New York, NY, USA: ACM, 2010, pp. 10:1-10:10. [Online]. Available: http://doi.acm.org/10.1145/1873548.1873558
-
(2010)
Proceedings of the 5th Workshop on Embedded Systems Security, Ser. WESS '10
, pp. 101-1010
-
-
Szilagyi, C.1
Koopman, P.2
-
12
-
-
84881046901
-
Cyber-security for the controller area network (can) communication protocol
-
Washington, DC, USA: IEEE Computer Society
-
C.-W. Lin and A. Sangiovanni-Vincentelli, "Cyber-security for the controller area network (can) communication protocol," in Proceedings of the 2012 International Conference on Cyber Security, ser. CYBERSECURITY '12. Washington, DC, USA: IEEE Computer Society, 2012, pp. 1-7. [Online]. Available: http://dx.doi.org/10.1109/CyberSecurity.2012.7
-
(2012)
Proceedings of the 2012 International Conference on Cyber Security, Ser. CYBERSECURITY '12
, pp. 1-7
-
-
Lin, C.-W.1
Sangiovanni-Vincentelli, A.2
-
13
-
-
80455140326
-
Secure broadcast with one-time signatures in controller area networks
-
IEEE Computer Society
-
B. Groza and P.-S. Murvay, "Secure broadcast with one-time signatures in controller area networks," in Proceedings of The Sixth International Conference on Availability, Reliability, and Security, ARES 2011. IEEE Computer Society, 2011.
-
(2011)
Proceedings of the Sixth International Conference on Availability, Reliability, and Security, ARES 2011
-
-
Groza, B.1
Murvay, P.-S.2
-
14
-
-
84872695108
-
Libracan: A lightweight broadcast authentication protocol for controller area networks
-
B. Groza, P.-S. Murvay, A. van Herrewege, and I. Verbauwhede, "Libracan: a lightweight broadcast authentication protocol for controller area networks," in Proceedings of The 11th International Conference on Cryptology and Network Security, CANS 2012, 2012.
-
(2012)
Proceedings of the 11th International Conference on Cryptology and Network Security, CANS 2012
-
-
Groza, B.1
Murvay, P.-S.2
Van Herrewege, A.3
Verbauwhede, I.4
-
15
-
-
84924257555
-
Libra-can: A lightweight broadcast authentication protocol for controller area networks
-
Springer Berlin Heidelberg
-
I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar, "Libra-can: A lightweight broadcast authentication protocol for controller area networks," in Proceedings of 11th International Conference of Cryptology and Network Security, ser. CANS 2012. Springer Berlin Heidelberg, 2012, pp. 185-200.
-
(2012)
Proceedings of 11th International Conference of Cryptology and Network Security, Ser. CANS 2012
, pp. 185-200
-
-
Rouf, I.1
Miller, R.2
Mustafa, H.3
Taylor, T.4
Oh, S.5
Xu, W.6
Gruteser, M.7
Trappe, W.8
Seskar, I.9
-
16
-
-
83755181665
-
Car2x communication: Securing the last meter - A cost-effective approach for ensuring trust in car2x applications using in-vehicle symmetric cryptography
-
IEEE
-
H. Schweppe, Y. Roudier, B. Weyl, L. Apvrille, and D. Scheuermann, "Car2x communication: Securing the last meter - a cost-effective approach for ensuring trust in car2x applications using in-vehicle symmetric cryptography." in VTC Fall. IEEE, 2011, pp. 1-5.
-
(2011)
VTC Fall
, pp. 1-5
-
-
Schweppe, H.1
Roudier, Y.2
Weyl, B.3
Apvrille, L.4
Scheuermann, D.5
|