-
1
-
-
84969395411
-
A model for safe and secure execution of downloaded vehicle applications
-
IET
-
Phung, P.H., Nilsson, D.K., A model for safe and secure execution of downloaded vehicle applications. Road transport information and control conference and the ITS United Kingdom members’ conference (RTIC 2010)-better transport through technology, IET, 2010, IET, 1–6.
-
(2010)
Road transport information and control conference and the ITS United Kingdom members’ conference (RTIC 2010)-better transport through technology, IET
, pp. 1-6
-
-
Phung, P.H.1
Nilsson, D.K.2
-
2
-
-
84952796545
-
Can specification version 2.0
-
Bosch, R., Can specification version 2.0. Rober Bousch GmbH, Postfach, 300240, 1991.
-
(1991)
Rober Bousch GmbH, Postfach
, vol.300240
-
-
Bosch, R.1
-
3
-
-
70350050868
-
Research on the controller area network
-
IEEE
-
Chen, H., Tian, J., Research on the controller area network. Networking and digital society, 2009. ICNDS’09. international conference on, 2, 2009, IEEE, 251–254.
-
(2009)
Networking and digital society, 2009. ICNDS’09. international conference on
, vol.2
, pp. 251-254
-
-
Chen, H.1
Tian, J.2
-
4
-
-
84958755345
-
In-vehicle networks: attacks, vulnerabilities, and proposed solutions
-
ACM
-
Carsten, P., Andel, T.R., Yampolskiy, M., McDonald, J.T., In-vehicle networks: attacks, vulnerabilities, and proposed solutions. Proceedings of the 10th annual cyber and information security research conference, 2015, ACM, 1.
-
(2015)
Proceedings of the 10th annual cyber and information security research conference
, pp. 1
-
-
Carsten, P.1
Andel, T.R.2
Yampolskiy, M.3
McDonald, J.T.4
-
5
-
-
84986248595
-
Adventures in automotive networks and control units
-
Miller, C., Valasek, C., Adventures in automotive networks and control units. Def Con 21 (2013), 260–264.
-
(2013)
Def Con
, vol.21
, pp. 260-264
-
-
Miller, C.1
Valasek, C.2
-
6
-
-
85027931391
-
A practical wireless attack on the connected car and security protocol for in-vehicle can
-
Woo, S., Jo, H.J., Lee, D.H., A practical wireless attack on the connected car and security protocol for in-vehicle can. Intel Transp Syst IEEE Trans 16:2 (2015), 993–1006.
-
(2015)
Intel Transp Syst IEEE Trans
, vol.16
, Issue.2
, pp. 993-1006
-
-
Woo, S.1
Jo, H.J.2
Lee, D.H.3
-
7
-
-
0036654109
-
Design and analysis of a robust real-time engine control network
-
Ellims, M., Parker, S., Zurlo, J., Design and analysis of a robust real-time engine control network. Micro IEEE 22:4 (2002), 20–27.
-
(2002)
Micro IEEE
, vol.22
, Issue.4
, pp. 20-27
-
-
Ellims, M.1
Parker, S.2
Zurlo, J.3
-
8
-
-
71749096757
-
Hazard and operability (hazop) analysis. a literature review
-
Dunjó, J., Fthenakis, V., Vílchez, J.A., Arnaldos, J., Hazard and operability (hazop) analysis. a literature review. J Hazard Mater 173:1 (2010), 19–32.
-
(2010)
J Hazard Mater
, vol.173
, Issue.1
, pp. 19-32
-
-
Dunjó, J.1
Fthenakis, V.2
Vílchez, J.A.3
Arnaldos, J.4
-
10
-
-
78649321196
-
Security threats to automotive can networks. practical examples and selected short-term countermeasures
-
Hoppe, T., Kiltz, S., Dittmann, J., Security threats to automotive can networks. practical examples and selected short-term countermeasures. Reliab Eng Syst Saf 96:1 (2011), 11–25.
-
(2011)
Reliab Eng Syst Saf
, vol.96
, Issue.1
, pp. 11-25
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
11
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
IEEE
-
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno, T., Checkoway, S., et al. Experimental security analysis of a modern automobile. Security and privacy (S&P), 2010 IEEE symposium on, 2010, IEEE, 447–462.
-
(2010)
Security and privacy (S&P), 2010 IEEE symposium on
, pp. 447-462
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
-
12
-
-
84995468208
-
Error handling of in-vehicle networks makes them vulnerable
-
ACM
-
Cho, K.-T., Shin, K.G., Error handling of in-vehicle networks makes them vulnerable. Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016, ACM, 1044–1055.
-
(2016)
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security
, pp. 1044-1055
-
-
Cho, K.-T.1
Shin, K.G.2
-
13
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces.
-
San Francisco
-
Checkoway, S., McCoy, D., Kantor, B., Anderson, D., Shacham, H., Savage, S., et al. Comprehensive experimental analyses of automotive attack surfaces. USENIX security symposium, 2011, San Francisco.
