메뉴 건너뛰기




Volumn 36, Issue 11, 2017, Pages 1790-1803

Automotive Electrical and Electronic Architecture Security via Distributed In-Vehicle Traffic Monitoring

Author keywords

Attack detection; automotive security; distributed systems; embedded systems

Indexed keywords

COMPUTER ARCHITECTURE; EMBEDDED SYSTEMS; NETWORK ARCHITECTURE; SAFETY ENGINEERING; VEHICLE TRANSMISSIONS; VEHICLES;

EID: 85035802059     PISSN: 02780070     EISSN: None     Source Type: Journal    
DOI: 10.1109/TCAD.2017.2666605     Document Type: Article
Times cited : (50)

References (38)
  • 1
    • 56449088090 scopus 로고    scopus 로고
    • Security threats to automotive CAN networks-Practical examples, selected short-term countermeasures
    • Heidelberg, Germany: Springer
    • T. Hoppe, S. Kiltz, J. Dittmann, "Security threats to automotive CAN networks-Practical examples, selected short-term countermeasures, " in Computer Safety, Reliability, Security. Heidelberg, Germany: Springer, 2008, pp. 235-248.
    • (2008) Computer Safety, Reliability, Security , pp. 235-248
    • Hoppe, T.1    Kiltz, S.2    Dittmann, J.3
  • 2
    • 85061034567 scopus 로고    scopus 로고
    • Comprehensive experimental analyses of automotive attack surfaces
    • San Francisco, CA, USA
    • S. Checkoway, et al., "Comprehensive experimental analyses of automotive attack surfaces, " in Proc. USENIX Security Symp., San Francisco, CA, USA, 2011, p. 6.
    • (2011) Proc. USENIX Security Symp. , pp. 6
    • Checkoway, S.1
  • 3
    • 84885584568 scopus 로고    scopus 로고
    • Security challenges in automotive hardware/software architecture design
    • Grenoble, France
    • F. Sagstetter, et al., "Security challenges in automotive hardware/software architecture design, " in Proc. Conf. Design Autom. Test Europe (DATE), Grenoble, France, 2013, pp. 458-463.
    • (2013) Proc. Conf. Design Autom. Test Europe (DATE) , pp. 458-463
    • Sagstetter, F.1
  • 4
    • 79960791793 scopus 로고    scopus 로고
    • Entropy-based anomaly detection for in-vehicle networks
    • Baden-Baden, Germany
    • M. Müter, N. Asaj, "Entropy-based anomaly detection for in-vehicle networks, " in Proc. Intell. Veh. Symp. (IV), Baden-Baden, Germany, 2011, pp. 1110-1115.
    • (2011) Proc. Intell. Veh. Symp. (IV) , pp. 1110-1115
    • Müter, M.1    Asaj, N.2
  • 5
    • 37149003756 scopus 로고    scopus 로고
    • Exemplary automotive attack scenarios: Trojan horses for electronic throttle control system (ETC), replay attacks on the power window system
    • Wolfsburg, Germany
    • T. Hoppe, S. Kiltz, A. Lang, J. Dittmann, "Exemplary automotive attack scenarios: Trojan horses for electronic throttle control system (ETC), replay attacks on the power window system, " in Proc. Autom. Security VDI-Berichte Nr. VDI/VW Gemeinschaftstagung Autom. Security, Wolfsburg, Germany, 2007, pp. 165-183.
    • (2007) Proc. Autom. Security VDI-Berichte Nr. VDI/VW Gemeinschaftstagung Autom. Security , pp. 165-183
    • Hoppe, T.1    Kiltz, S.2    Lang, A.3    Dittmann, J.4
  • 6
    • 56449111413 scopus 로고    scopus 로고
    • Sniffing/replay attacks on CAN buses: A simulated attack on the electric window lift classified using an adapted cert taxonomy
    • Salzburg, Austria
    • T. Hoppe, J. Dittman, "Sniffing/replay attacks on CAN buses: A simulated attack on the electric window lift classified using an adapted cert taxonomy, " in Proc. 2nd Workshop Embedded Syst. Security (WESS), Salzburg, Austria, 2007, pp. 1-6.
    • (2007) Proc. 2nd Workshop Embedded Syst. Security (WESS) , pp. 1-6
    • Hoppe, T.1    Dittman, J.2
  • 7
    • 85020594705 scopus 로고    scopus 로고
    • N. H. T. S. Administration [Online]. Available
    • N. H. T. S. Administration. (2016). Cybersecurity Best Practices for Modern Vehicles. [Online]. Available: Http://www.nhtsa.gov/About-NHTSA/Press-Releases
    • (2016) Cybersecurity Best Practices for Modern Vehicles
  • 8
    • 84976497403 scopus 로고    scopus 로고
    • Automotive cyber-physical systems: A tutorial introduction
    • Aug.
    • S. Chakraborty, et al., "Automotive cyber-physical systems: A tutorial introduction, " IEEE Des. Test, vol. 33, no. 4, pp. 92-108, Aug. 2016.
    • (2016) IEEE Des. Test , vol.33 , Issue.4 , pp. 92-108
    • Chakraborty, S.1
  • 9
    • 85035749361 scopus 로고    scopus 로고
    • Nissan Motor Company Ltd., Yokohama, Japan [Online]. Available
    • Nissan LEAF Owner's Manual-Section LAN Systems, Nissan Motor Company Ltd., Yokohama, Japan, 2013. [Online]. Available: Https://carmanuals2.com/brand/nissan/leaf-2014-374
