-
1
-
-
85012981505
-
-
Android auto,.
-
Android auto, http://www.android.com/auto/.
-
-
-
-
2
-
-
85012987981
-
-
Apkfuscator,.
-
Apkfuscator, https://github.com/strazzere/APKfuscator.
-
-
-
-
3
-
-
84879786846
-
Firmware modification attacks on programmable logic controllers
-
Basnight, Z., Butts, J. L, Jr., & Dube, T. (2013). Firmware modification attacks on programmable logic controllers. International Journal of Critical Infrastructure Protection, 6(2), 76–84.
-
(2013)
International Journal of Critical Infrastructure Protection
, vol.6
, Issue.2
, pp. 76-84
-
-
Basnight, Z.1
Butts, J.L.2
Dube, T.3
-
4
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces. Proceedings of the 20th USENIX Conference on Security, SEC’11, Berkeley, CA, USA (pp. 6–6)
-
Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., & Kohno, T. (2011). Comprehensive experimental analyses of automotive attack surfaces. Proceedings of the 20th USENIX Conference on Security, SEC’11, Berkeley, CA, USA (pp. 6–6). USENIX Association.
-
(2011)
USENIX Association
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
5
-
-
0036704573
-
Watermarking, tamper-proffing, and obfuscation: Tools for software protection
-
Collberg, C. S., & Thomborson, C. (2002). Watermarking, tamper-proffing, and obfuscation: Tools for software protection. IEEE Transactions on Software Engineering, 28(8), 735–746.
-
(2002)
IEEE Transactions on Software Engineering
, vol.28
, Issue.8
, pp. 735-746
-
-
Collberg, C.S.1
Thomborson, C.2
-
6
-
-
85013000390
-
-
Dalvik-obfuscator,.
-
Dalvik-obfuscator, https://github.com/thuxnder/dalvik-obfuscator.
-
-
-
-
7
-
-
33846861495
-
Controller area network (can) schedulability analysis: Refuted, revisited and revised
-
Davis, R., Burns, A., Bril, R., & Lukkien, J. (2007). Controller area network (can) schedulability analysis: Refuted, revisited and revised. Real-Time Systems, 35(3), 239–272.
-
(2007)
Real-Time Systems
, vol.35
, Issue.3
, pp. 239-272
-
-
Davis, R.1
Burns, A.2
Bril, R.3
Lukkien, J.4
-
8
-
-
84930173919
-
-
Wiley, Hoboken
-
Drake, J. J., Lanier, Z., Mulliner, C., Fora, P. O., Ridley, S. A., & Wicherski, G. (2014). Android Hacker’s Handbook. Hoboken: Wiley.
-
(2014)
Android Hacker’s Handbook
-
-
Drake, J.J.1
Lanier, Z.2
Mulliner, C.3
Fora, P.O.4
Ridley, S.A.5
Wicherski, G.6
-
10
-
-
85013005956
-
-
Exclusive: Google aiming to go straight into car with next android - sources,.
-
Exclusive: Google aiming to go straight into car with next android - sources, http://www.reuters.com/article/2014/12/18/us-google-cars-idUSKBN0JW2PS20141218.
-
-
-
-
11
-
-
85084164330
-
Fast and vulnerable: A story of telematic failures
-
Washington: D.C. USENIX Association
-
Foster, I., Prudhomme, A., Koscher, K., & Savage, S. (2015). Fast and vulnerable: A story of telematic failures. 9th USENIX Workshop on Offensive Technologies (WOOT 15), Washington, D.C. USENIX Association.
-
(2015)
9th USENIX Workshop on Offensive Technologies (WOOT 15)
-
-
Foster, I.1
Prudhomme, A.2
Koscher, K.3
Savage, S.4
-
12
-
-
85012954062
-
-
Gm developer network,.
-
Gm developer network, https://developer.gm.com/.
-
-
-
-
13
-
-
85012955752
-
-
Gm to adopt android os in. (2016).
-
Gm to adopt android os in. (2016). http://gas2.org/2014/11/06/gm-adopt-android-os-2016/.
-
-
-
-
14
-
-
85013000400
-
-
Honda debuts android-based infotainment system for europe,.
-
Honda debuts android-based infotainment system for europe, http://www.cnet.com/news/.
-
-
-
-
15
-
-
78649321196
-
Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures
-
Special Issue on Safecomp 2008
-
Hoppe, T., Kiltz, S., & Dittmann, J. (2011). Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures. Reliability Engineering & System Safety, 96(1), 11–25. Special Issue on Safecomp 2008.
-
(2011)
Reliability Engineering & System Safety
, vol.96
, Issue.1
, pp. 11-25
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
16
-
-
85012945804
-
-
Hyundai kia will offer android-based infotainment systems,.
-
Hyundai kia will offer android-based infotainment systems, http://telematicsnews.info/.