-
(2011)
USENIX security symposium
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
-
14
-
-
84953273645
-
Remote exploitation of an unaltered passenger vehicle
-
Miller, C., Valasek, C., Remote exploitation of an unaltered passenger vehicle. Black Hat USA, 2015.
-
(2015)
Black Hat USA
-
-
Miller, C.1
Valasek, C.2
-
15
-
-
34547223428
-
State of the art: embedding security in vehicles
-
Wolf, M., Weimerskirch, A., Wollinger, T., State of the art: embedding security in vehicles. EURASIP J Embed Syst, 2007(1), 2007, 074706.
-
(2007)
EURASIP J Embed Syst
, vol.2007
, Issue.1
, pp. 074706
-
-
Wolf, M.1
Weimerskirch, A.2
Wollinger, T.3
-
16
-
-
58149105204
-
Efficient in-vehicle delayed data authentication based on compound message authentication codes
-
IEEE
-
Nilsson, D.K., Larson, U.E., Jonsson, E., Efficient in-vehicle delayed data authentication based on compound message authentication codes. Vehicular technology conference, 2008. VTC 2008-Fall. IEEE 68th, 2008, IEEE, 1–5.
-
(2008)
Vehicular technology conference, 2008. VTC 2008-Fall. IEEE 68th
, pp. 1-5
-
-
Nilsson, D.K.1
Larson, U.E.2
Jonsson, E.3
-
17
-
-
70449553428
-
Secure and authentic communication on existing in-vehicle networks
-
IEEE
-
Groll, A., Ruland, C., Secure and authentic communication on existing in-vehicle networks. Intelligent vehicles symposium, 2009 IEEE, 2009, IEEE, 1093–1097.
-
(2009)
Intelligent vehicles symposium, 2009 IEEE
, pp. 1093-1097
-
-
Groll, A.1
Ruland, C.2
-
18
-
-
77951434129
-
On the security of intra-car wireless sensor networks
-
IEEE
-
Lee, H., Tsai, H.-M., Tonguz, O.K., On the security of intra-car wireless sensor networks. Vehicular technology conference fall (VTC 2009-Fall), 2009 IEEE 70th, 2009, IEEE, 1–5.
-
(2009)
Vehicular technology conference fall (VTC 2009-Fall), 2009 IEEE 70th
, pp. 1-5
-
-
Lee, H.1
Tsai, H.-M.2
Tonguz, O.K.3
-
19
-
-
84864682117
-
Design, implementation, and evaluation of a vehicular hardware security module
-
Springer
-
Wolf, M., Gendrullis, T., Design, implementation, and evaluation of a vehicular hardware security module. International conference on information security and cryptology, 2011, Springer, 302–318.
-
(2011)
International conference on information security and cryptology
, pp. 302-318
-
-
Wolf, M.1
Gendrullis, T.2
-
20
-
-
84979581204
-
Private and flexible urban message delivery
-
Chang, S., Zhu, H., Dong, M., Ota, K., Liu, X., Shen, X., Private and flexible urban message delivery. IEEE Trans Veh Technol 65:7 (2016), 4900–4910.
-
(2016)
IEEE Trans Veh Technol
, vol.65
, Issue.7
, pp. 4900-4910
-
-
Chang, S.1
Zhu, H.2
Dong, M.3
Ota, K.4
Liu, X.5
Shen, X.6
-
21
-
-
84924777735
-
Mmcd: cooperative downloading for highway vanets
-
Ota, K., Dong, M., Chang, S., Zhu, H., Mmcd: cooperative downloading for highway vanets. IEEE Trans Emerg Top Comput 3:1 (2015), 34–43.
-
(2015)
IEEE Trans Emerg Top Comput
, vol.3
, Issue.1
, pp. 34-43
-
-
Ota, K.1
Dong, M.2
Chang, S.3
Zhu, H.4
-
22
-
-
84992753572
-
Control plane optimization in software-defined vehicular ad hoc networks
-
Li, H., Dong, M., Ota, K., Control plane optimization in software-defined vehicular ad hoc networks. IEEE Trans Veh Technol 65:10 (2016), 7895–7904.
-
(2016)
IEEE Trans Veh Technol
, vol.65
, Issue.10
, pp. 7895-7904
-
-
Li, H.1
Dong, M.2
Ota, K.3
-
23
-
-
85028301371
-
-
Communication with a Toyota Prius. Project Report, ETH, Switzerland. available online at
-
Krucker M, Bitzi R. Communication with a Toyota Prius. Project Report, ETH, Switzerland, 2009. available online at https://attachments.priuschat.com/attachment-files/2017/04/122809_Communication_with_a_Toyota_Prius.pdf.
-
(2009)
-
-
Krucker, M.1
Bitzi, R.2
-
24
-
-
84881046901
-
Cyber-security for the controller area network (can) communication protocol
-
IEEE
-
Lin, C.-W., Sangiovanni-Vincentelli, A., Cyber-security for the controller area network (can) communication protocol. Cyber security (CyberSecurity), 2012 international conference on, 2012, IEEE, 1–7.
