-
2
-
-
84873966209
-
The case for ethernet in automotive communications
-
(2011)
-
L. L. Bello. 2011. The case for ethernet in automotive communications. ACM SIGBED Rev. 8, 4 (2011), 7-15. DOI:http://dx.doi.org/10.1145/2095256.2095257
-
(2011)
ACM SIGBED Rev
, vol.8
, Issue.4
, pp. 7-15
-
-
Bello, L.L.1
-
5
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. 2011. Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of the 20th USENIX Conference on Security (USENIX'11).
-
(2011)
Proceedings of the 20th USENIX Conference on Security USENIX'11
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
6
-
-
34547351533
-
Period optimization for hard real-time distributed automotive systems
-
A. Davare, Q. Zhu, M. Di Natale, C. Pinello, S. Kanajan, and A. Sangiovanni-Vincentelli. 2007. Period optimization for hard real-time distributed automotive systems. In Proceedings of the 44th Design Automation Conference (DAC'07). 278-283. DOI:http://dx.doi.org/10.1145/1278480.1278553
-
(2007)
Proceedings of the 44th Design Automation Conference (DAC'07)
, pp. 278-283
-
-
Davare, A.1
Zhu, Q.2
Di Natale, M.3
Pinello, C.4
Kanajan, S.5
Sangiovanni-Vincentelli, A.6
-
7
-
-
33846861495
-
Controller area network (CAN) schedulability analysis: Refuted, revisited and revised
-
(2007)
-
R. I. Davis, A. Burns, R. J. Bril, and J. J. Lukkien. 2007. Controller area network (CAN) schedulability analysis: Refuted, revisited and revised. Real-Time Syst. 35, 3 (2007), 239-272. DOI:http://dx.doi.org/10. 1007/s11241-007-9012-7
-
(2007)
Real-Time Syst.
, vol.35
, Issue.3
, pp. 239-272
-
-
Davis, R.I.1
Burns, A.2
Bril, R.J.3
Lukkien, J.J.4
-
8
-
-
77950376566
-
Moving from federated to integrated architectures in automotive: The role of standards, methods and tools
-
(2010)
-
M. Di Natale and A. Sangiovanni-Vincentelli. 2010. Moving from federated to integrated architectures in automotive: The role of standards, methods and tools. Proc. IEEE 98, 4 (2010), 603-620. DOI:http: //dx.doi.org/10.1109/JPROC.2009.2039550
-
(2010)
Proc. IEEE
, vol.98
, Issue.4
, pp. 603-620
-
-
Di Natale, M.1
Sangiovanni-Vincentelli, A.2
-
13
-
-
84903848012
-
SAFE: Security-aware FlexRay scheduling engine
-
G. Han, H. Zeng, Y. Li, and W. Dou. 2014. SAFE: Security-aware FlexRay scheduling engine. In Proceedings of the Conference on Design, Automation and Test in Europe (DATE'14). 1-4. DOI:http://dx.doi.org/10. 7873/DATE2014.021
-
(2014)
Proceedings of the Conference on Design, Automation and Test in Europe (DATE'14)
, pp. 1-4
-
-
Han, G.1
Zeng, H.2
Li, Y.3
Dou, W.4
-
14
-
-
84928898325
-
-
Technical Report. DOT HS 812 014. V. S. Department of Transportation, National Highway Traffic Safety Administration
-
John Harding, Gregory Powell, Rebecca Yoon, Joshua Fikentscher, Charlene Doyle, Dana Sade,Mike Lukuc, Jim Simons, and Jing Wang. 2014. Vehicle-to-vehicle Communications: Readiness of V2V Technology for Application. Technical Report. DOT HS 812 014. V. S. Department of Transportation, National Highway Traffic Safety Administration. http://www.nhtsa.gov.
-
(2014)
Vehicle-to-vehicle Communications: Readiness of V2V Technology for Application
-
-
Harding, J.1
Powell, G.2
Yoon, R.3
Fikentscher, J.4
Doyle, C.5
Sade, D.6
Lukuc, M.7
Simons, J.8
Wang, J.9
-
16
-
-
0022796618
-
Finding response times in a real-time system
-
(1986)
-
M. Joseph and P. Pandya. 1986. Finding response times in a real-time system. Comput. J. 29, 5 (1986), 390-395. DOI:http://dx.doi.org/10.1093/comjnl/29.5.390
-
(1986)
Comput. J.
