메뉴 건너뛰기




Volumn 92, Issue 4, 2017, Pages 1511-1530

Vulnerabilities of Android OS-Based Telematics System

Author keywords

Android; Controller Area Network; Open platform; Smart vehicle; Telematics communication

Indexed keywords

ANDROID (OPERATING SYSTEM); CONTROL SYSTEM SYNTHESIS; CONTROL SYSTEMS; CONTROLLERS; FIRMWARE; REVERSE ENGINEERING; SIGNAL PROCESSING; TELECOMMUNICATION NETWORKS; VEHICLES; WIRELESS TELECOMMUNICATION SYSTEMS;

EID: 84983749082     PISSN: 09296212     EISSN: 1572834X     Source Type: Journal    
DOI: 10.1007/s11277-016-3618-9     Document Type: Article
Times cited : (42)

References (30)
  • 1
    • 85012981505 scopus 로고    scopus 로고
    • Android auto,.
    • Android auto, http://www.android.com/auto/.
  • 2
    • 85012987981 scopus 로고    scopus 로고
    • Apkfuscator,.
    • Apkfuscator, https://github.com/strazzere/APKfuscator.
  • 4
    • 85061034567 scopus 로고    scopus 로고
    • Comprehensive experimental analyses of automotive attack surfaces. Proceedings of the 20th USENIX Conference on Security, SEC’11, Berkeley, CA, USA (pp. 6–6)
    • Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., Koscher, K., Czeskis, A., Roesner, F., & Kohno, T. (2011). Comprehensive experimental analyses of automotive attack surfaces. Proceedings of the 20th USENIX Conference on Security, SEC’11, Berkeley, CA, USA (pp. 6–6). USENIX Association.
    • (2011) USENIX Association
    • Checkoway, S.1    McCoy, D.2    Kantor, B.3    Anderson, D.4    Shacham, H.5    Savage, S.6    Koscher, K.7    Czeskis, A.8    Roesner, F.9    Kohno, T.10
  • 5
    • 0036704573 scopus 로고    scopus 로고
    • Watermarking, tamper-proffing, and obfuscation: Tools for software protection
    • Collberg, C. S., & Thomborson, C. (2002). Watermarking, tamper-proffing, and obfuscation: Tools for software protection. IEEE Transactions on Software Engineering, 28(8), 735–746.
    • (2002) IEEE Transactions on Software Engineering , vol.28 , Issue.8 , pp. 735-746
    • Collberg, C.S.1    Thomborson, C.2
  • 6
    • 85013000390 scopus 로고    scopus 로고
    • Dalvik-obfuscator,.
    • Dalvik-obfuscator, https://github.com/thuxnder/dalvik-obfuscator.
  • 7
    • 33846861495 scopus 로고    scopus 로고
    • Controller area network (can) schedulability analysis: Refuted, revisited and revised
    • Davis, R., Burns, A., Bril, R., & Lukkien, J. (2007). Controller area network (can) schedulability analysis: Refuted, revisited and revised. Real-Time Systems, 35(3), 239–272.
    • (2007) Real-Time Systems , vol.35 , Issue.3 , pp. 239-272
    • Davis, R.1    Burns, A.2    Bril, R.3    Lukkien, J.4
  • 10
    • 85013005956 scopus 로고    scopus 로고
    • Exclusive: Google aiming to go straight into car with next android - sources,.
    • Exclusive: Google aiming to go straight into car with next android - sources, http://www.reuters.com/article/2014/12/18/us-google-cars-idUSKBN0JW2PS20141218.
  • 12
    • 85012954062 scopus 로고    scopus 로고
    • Gm developer network,.
    • Gm developer network, https://developer.gm.com/.
  • 13
    • 85012955752 scopus 로고    scopus 로고
    • Gm to adopt android os in. (2016).
    • Gm to adopt android os in. (2016). http://gas2.org/2014/11/06/gm-adopt-android-os-2016/.
  • 14
    • 85013000400 scopus 로고    scopus 로고
    • Honda debuts android-based infotainment system for europe,.
    • Honda debuts android-based infotainment system for europe, http://www.cnet.com/news/.
  • 15
    • 78649321196 scopus 로고    scopus 로고
    • Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures
    • Special Issue on Safecomp 2008
    • Hoppe, T., Kiltz, S., & Dittmann, J. (2011). Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures. Reliability Engineering & System Safety, 96(1), 11–25. Special Issue on Safecomp 2008.
    • (2011) Reliability Engineering & System Safety , vol.96 , Issue.1 , pp. 11-25