-
(2012)
Cyber security (CyberSecurity), 2012 international conference on
, pp. 1-7
-
-
Lin, C.-W.1
Sangiovanni-Vincentelli, A.2
-
25
-
-
84946686886
-
Vecure: a practical security framework to protect the can bus of vehicles
-
IEEE
-
Wang, Q., Sawhney, S., Vecure: a practical security framework to protect the can bus of vehicles. Internet of Things (IOT), 2014 international conference on the, 2014, IEEE, 13–18.
-
(2014)
Internet of Things (IOT), 2014 international conference on the
, pp. 13-18
-
-
Wang, Q.1
Sawhney, S.2
-
26
-
-
84963988159
-
Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network
-
IEEE
-
Song, H.M., Kim, H.R., Kim, H.K., Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network. 2016 international conference on information networking (ICOIN), 2016, IEEE, 63–68.
-
(2016)
2016 international conference on information networking (ICOIN)
, pp. 63-68
-
-
Song, H.M.1
Kim, H.R.2
Kim, H.K.3
-
27
-
-
85028360229
-
-
[Online; accessed 21-April-2016].
-
PRNewswire. PRNewswire. http://goo.gl/ZET6NO; 2016. [Online; accessed 21-April-2016].
-
(2016)
-
-
-
28
-
-
84953383368
-
Fords sync® and microsoft windows embedded automotive make digital lifestyle a reality on the road
-
Ghangurde, M., Business, W.E., Fords sync® and microsoft windows embedded automotive make digital lifestyle a reality on the road. SAE Int, 2011.
-
(2011)
SAE Int
-
-
Ghangurde, M.1
Business, W.E.2
-
29
-
-
70350335721
-
The new bmw idrive–applied processes and methods to assure high usability
-
Springer
-
Niedermaier, B., Durach, S., Eckstein, L., Keinath, A., The new bmw idrive–applied processes and methods to assure high usability. Digital human modeling, 2009, Springer, 443–452.
-
(2009)
Digital human modeling
, pp. 443-452
-
-
Niedermaier, B.1
Durach, S.2
Eckstein, L.3
Keinath, A.4
-
30
-
-
5444230670
-
Audi multi media interface (mmi): von der idee zum produkt interdisziplinär-prozessorientiert modellreihenübergreifend
-
Hamberger, W., Deutler, P., Bouaziz, T., Audi multi media interface (mmi): von der idee zum produkt interdisziplinär-prozessorientiert modellreihenübergreifend. VDI Ber, 2003, 1175–1191.
-
(2003)
VDI Ber
, pp. 1175-1191
-
-
Hamberger, W.1
Deutler, P.2
Bouaziz, T.3
-
31
-
-
85028301881
-
-
OSGi-The Dynamic Module System for Java. Online available at
-
Alliance O. OSGi-The Dynamic Module System for Java, 2009. Online available at: http://www.osgi.org/Main/HomePage.
-
(2009)
-
-
Alliance, O.1
-
32
-
-
77958492643
-
On the need of data management in automotive systems
-
Schulze, S., Pukall, M., Saake, G., Hoppe, T., Dittmann, J., On the need of data management in automotive systems. BTW, 144, 2009, 217–226.
-
(2009)
BTW
, vol.144
, pp. 217-226
-
-
Schulze, S.1
Pukall, M.2
Saake, G.3
Hoppe, T.4
Dittmann, J.5
-
34
-
-
67249166234
-
New attestation based security architecture for in-vehicle communication
-
IEEE
-
Oguma, H., Yoshioka, X., Nishikawa, M., Shigetomi, R., Otsuka, A., Imai, H., New attestation based security architecture for in-vehicle communication. Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE, 2008, IEEE, 1–6.
-
(2008)
Global Telecommunications Conference, 2008. IEEE GLOBECOM 2008. IEEE
, pp. 1-6
-
-
Oguma, H.1
Yoshioka, X.2
Nishikawa, M.3
Shigetomi, R.4
Otsuka, A.5
Imai, H.6
-
35
-
-
77958503632
-
Using spin model checking for flight software verification
-
IEEE
-
Gluck, P.R., Holzmann, G.J., Using spin model checking for flight software verification. Aerospace conference proceedings, 2002. IEEE, 1, 2002, IEEE, 1–105.
-
(2002)
Aerospace conference proceedings, 2002. IEEE
, vol.1
, pp. 1-105
-
-
Gluck, P.R.1
Holzmann, G.J.2
-
36
-
-
84894581801
-
From offline toward real time: a hybrid systems model checking and cps codesign approach for medical device plug-and-play collaborations
-
Li, T., Tan, F., Wang, Q., Bu, L., Cao, J.-n., Liu, X., From offline toward real time: a hybrid systems model checking and cps codesign approach for medical device plug-and-play collaborations. Parallel Distrib Syst IEEE Trans 25:3 (2014), 642–652.
-
(2014)
Parallel Distrib Syst IEEE Trans
, vol.25
, Issue.3
, pp. 642-652
-
-
Li, T.1
Tan, F.2
Wang, Q.3
Bu, L.4
Cao, J.-N.5
Liu, X.6
|