메뉴 건너뛰기




Volumn , Issue , 2016, Pages 59-70

Towards safe and secure autonomous and cooperative vehicle ecosystems

Author keywords

Autonomous vehicles; Connected vehicles; Cyber physical systems security; Vehicle ecosystems; Vehicle security; Vehicle threat vectors

Indexed keywords

ECOLOGY; ECOSYSTEMS; EMBEDDED SYSTEMS; PERSONAL COMPUTING;

EID: 85001833235     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2994487.2994489     Document Type: Conference Paper
Times cited : (47)

References (82)
  • 6
    • 85001618596 scopus 로고    scopus 로고
    • Google self-driving car project
    • Feb
    • Google self-driving car project. Monthly Report, Feb. 2016.
    • (2016) Monthly Report
  • 17
    • 4143132280 scopus 로고    scopus 로고
    • An architectural framework and a middleware for cooperating smart components
    • Ischia, Italy, ACM
    • A. Casimiro, J. Kaiser, and P. Verissimo. An architectural framework and a middleware for cooperating smart components. In 1st Conference on Computing Frontiers, pages 28-39, Ischia, Italy, 2004. ACM.
    • (2004) 1st Conference on Computing Frontiers , pp. 28-39
    • Casimiro, A.1    Kaiser, J.2    Verissimo, P.3
  • 18
    • 85001833549 scopus 로고    scopus 로고
    • Accessed: 2016-07-22
    • CBSNEWS. Toyota "unintended acceleration" has killed 89. http://www.cbsnews.com/news/toyotaunintended-acceleration-has-killed-89/. Accessed: 2016-07-22.
    • Toyota "unintended Acceleration" Has Killed 89
  • 20
    • 84964499977 scopus 로고    scopus 로고
    • Flexray communications system-protocol specification
    • F. Consortium et al. Flexray communications system-protocol specification. Version, 2(1):198-207, 2005.
    • (2005) Version , vol.2 , Issue.1 , pp. 198-207
  • 21
    • 84979683582 scopus 로고    scopus 로고
    • Technical report, Massachusetts Institute of Technology, (Accessed: 2016-07-22)
    • V. Costan and S. Devadas. Intel SGX explained. Technical report, Massachusetts Institute of Technology, 2016. https://eprint.iacr.org/2016/086.pdf (Accessed: 2016-07-22).
    • (2016) Intel SGX Explained
    • Costan, V.1    Devadas, S.2
  • 23
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • Springer
    • J. R. Douceur. The Sybil attack. In Peer-to-peer Systems, pages 251-260. Springer, 2002.
    • (2002) Peer-to-peer Systems , pp. 251-260
    • Douceur, J.R.1
  • 24
    • 85001698627 scopus 로고    scopus 로고
    • Accessed: 2016-07-22
    • E. Enterprise. Erika enterprise 3. http://erika.tuxfamily.org/drupal/content/erikaenterprise-3. Accessed: 2016-07-22.
    • Erika Enterprise 3
  • 27
    • 51349150827 scopus 로고    scopus 로고
    • Reliability gain of network coding in lossy wireless networks
    • Phoenix, USA, April
    • M. Ghaderi, D. Towsley, and J. Kurose. Reliability gain of network coding in lossy wireless networks. In IEEE INFOCOM, Phoenix, USA, April 2008.
    • (2008) IEEE INFOCOM
    • Ghaderi, M.1    Towsley, D.2    Kurose, J.3
  • 33
    • 56449088090 scopus 로고    scopus 로고
    • Security threats to automotive CAN networks-practical examples and selected short-term countermeasures
    • Springer
    • T. Hoppe, S. Kiltz, and J. Dittmann. Security threats to automotive CAN networks-practical examples and selected short-term countermeasures. In Computer Safety, Reliability, and Security, pages 235-248. Springer, 2008.
    • (2008) Computer Safety, Reliability, and Security , pp. 235-248
    • Hoppe, T.1    Kiltz, S.2    Dittmann, J.3
  • 35
    • 84973446574 scopus 로고    scopus 로고
    • Privacy is dead, long live privacy
    • May
    • J.-P. Hubaux and A. Juels. Privacy is dead, long live privacy. Commun. ACM, 59(6):39-41, May 2016.
    • (2016) Commun. ACM , vol.59 , Issue.6 , pp. 39-41
    • Hubaux, J.-P.1    Juels, A.2
  • 38
    • 84941636863 scopus 로고    scopus 로고
    • Cars of the future: The Internet of Things in the automotive industry
    • R. Kirk. Cars of the future: the Internet of Things in the automotive industry. Network Security, 2015(9):16-18, 2015.
    • (2015) Network Security , vol.2015 , Issue.9 , pp. 16-18
    • Kirk, R.1
  • 39
    • 84878639399 scopus 로고    scopus 로고
    • Integrity in embedded control networks
    • P. Koopman and C. Szilagyi. Integrity in embedded control networks. IEEE Security & Privacy, 11(3):61-63, 2013.
    • (2013) IEEE Security & Privacy , vol.11 , Issue.3 , pp. 61-63
    • Koopman, P.1    Szilagyi, C.2
  • 40
    • 0003245534 scopus 로고
    • Real-Time and Dependability Concepts