    • Hoppe, T.1    Kiltz, S.2    Dittmann, J.3
  • 16
    • 85012945804 scopus 로고    scopus 로고
    • Hyundai kia will offer android-based infotainment systems,.
    • Hyundai kia will offer android-based infotainment systems, http://telematicsnews.info/.
  • 18
    • 62849122781 scopus 로고    scopus 로고
    • Securing vehicles against cyber attacks. Proceedings of the 4th annual workshop on Cyber security and information intelligence research (CSIIRW ’08)
    • New York, NY: ACM
    • Larson, U. E., & Nilsson, D. K. (2008). Securing vehicles against cyber attacks. Proceedings of the 4th annual workshop on Cyber security and information intelligence research (CSIIRW ’08), Article No.30, New York, NY: ACM.
    • (2008) Article No.30
    • Larson, U.E.1    Nilsson, D.K.2
  • 19
    • 84953273645 scopus 로고    scopus 로고
    • Remote exploition of an unaltered passenger vehicle
    • Miller, C., & Valasek, C. (2015). Remote exploition of an unaltered passenger vehicle. Black Hat USA, 2015.
    • (2015) Black Hat USA , pp. 2015
    • Miller, C.1    Valasek, C.2
  • 20
    • 85013008845 scopus 로고    scopus 로고
    • Adventures in automotive networks and control units. In DEFCON 21, Las Vegas, NV
    • Miller, C., & Valasek, C. (2013). Adventures in automotive networks and control units. In DEFCON 21, Las Vegas, NV, August 2013.
    • (2013) August , pp. 2013
    • Miller, C.1    Valasek, C.2
  • 21
    • 85013004112 scopus 로고    scopus 로고
    • Mirrorlink,.
    • Mirrorlink, http://www.mirrorlink.com/.
  • 22
    • 85012974641 scopus 로고    scopus 로고
    • Open automotive alliance,.
    • Open automotive alliance, http://www.openautoalliance.net.
  • 23
    • 85012955746 scopus 로고    scopus 로고
    • Proguard,.
    • Proguard, http://proguard.sourceforge.net/.
  • 24
    • 85040565418 scopus 로고    scopus 로고
    • Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. Proceedings of the 19th USENIX Conference on Security, USENIX Security’10, Berkeley, CA, USA (pp. 21–21)
    • Rouf, I., Miller, R., Mustafa, H., Taylor, T., Oh, S., Xu, W., Gruteser, M., Trappe, W., & Seskar, I. (2010). Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. Proceedings of the 19th USENIX Conference on Security, USENIX Security’10, Berkeley, CA, USA (pp. 21–21). USENIX Association.
    • (2010) USENIX Association
    • Rouf, I.1    Miller, R.2    Mustafa, H.3    Taylor, T.4    Oh, S.5    Xu, W.6    Gruteser, M.7    Trappe, W.8    Seskar, I.9
  • 25
    • 85012990867 scopus 로고    scopus 로고
    • The openxc platform,.
    • The openxc platform, http://openxcplatform.com/.
  • 26
    • 85012962769 scopus 로고    scopus 로고
    • White paper: An overview of samsung knox platform,.
    • White paper: An overview of samsung knox platform, https://www.samsungknox.com/en/support/knox-workspace/white-papers.
  • 29
    • 85027931391 scopus 로고    scopus 로고
    • A practical wireless attack on the connected car and security protocol for in-vehicle can
    • Woo, S., Jo, H., & Lee, D. (2015). A practical wireless attack on the connected car and security protocol for in-vehicle can. Intelligent Transportation Systems, IEEE Transactions on, 16(2), 993–1006.
    • (2015) Intelligent Transportation Systems, IEEE Transactions on , vol.16 , Issue.2 , pp. 993-1006
    • Woo, S.1    Jo, H.2    Lee, D.3
  • 30
    • 84919471140 scopus 로고    scopus 로고
    • Defending connected vehicles against malware: Challenges and a solution framework
    • Zhang, T., Antunes, H., & Aggarwal, S. (2014). Defending connected vehicles against malware: Challenges and a solution framework. Internet of Things Journal, IEEE, 1(1), 10–21.
    • (2014) Internet of Things Journal, IEEE , vol.1 , Issue.1 , pp. 10-21
    • Zhang, T.1    Antunes, H.2    Aggarwal, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.