-
-
-
-
17
-
-
77955201139
-
Experimental security analysis of a modern automobile. Security and Privacy (SP), 2010 IEEE Symposium on, (pp
-
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H. and Savage, S. (2010). Experimental security analysis of a modern automobile. Security and Privacy (SP), 2010 IEEE Symposium on, (pp. 447–462) May.
-
(2010)
447–462) May
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
18
-
-
62849122781
-
Securing vehicles against cyber attacks. Proceedings of the 4th annual workshop on Cyber security and information intelligence research (CSIIRW ’08)
-
New York, NY: ACM
-
Larson, U. E., & Nilsson, D. K. (2008). Securing vehicles against cyber attacks. Proceedings of the 4th annual workshop on Cyber security and information intelligence research (CSIIRW ’08), Article No.30, New York, NY: ACM.
-
(2008)
Article No.30
-
-
Larson, U.E.1
Nilsson, D.K.2
-
19
-
-
84953273645
-
Remote exploition of an unaltered passenger vehicle
-
Miller, C., & Valasek, C. (2015). Remote exploition of an unaltered passenger vehicle. Black Hat USA, 2015.
-
(2015)
Black Hat USA
, pp. 2015
-
-
Miller, C.1
Valasek, C.2
-
20
-
-
85013008845
-
Adventures in automotive networks and control units. In DEFCON 21, Las Vegas, NV
-
Miller, C., & Valasek, C. (2013). Adventures in automotive networks and control units. In DEFCON 21, Las Vegas, NV, August 2013.
-
(2013)
August
, pp. 2013
-
-
Miller, C.1
Valasek, C.2
-
21
-
-
85013004112
-
-
Mirrorlink,.
-
Mirrorlink, http://www.mirrorlink.com/.
-
-
-
-
22
-
-
85012974641
-
-
Open automotive alliance,.
-
Open automotive alliance, http://www.openautoalliance.net.
-
-
-
-
23
-
-
85012955746
-
-
Proguard,.
-
Proguard, http://proguard.sourceforge.net/.
-
-
-
-
24
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. Proceedings of the 19th USENIX Conference on Security, USENIX Security’10, Berkeley, CA, USA (pp. 21–21)
-
Rouf, I., Miller, R., Mustafa, H., Taylor, T., Oh, S., Xu, W., Gruteser, M., Trappe, W., & Seskar, I. (2010). Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. Proceedings of the 19th USENIX Conference on Security, USENIX Security’10, Berkeley, CA, USA (pp. 21–21). USENIX Association.
-
(2010)
USENIX Association
-
-
Rouf, I.1
Miller, R.2
Mustafa, H.3
Taylor, T.4
Oh, S.5
Xu, W.6
Gruteser, M.7
Trappe, W.8
Seskar, I.9
-
25
-
-
85012990867
-
-
The openxc platform,.
-
The openxc platform, http://openxcplatform.com/.
-
-
-
-
26
-
-
85012962769
-
-
White paper: An overview of samsung knox platform,.
-
White paper: An overview of samsung knox platform, https://www.samsungknox.com/en/support/knox-workspace/white-papers.
-
-
-
-
27
-
-
84859106202
-
Security in automotive bus systems
-
Wolf, M., Weimerskirch, A., Paar, C., & Bluetooth, M. (2004). Security in automotive bus systems. Proceedings of the Workshop on Embedded Security in Cars (escar)04.
-
(2004)
Proceedings of the Workshop on Embedded Security in Cars (escar)04
-
-
Wolf, M.1
Weimerskirch, A.2
Paar, C.3
Bluetooth, M.4
-
28
-
-
34547223428
-
State of the art: Embedding security in vehicles
-
Wolf, M., Weimerskirch, A., & Wollinger, T. (2007). State of the art: Embedding security in vehicles. EURASIP Journal on Embedded Systems, 2007(1), 074706.
-
(2007)
EURASIP Journal on Embedded Systems
, vol.2007
, Issue.1
, pp. 074706
-
-
Wolf, M.1
Weimerskirch, A.2
Wollinger, T.3
-
29
-
-
85027931391
-
A practical wireless attack on the connected car and security protocol for in-vehicle can
-
Woo, S., Jo, H., & Lee, D. (2015). A practical wireless attack on the connected car and security protocol for in-vehicle can. Intelligent Transportation Systems, IEEE Transactions on, 16(2), 993–1006.
-
(2015)
Intelligent Transportation Systems, IEEE Transactions on
, vol.16
, Issue.2
, pp. 993-1006
-
-
Woo, S.1
Jo, H.2
Lee, D.3
-
30
-
-
84919471140
-
Defending connected vehicles against malware: Challenges and a solution framework
-
Zhang, T., Antunes, H., & Aggarwal, S. (2014). Defending connected vehicles against malware: Challenges and a solution framework. Internet of Things Journal, IEEE, 1(1), 10–21.
-
(2014)
Internet of Things Journal, IEEE
, vol.1
, Issue.1
, pp. 10-21
-
-
Zhang, T.1
Antunes, H.2
Aggarwal, S.3
|