    • chapter ACM-Press, Addison-Wesley, 2nd edition
    • H. Kopetz and P. Veríssimo. Distributed Systems, chapter Real-Time and Dependability Concepts. ACM-Press, Addison-Wesley, 2nd edition, 1993.
    • (1993) Distributed Systems
    • Kopetz, H.1    Veríssimo, P.2
  • 46
    • 85001867660 scopus 로고    scopus 로고
    • Master's thesis, Faculty of Science, Technology and Communication - University of Luxembourg, Aug. Sec. 5.6: Face Pixelation
    • P. Ludivig. Detection of faces for mobile robots. Master's thesis, Faculty of Science, Technology and Communication - University of Luxembourg, Aug. 2015. Sec. 5.6: Face Pixelation.
    • (2015) Detection of Faces for Mobile Robots
    • Ludivig, P.1
  • 47
    • 84904263520 scopus 로고    scopus 로고
    • Survey on VANET security challenges and possible cryptographic solutions
    • M. N. Mejri, J. Ben-Othman, and M. Hamdi. Survey on VANET security challenges and possible cryptographic solutions. Vehicular Communications, 1(2):53-66, 2014.
    • (2014) Vehicular Communications , vol.1 , Issue.2 , pp. 53-66
    • Mejri, M.N.1    Ben-Othman, J.2    Hamdi, M.3
  • 48
    • 84953273645 scopus 로고    scopus 로고
    • Remote exploitation of an unaltered passenger vehicle
    • C. Miller and C. Valasek. Remote exploitation of an unaltered passenger vehicle. Black Hat USA, 2015.
    • (2015) Black Hat USA
    • Miller, C.1    Valasek, C.2
  • 49
    • 84955710198 scopus 로고    scopus 로고
    • Survey on security issues in vehicular ad hoc networks
    • B. Mokhtar and M. Azab. Survey on security issues in vehicular ad hoc networks. Alexandria Engineering Journal, 54(4):1115-1126, 2015.
    • (2015) Alexandria Engineering Journal , vol.54 , Issue.4 , pp. 1115-1126
    • Mokhtar, B.1    Azab, M.2
  • 51
    • 85001577526 scopus 로고    scopus 로고
    • C. of Oklahoma County. Accessed: 2016-07-22
    • C. of Oklahoma County. Bookout vs toyota. http://www.safetyresearch.net/Library/Bookout v Toyota Barr REDACTED.pdf. Accessed: 2016-07-22.
    • Bookout vs Toyota
  • 54
    • 84906230362 scopus 로고    scopus 로고
    • A practical attack against GPRS/EDGE/UMTS/ HSPA mobile data communications
    • D. Perez and J. Pico. A practical attack against GPRS/EDGE/UMTS/ HSPA mobile data communications. Black Hat DC, 2011.
    • (2011) Black Hat DC
    • Perez, D.1    Pico, J.2
  • 56
    • 85001860838 scopus 로고    scopus 로고
    • Remote attacks on automated vehicles sensors: Experiments on camera and lidar
    • J. Petit, B. Stottelaar, M. Feiri, and F. Kargl. Remote attacks on automated vehicles sensors: Experiments on camera and lidar. In Black Hat Europe, 2015.
    • (2015) Black Hat Europe
    • Petit, J.1    Stottelaar, B.2    Feiri, M.3    Kargl, F.4
  • 58
  • 59
    • 4143068955 scopus 로고    scopus 로고
    • Evolution of local interconnect network (LIN) solutions
    • IEEE
    • M. Ruff. Evolution of local interconnect network (LIN) solutions. In 58th Vehicular Tech. Conf. (VTC 2003-Fall), volume 5, pages 3382-3389. IEEE, 2003.
    • (2003) 58th Vehicular Tech. Conf. (VTC 2003-Fall) , vol.5 , pp. 3382-3389
    • Ruff, M.1
  • 61
    • 0037251378 scopus 로고    scopus 로고
    • Language-based information-flow security
    • Sept.
    • A. Sabelfeld and A. C. Myers. Language-based information-flow security. IEEE J.Sel. A. Commun., 21(1):5-19, Sept. 2006.
    • (2006) IEEE J.Sel. A. Commun. , vol.21 , Issue.1 , pp. 5-19
    • Sabelfeld, A.1    Myers, A.C.2
  • 64
  • 65
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to share a secret. Comm. of the ACM, 22(11):612-613, 1979.
    • (1979) Comm. of the ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 69
    • 85001716109 scopus 로고    scopus 로고
    • Accessed: 2016-07-22
    • Sysgo. Pikeos. https://www.sysgo.com/solutions/industrysolutions/automotive/. Accessed: 2016-07-22.
    • Pikeos
  • 75
    • 85001532841 scopus 로고    scopus 로고
    • Accessed: 2016-07-22
    • Windriver. Vxworks. http://windriver.com/products/vxworks/. Accessed: 2016-07-22.
    • Vxworks
  • 76
    • 84903459916 scopus 로고    scopus 로고
    • Design, implementation, and evaluation of a vehicular hardware security module
    • Springer
    • M. Wolf and T. Gendrullis. Design, implementation, and evaluation of a vehicular hardware security module. In Information Security and Cryptology-ICISC 2011, pages 302-318. Springer, 2011.
    • Information Security and Cryptology-ICISC 2011 , vol.2011 , pp. 302-318
    • Wolf, M.1    Gendrullis, T.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.