, vol.29
, Issue.5
, pp. 390-395
-
-
Joseph, M.1
Pandya, P.2
-
17
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. 2010. Experimental security analysis of a modern automobile. In Proceeding of the IEEE Symposium on Security and Privacy (SP). 447-462. DOI:http://dx.doi.org/10.1109/SP.2010.34
-
(2010)
Proceeding of the IEEE Symposium on Security and Privacy (SP)
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
20
-
-
84924412098
-
Security-aware modeling and efficient mapping for CAN-based real-time distributed automotive systems
-
2014
-
C.-W. Lin, Q. Zhu, and A Sangiovanni-Vincentelli. 2014. Security-aware modeling and efficient mapping for CAN-based real-time distributed automotive systems. IEEE Embed. Syst. Lett. PP, 99 (2014). DOI:http: //dx.doi.org/10.1109/LES.2014.2354011
-
(2014)
IEEE Embed. Syst. Lett.
, pp. 99
-
-
Lin, C.-W.1
Zhu, Q.2
Sangiovanni-Vincentelli, A.3
-
25
-
-
84901675643
-
Adventures in automotive networks and control units
-
C. Miller and C. Valasek. 2013. Adventures in automotive networks and control units. In Proceedings of DEF CON.
-
(2013)
Proceedings of DEF CON
-
-
Miller, C.1
Valasek, C.2
-
27
-
-
84945916978
-
Lightweight authentication for secure automotive networks
-
P. Mundhenk, S. Steinhorst, M. Lukasiewycz, S. A. Fahmy, and S. Chakraborty. 2015. Lightweight authentication for secure automotive networks. In Proceedings of the Conference on Design, Automation and Test in Europe (DATE'15).
-
(2015)
Proceedings of the Conference on Design, Automation and Test in Europe DATE'15
-
-
Mundhenk, P.1
Steinhorst, S.2
Lukasiewycz, M.3
Fahmy, S.A.4
Chakraborty, S.5
-
28
-
-
78650672427
-
Improving platform-based system synthesis by satisfiability modulo theories solving
-
F. Reimann, M. Glaß, C. Haubelt, M. Eberl, and J. Teich. 2010. Improving platform-based system synthesis by satisfiability modulo theories solving. In Proceedings of the 8th International Conference on Hardware/ Software Codesign and System Synthesis (CODES+ISSS). 135-144. DOI:http://dx.doi.org/10.1145/ 1878961.1878986
-
(2010)
Proceedings of the 8th International Conference on Hardware/ Software Codesign and System Synthesis (CODES+ISSS)
, pp. 135-144
-
-
Reimann, F.1
Glaß, M.2
Haubelt, C.3
Eberl, M.4
Teich, J.5
-
29
-
-
80052678758
-
Symbolic system synthesis in the presence of stringent real-time constraints
-
F. Reimann, M. Lukasiewycz, M. Glass, C. Haubelt, and J. Teich. 2011. Symbolic system synthesis in the presence of stringent real-time constraints. In Proceedings of the 48th Design Automation Conference (DAC'11). 393-398. DOI:http://dx.doi.org/10.1145/2024724.2024817
-
(2011)
Proceedings of the 48th Design Automation Conference (DAC'11)
, pp. 393-398
-
-
Reimann, F.1
Lukasiewycz, M.2
Glass, M.3
Haubelt, C.4
Teich, J.5
-
30
-
-
84885584568
-
Security challenges in automotive hardware/software architecture design
-
F. Sagstetter, M. Lukasiewycz, S. Steinhorst, M. Wolf, A. Bouard, W. R. Harris, S. Jha, T. Peyrin, A. Poschmann, and S. Chakraborty. 2013. Security challenges in automotive hardware/software architecture design. In Proceedings of the Conference on Design, Automation and Test in Europe (DATE'13). 458-463. DOI:http://dx.doi.org/10.7873/DATE.2013.102
