-
1
-
-
85019470373
-
Likelihood of threats to connected vehicles
-
Nov. 2014
-
L. Ben Othmane, R. Fernando, R. Ranchal, B. Bhargava, and E. Bodden. 2014. Likelihood of threats to connected vehicles. Int. J. Next-Gen. Comput. 5, 3 (Nov. 2014).
-
(2014)
Int. J. Next-Gen. Comput
, vol.5
, pp. 3
-
-
Ben Othmane, L.1
Fernando, R.2
Ranchal, R.3
Bhargava, B.4
Bodden, E.5
-
2
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. 2011. Comprehensive experimental analyses of automotive attack surfaces. In Proceedings of USENIX.
-
(2011)
Proceedings of USENIX
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
3
-
-
51049122345
-
-
Technical Report. Internet Engineering Task Force (IETF)
-
D. Cooper, S. Santesson, S. Farrell, S. Boeyen, R. Housley, andW. Polk. 2008. RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile. Technical Report. Internet Engineering Task Force (IETF). Retrieved from http://tools.ietf.org/html/rfc5280.
-
(2008)
RFC 5280: Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile
-
-
Cooper, D.1
Santesson, S.2
Farrell, S.3
Boeyen, S.4
Housley, R.5
Polk, W.6
-
5
-
-
67650240831
-
Unbounded verification, falsification, and characterization of security protocols by pattern refinement
-
ACM, New York, NY
-
C. J. F. Cremers. 2008b. Unbounded verification, falsification, and characterization of security protocols by pattern refinement. In Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08). ACM, New York, NY, 119-128. DOI:http://dx.doi.org/10.1145/1455770.1455787
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS'08)
, pp. 119-128
-
-
Cremers, C.J.F.1
-
9
-
-
85017108581
-
-
R. Escherich, I. Ledendecker, C. Schmal, B. Kuhls, C. Grothe, and F. Scharberth. 2009. SHE - Secure Hardware Extension Functional Specification Version 1.1. Herstellerinitiative Software (HIS).
-
(2009)
SHE - Secure Hardware Extension Functional Specification Version 1.1. Herstellerinitiative Software (HIS)
-
-
Escherich, R.1
Ledendecker, I.2
Schmal, C.3
Kuhls, B.4
Grothe, C.5
Scharberth, F.6
-
10
-
-
84872695108
-
LiBrA-CAN: A lightweight broadcast authentication protocol for controller area networks
-
J. Pieprzyk, A.-R. Sadeghi, and M. Manulis (Eds.). Lecture Notes in Computer Science, Springer, Berlin
-
B. Groza, S. Murvay, A. van Herrewege, and I. Verbauwhede. 2012. LiBrA-CAN: A lightweight broadcast authentication protocol for controller area networks. In Cryptology and Network Security, J. Pieprzyk, A.-R. Sadeghi, and M. Manulis (Eds.). Lecture Notes in Computer Science, Vol. 7712. Springer, Berlin, 185-200. DOI:http://dx.doi.org/10.1007/978-3-642-35404-5-15
-
(2012)
Cryptology and Network Security
, vol.7712
, pp. 185-200
-
-
Groza, B.1
Murvay, S.2
Van Herrewege, A.3
Verbauwhede, I.4
-
11
-
-
84903848012
-
SAFE: Security-aware FlexRay scheduling engine
-
G. Han, H. Zeng, Y. Li, and W. Dou. 2014. SAFE: Security-aware FlexRay scheduling engine. In Proceedings of DATE. DOI:http://dx.doi.org/10.7873/DATE2014.021
-
(2014)
Proceedings of DATE
-
-
Han, G.1
Zeng, H.2
Li, Y.3
Dou, W.4
-
15
-
-
78649321196
-
Security threats to automotive CAN networks-practical examples and selected short-term countermeasures
-
Jan. 2011
-
T. Hoppe, S. Kiltz, and J. Dittmann. 2011. Security threats to automotive CAN networks-practical examples and selected short-term countermeasures. Reliabil. Eng. Syst. Safety 96, 1 (Jan. 2011), 11-25. DOI:http://dx.doi.org/10.1016/j.ress.2010.06.026
-
(2011)
Reliabil. Eng. Syst. Safety
, vol.96
, Issue.1
, pp. 11-25
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
19
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. 2010. Experimental security analysis of a modern automobile. In Proceedings of Symposium on Security and Privacy (SP'10).
