메뉴 건너뛰기




Volumn , Issue , 2014, Pages 13-18

VeCure: A practical security framework to protect the CAN bus of vehicles

Author keywords

[No Author keywords available]

Indexed keywords

AUTHENTICATION; BLUETOOTH; CONTROL SYSTEM SYNTHESIS; VEHICLES;

EID: 84946686886     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IOT.2014.7030108     Document Type: Conference Paper
Times cited : (132)

References (16)
  • 5
    • 58149105785 scopus 로고    scopus 로고
    • A first simulation of attacks in the automotive network communications protocol flexray
    • E. Corchado, R. Zunino, P. Gastaldo, and l. Herrero, Eds., Springer
    • D. K. Nilsson, U. Larson, F. Picasso, and E. Jonsson, "A first simulation of attacks in the automotive network communications protocol flexray." in CISIS, ser. Advances in Soft Computing, E. Corchado, R. Zunino, P. Gastaldo, and l. Herrero, Eds., vol. 53. Springer, 2008, pp. 84-91. [Online]. Available: http: //dblp.uni-trier.de/db/conf/cisis-spain/cisis2008.html#NilssonLPJ08
    • (2008) CISIS, Ser. Advances in Soft Computing , vol.53 , pp. 84-91
    • Nilsson, D.K.1    Larson, U.2    Picasso, F.3    Jonsson, E.4
  • 6
    • 84924230245 scopus 로고    scopus 로고
    • How to hack your mini cooper: Reverse engineering controller area network (can) messages on passenger automobiles
    • J. Staggs, "How to hack your mini cooper: reverse engineering controller area network (can) messages on passenger automobiles," in DEFCON, 2013. [Online]. Available: https://www.defcon.org/images/defcon-21/dc-21-presentations/Staggs/DEFCON-21-Staggs-How-to-Hack-Your-Mini-Cooper-WP.pdf
    • (2013) DEFCON
    • Staggs, J.1
  • 7
    • 84901675643 scopus 로고    scopus 로고
    • Demo: Adventures in automotive networks and control units
    • C. Miller and C. Valasek, "Demo: Adventures in automotive networks and control units," in DEFCON, 2013.
    • (2013) DEFCON
    • Miller, C.1    Valasek, C.2
  • 8
    • 70449878108 scopus 로고    scopus 로고
    • Flexible multicast authentication for time-triggered embedded control network applications
    • IEEE
    • C. Szilagyi and P. Koopman, "Flexible multicast authentication for time-triggered embedded control network applications." in DSN. IEEE, 2009, pp. 165-174. [Online]. Available: http://dblp.uni-trier.de/db/conf/dsn/dsn2009.html#SzilagyiK09
    • (2009) DSN , pp. 165-174
    • Szilagyi, C.1    Koopman, P.2
  • 10
    • 84882243859 scopus 로고    scopus 로고
    • Broadcast authentication in a low speed controller area network
    • M. Obaidat, J. Sevillano, and J. Filipe, Eds. Springer Berlin Heidelberg
    • -, "Broadcast authentication in a low speed controller area network," in E-Business and Telecommunications, ser. Communications in Computer and Information Science, M. Obaidat, J. Sevillano, and J. Filipe, Eds. Springer Berlin Heidelberg, 2012, vol. 314, pp. 330-344. [Online]. Available: http://dx.doi.org/10.1007/978-3-642-35755-8 23
    • (2012) E-Business and Telecommunications, Ser. Communications in Computer and Information Science , vol.314 , pp. 330-344
    • Groza, B.1    Murvay, P.-S.2
  • 11
    • 78650090602 scopus 로고    scopus 로고
    • Low cost multicast authentication via validity voting in time-triggered embedded control networks
    • New York, NY, USA: ACM
    • C. Szilagyi and P. Koopman, "Low cost multicast authentication via validity voting in time-triggered embedded control networks," in Proceedings of the 5th Workshop on Embedded Systems Security, ser. WESS '10. New York, NY, USA: ACM, 2010, pp. 10:1-10:10. [Online]. Available: http://doi.acm.org/10.1145/1873548.1873558
    • (2010) Proceedings of the 5th Workshop on Embedded Systems Security, Ser. WESS '10 , pp. 101-1010
    • Szilagyi, C.1    Koopman, P.2
  • 16
    • 83755181665 scopus 로고    scopus 로고
    • Car2x communication: Securing the last meter - A cost-effective approach for ensuring trust in car2x applications using in-vehicle symmetric cryptography
    • IEEE
    • H. Schweppe, Y. Roudier, B. Weyl, L. Apvrille, and D. Scheuermann, "Car2x communication: Securing the last meter - a cost-effective approach for ensuring trust in car2x applications using in-vehicle symmetric cryptography." in VTC Fall. IEEE, 2011, pp. 1-5.
    • (2011) VTC Fall , pp. 1-5
    • Schweppe, H.1    Roudier, Y.2    Weyl, B.3    Apvrille, L.4    Scheuermann, D.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.