-
(2013)
Proceedings of the Conference on Design, Automation and Test in Europe (DATE'13)
, pp. 458-463
-
-
Sagstetter, F.1
Lukasiewycz, M.2
Steinhorst, S.3
Wolf, M.4
Bouard, A.5
Harris, W.R.6
Jha, S.7
Peyrin, T.8
Poschmann, A.9
Chakraborty, S.10
-
31
-
-
14844328033
-
On the effectiveness of addressspace randomization
-
H. Shacham, M. Page, B. Pfaff, E. Goh, N. Modadugu, and D. Boneh. 2004. On the effectiveness of addressspace randomization. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04). 298-307. DOI:http://dx.doi.org/10.1145/1030083.1030124
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS'04)
, pp. 298-307
-
-
Shacham, H.1
Page, M.2
Pfaff, B.3
Goh, E.4
Modadugu, N.5
Boneh, D.6
-
33
-
-
0029359773
-
Calculating controller area network (CAN) message response times
-
(1995)
-
K. Tindell, A. Burns, and A. Wellings. 1995. Calculating controller area network (CAN) message response times. Control Eng. Practice 3, 8 (1995), 1163-1169. DOI:http://dx.doi.org/10.1016/0967-0661(95)00112-8
-
(1995)
Control Eng. Practice
, vol.3
, Issue.8
, pp. 1163-1169
-
-
Tindell, K.1
Burns, A.2
Wellings, A.3
-
35
-
-
0002322998
-
Platform and modular concepts at Volkswagen-their effects on the assembly process
-
Springer
-
B. Wilhelm. 1997. Platform and modular concepts at Volkswagen-their effects on the assembly process. In Transforming Automobile Assembly. Springer, 146-156. DOI:http://dx.doi.org/10.1007/ 978-3-642-60374-7 12
-
(1997)
Transforming Automobile Assembly
, pp. 146-156
-
-
Wilhelm, B.1
-
36
-
-
85027931391
-
A practical wireless attack on the connected car and security protocol for in-vehicle CAN
-
S. Woo, H. J. Jo, and D. H. Lee. 2014. A practical wireless attack on the connected car and security protocol for in-vehicle CAN. IEEE Trans. Intell. Transport. Syst. PP, 99 (2014), 1-14. DOI:http://dx.doi.org/10. 1109/TITS.2014.2351612
-
(2014)
IEEE Trans. Intell. Transport. Syst. PP
, vol.99
, Issue.2014
, pp. 1-14
-
-
Woo, S.1
Jo, H.J.2
Lee, D.H.3
-
38
-
-
34548317124
-
Synthesis of task and message activation models in real-time distributed automotive systems
-
W. Zheng, M. Di Natale, C. Pinello, P. Giusto, and A. Sangiovanni-Vincentelli. 2007. Synthesis of task and message activation models in real-time distributed automotive systems. In Proceedings of the Conference on Design, Automation and Test in Europe (DATE'07). 93-98. DOI:http://dx.doi.org/10.1109/DATE.2007. 364573
-
(2007)
Proceedings of the Conference on Design, Automation and Test in Europe (DATE'07)
, pp. 93-98
-
-
Zheng, W.1
Di Natale, M.2
Pinello, C.3
Giusto, P.4
Sangiovanni-Vincentelli, A.5
-
39
-
-
84872479035
-
Optimization of task allocation and priority assignment in hard real-time distributed systems
-
(2012)
-
Q. Zhu, H. Zeng, W. Zheng, M. Di Natale, and A. Sangiovanni-Vincentelli. 2012. Optimization of task allocation and priority assignment in hard real-time distributed systems. ACM Trans. Embed. Comput. Syst. (TECS) 11, 4 (2012), 85. DOI:http://dx.doi.org/10.1145/2362336.2362352
-
(2012)
ACM Trans. Embed. Comput. Syst. (TECS)
, vol.11
, Issue.4
, pp. 85
-
-
Zhu, Q.1
Zeng, H.2
Zheng, W.3
Di Natale, M.4
Sangiovanni-Vincentelli, A.5
|