-
(2010)
Proceedings of Symposium on Security and Privacy (SP'10)
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
22
-
-
84957099911
-
2016. Security-aware obfuscated priority assignment for automotive CAN platforms
-
M. Lukasiewycz, P. Mundhenk, and S. Steinhorst. 2016. Security-aware obfuscated priority assignment for automotive CAN platforms. ACM Trans. Des. Autom. Electron. Syst. 21 (2016), 32:1-32:27. DOI:http://dx.doi.org/10.1145/2831232
-
(2016)
ACM Trans. Des. Autom. Electron. Syst
, vol.21
, pp. 321-3227
-
-
Lukasiewycz, M.1
Mundhenk, P.2
Steinhorst, S.3
-
23
-
-
84901675643
-
Adventures in automotive networks and control units
-
C. Miller and C. Valasek. 2013. Adventures in automotive networks and control units. In Proceedings of DEF CON.
-
(2013)
Proceedings of DEF CON
-
-
Miller, C.1
Valasek, C.2
-
25
-
-
84964764354
-
Remote exploitation of an unaltered passenger vehicle
-
C. Miller and C. Valasek. 2015. Remote exploitation of an unaltered passenger vehicle. In Proceedings of Black Hat.
-
(2015)
Proceedings of Black Hat
-
-
Miller, C.1
Valasek, C.2
-
26
-
-
85013849764
-
Open source model and simulator for real-time performance analysis of automotive network security
-
2016
-
P. Mundhenk, A. Mrowca, S. Steinhorst, M. Lukasiewycz, S. A. Fahmy, and S. Chakraborty. 2016a. Open source model and simulator for real-time performance analysis of automotive network security. ACM SIGBED Rev. 13, 3 (2016), 8-13.
-
(2016)
ACM SIGBED Rev
, vol.13
, Issue.3
, pp. 8-13
-
-
Mundhenk, P.1
Mrowca, A.2
Steinhorst, S.3
Lukasiewycz, M.4
Fahmy, S.A.5
Chakraborty, S.6
-
27
-
-
85017119883
-
-
P. Mundhenk, A. Paverd, A.Mrowca, S. Steinhorst, M. Lukasiewycz, S. A. Fahmy, and S. Chakraborty. 2016b. Online repository for models and results presented in this paper. Retrieved from https://github.com/PhilippMundhenk/LASAN.
-
(2016)
Online Repository for Models and Results Presented in This Paper
-
-
Mundhenk, P.1
Paverd, A.2
Mrowca, A.3
Steinhorst, S.4
Lukasiewycz, M.5
Fahmy, S.A.6
Chakraborty, S.7
-
28
-
-
84945916978
-
Lightweight authentication for secure automotive networks
-
P. Mundhenk, S. Steinhorst, M. Lukasiewycz, S. A. Fahmy, and S. Chakraborty. 2015a. Lightweight authentication for secure automotive networks. In Proceedings of the Conference on Design, Automation and Test in Europe (DATE'15). DOI:http://dx.doi.org/10.7873/DATE.2015.0174
-
(2015)
Proceedings of the Conference on Design, Automation and Test in Europe (DATE'15)
-
-
Mundhenk, P.1
Steinhorst, S.2
Lukasiewycz, M.3
Fahmy, S.A.4
Chakraborty, S.5
-
32
-
-
0003508560
-
-
NIST
-
NIST. 2001. Specification for the Advanced Encryption Standard (AES). United States National Institute of Standards and Technology (NIST). Retrieved from http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf.
-
(2001)
Specification for the Advanced Encryption Standard (AES)
-
-
-
36
-
-
84885584568
-
Security challenges in automotive hardware/software architecture design
-
F. Sagstetter, M. Lukasiewycz, S. Steinhorst, M. Wolf, A. Bouard, W. R. Harris, S. Jha, T. Peyrin, A. Poschmann, and S. Chakraborty. 2013. Security challenges in automotive hardware/software architecture design. In Proceedings of the Design, Automation Test in Europe Conference Exhibition (DATE'13). 458-463. DOI:http://dx.doi.org/10.7873/DATE.2013.102
-
(2013)
Proceedings of the Design, Automation Test in Europe Conference Exhibition (DATE'13)458-463
-
-
Sagstetter, F.1
Lukasiewycz, M.2
Steinhorst, S.3
Wolf, M.4
Bouard, A.5
Harris, W.R.6
Jha, S.7
Peyrin, T.8
Poschmann, A.9
Chakraborty, S.10
-
37
-
-
84902299263
-
-
Technical Report. Internet Engineering Task Force (IETF). Retrieved from
-
S. Santesson, M. Myers, R. Ankney, A. Malpani, S. Galperin, and C. Adams. 2013. RFC 6960: X.509 Internet Public Key Infrastructure - Online Certificate Status Protocol - OCSP. Technical Report. Internet Engineering Task Force (IETF). Retrieved from http://tools.ietf.org/html/rfc6960.
-
(2013)
RFC 6960: X.509 Internet Public Key Infrastructure - Online Certificate Status Protocol - OCSP
-
-
Santesson, S.1
Myers, M.2
Ankney, R.3
Malpani, A.4
Galperin, S.5
Adams, C.6
-
41
-
-
84883331893
-
Architecture and development of secure communication solutions for smart grid applications
-
2013
-
A. Sikora. 2013. Architecture and development of secure communication solutions for smart grid applications. J. Commun. 8, 8 (2013), 490-496. DOI:http://dx.doi.org/10.12720/jcm.8.8.490-496
-
(2013)
J. Commun
, vol.8
, Issue.8
, pp. 490-496
-
-
Sikora, A.1
-
44
-
-
85017100888
-
-
TUM CREATE. Retrieved October 1, 2015
-
TUM CREATE. 2015. EVA. Retrieved October 1, 2015, http://www.eva-taxi.sg/.
-
(2015)
EVA
-
-
|