    • (2013) Nissan LEAF Owner's Manual-Section LAN Systems
  • 11
    • 77955201139 scopus 로고    scopus 로고
    • Experimental security analysis of a modern automobile
    • Oakland, CA, USA
    • K. Koscher, et al., "Experimental security analysis of a modern automobile, " in Proc. IEEE Symp. Security Privacy (SP), Oakland, CA, USA, 2010, pp. 447-462.
    • (2010) Proc. IEEE Symp. Security Privacy (SP) , pp. 447-462
    • Koscher, K.1
  • 13
    • 84893763875 scopus 로고    scopus 로고
    • A general framework for analysing system properties in platform-based embedded system designs
    • Munich, Germany
    • S. Chakraborty, S. Kunzli, L. Thiele, "A general framework for analysing system properties in platform-based embedded system designs, " in Proc. Conf. Design Autom. Test Europe (DATE), Munich, Germany, 2003, pp. 190-195.
    • (2003) Proc. Conf. Design Autom. Test Europe (DATE) , pp. 190-195
    • Chakraborty, S.1    Kunzli, S.2    Thiele, L.3
  • 18
    • 34247215426 scopus 로고    scopus 로고
    • Comparison of event-triggered, time-triggered concepts with regard to distributed control systems
    • Nuremberg, Germany
    • A. Albert, "Comparison of event-triggered, time-triggered concepts with regard to distributed control systems, " in Proc. Embedded World Conf., Nuremberg, Germany, 2004, pp. 235-252.
    • (2004) Proc. Embedded World Conf. , pp. 235-252
    • Albert, A.1
  • 22
    • 84863551513 scopus 로고    scopus 로고
    • Conforming the runtime inputs for hard real-time embedded systems
    • San Francisco, CA, USA
    • K. Huang, C. Buckl, G. Chen, A. Knoll, "Conforming the runtime inputs for hard real-time embedded systems, " in Proc. Design Autom. Conf. (DAC), San Francisco, CA, USA, 2012, pp. 430-436.
    • (2012) Proc. Design Autom. Conf. (DAC) , pp. 430-436
    • Huang, K.1    Buckl, C.2    Chen, G.3    Knoll, A.4
  • 23
    • 78149359721 scopus 로고    scopus 로고
    • Analytic real-time analysis, timed automata: A hybrid methodology for the performance analysis of embedded real-time systems
    • K. Lampka, S. Perathoner, L. Thiele, "Analytic real-time analysis, timed automata: A hybrid methodology for the performance analysis of embedded real-time systems, " Design Autom. Embedded Syst., vol. 14, no. 3, pp. 193-227, 2010.
    • (2010) Design Autom. Embedded Syst. , vol.14 , Issue.3 , pp. 193-227
    • Lampka, K.1    Perathoner, S.2    Thiele, L.3
  • 25
    • 84943389665 scopus 로고    scopus 로고
    • Gurobi Optimization Inc [Online]Available
    • Gurobi Optimization, Inc. (2015).Gurobi Optimizer Reference Manual. [Online]. Available: Http://www.gurobi.com/
    • (2015) Gurobi Optimizer Reference Manual
  • 28
    • 84877887414 scopus 로고    scopus 로고
    • Security analysis of a cryptographically-enabled RFID device
    • Baltimore MD, USA
    • S. C. Bono, et al., "Security analysis of a cryptographically-enabled RFID device, " in Proc. USENIX Security Symp., vol. 5. Baltimore, MD, USA, 2005, pp. 1-16.
    • (2005) Proc. USENIX Security Symp. , vol.5 , pp. 1-16
    • Bono, S.C.1
  • 29
    • 84962609258 scopus 로고    scopus 로고
    • Historical spectrum sensing data mining for cognitive radio enabled vehicular ad-hoc networks
    • Jan./Feb.
    • X.-L. Huang, et al., "Historical spectrum sensing data mining for cognitive radio enabled vehicular ad-hoc networks, " IEEE Trans. Depend. Secure Comput., vol. 13, no. 1, pp. 59-70, Jan./Feb. 2015.
    • (2015) IEEE Trans. Depend. Secure Comput. , vol.13 , Issue.1 , pp. 59-70
    • Huang, X.-L.1
  • 30
    • 84962599577 scopus 로고    scopus 로고
    • PBA: Prediction-based authentication for vehicle-to-vehicle communications
    • Jan./Feb.
    • C. Lyu, D. Gu, Y. Zeng, P. Mohapatra, "PBA: Prediction-based authentication for vehicle-to-vehicle communications, " IEEE Trans. Depend. Secure Comput., vol. 13, no. 1, pp. 71-83, Jan./Feb. 2016.
    • (2016) IEEE Trans. Depend. Secure Comput. , vol.13 , Issue.1 , pp. 71-83
    • Lyu, C.1    Gu, D.2    Zeng, Y.3    Mohapatra, P.4
  • 35
    • 84924412098 scopus 로고    scopus 로고
    • Security-aware modeling, efficient mapping for CAN-based real-time distributed automotive systems
    • Mar.
    • C.-W. Lin, Q. Zhu, A. Sangiovanni-Vincentelli, "Security-aware modeling, efficient mapping for CAN-based real-time distributed automotive systems, " IEEE Embedded Syst. Lett., vol. 7, no. 1, pp. 11-14, Mar. 2015.
    • (2015) IEEE Embedded Syst. Lett. , vol.7 , Issue.1 , pp. 11-14
    • Lin, C.-W.1    Zhu, Q.2    Sangiovanni-Vincentelli, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.