-
1
-
-
56449088090
-
Security threats to automotive CAN networks-Practical examples, selected short-term countermeasures
-
Heidelberg, Germany: Springer
-
T. Hoppe, S. Kiltz, J. Dittmann, "Security threats to automotive CAN networks-Practical examples, selected short-term countermeasures, " in Computer Safety, Reliability, Security. Heidelberg, Germany: Springer, 2008, pp. 235-248.
-
(2008)
Computer Safety, Reliability, Security
, pp. 235-248
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
2
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
San Francisco, CA, USA
-
S. Checkoway, et al., "Comprehensive experimental analyses of automotive attack surfaces, " in Proc. USENIX Security Symp., San Francisco, CA, USA, 2011, p. 6.
-
(2011)
Proc. USENIX Security Symp.
, pp. 6
-
-
Checkoway, S.1
-
3
-
-
84885584568
-
Security challenges in automotive hardware/software architecture design
-
Grenoble, France
-
F. Sagstetter, et al., "Security challenges in automotive hardware/software architecture design, " in Proc. Conf. Design Autom. Test Europe (DATE), Grenoble, France, 2013, pp. 458-463.
-
(2013)
Proc. Conf. Design Autom. Test Europe (DATE)
, pp. 458-463
-
-
Sagstetter, F.1
-
4
-
-
79960791793
-
Entropy-based anomaly detection for in-vehicle networks
-
Baden-Baden, Germany
-
M. Müter, N. Asaj, "Entropy-based anomaly detection for in-vehicle networks, " in Proc. Intell. Veh. Symp. (IV), Baden-Baden, Germany, 2011, pp. 1110-1115.
-
(2011)
Proc. Intell. Veh. Symp. (IV)
, pp. 1110-1115
-
-
Müter, M.1
Asaj, N.2
-
5
-
-
37149003756
-
Exemplary automotive attack scenarios: Trojan horses for electronic throttle control system (ETC), replay attacks on the power window system
-
Wolfsburg, Germany
-
T. Hoppe, S. Kiltz, A. Lang, J. Dittmann, "Exemplary automotive attack scenarios: Trojan horses for electronic throttle control system (ETC), replay attacks on the power window system, " in Proc. Autom. Security VDI-Berichte Nr. VDI/VW Gemeinschaftstagung Autom. Security, Wolfsburg, Germany, 2007, pp. 165-183.
-
(2007)
Proc. Autom. Security VDI-Berichte Nr. VDI/VW Gemeinschaftstagung Autom. Security
, pp. 165-183
-
-
Hoppe, T.1
Kiltz, S.2
Lang, A.3
Dittmann, J.4
-
6
-
-
56449111413
-
Sniffing/replay attacks on CAN buses: A simulated attack on the electric window lift classified using an adapted cert taxonomy
-
Salzburg, Austria
-
T. Hoppe, J. Dittman, "Sniffing/replay attacks on CAN buses: A simulated attack on the electric window lift classified using an adapted cert taxonomy, " in Proc. 2nd Workshop Embedded Syst. Security (WESS), Salzburg, Austria, 2007, pp. 1-6.
-
(2007)
Proc. 2nd Workshop Embedded Syst. Security (WESS)
, pp. 1-6
-
-
Hoppe, T.1
Dittman, J.2
-
7
-
-
85020594705
-
-
N. H. T. S. Administration [Online]. Available
-
N. H. T. S. Administration. (2016). Cybersecurity Best Practices for Modern Vehicles. [Online]. Available: Http://www.nhtsa.gov/About-NHTSA/Press-Releases
-
(2016)
Cybersecurity Best Practices for Modern Vehicles
-
-
-
8
-
-
84976497403
-
Automotive cyber-physical systems: A tutorial introduction
-
Aug.
-
S. Chakraborty, et al., "Automotive cyber-physical systems: A tutorial introduction, " IEEE Des. Test, vol. 33, no. 4, pp. 92-108, Aug. 2016.
-
(2016)
IEEE Des. Test
, vol.33
, Issue.4
, pp. 92-108
-
-
Chakraborty, S.1
-
9
-
-
85035749361
-
-
Nissan Motor Company Ltd., Yokohama, Japan [Online]. Available
-
Nissan LEAF Owner's Manual-Section LAN Systems, Nissan Motor Company Ltd., Yokohama, Japan, 2013. [Online]. Available: Https://carmanuals2.com/brand/nissan/leaf-2014-374
-
(2013)
Nissan LEAF Owner's Manual-Section LAN Systems
-
-
-
11
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
Oakland, CA, USA
-
K. Koscher, et al., "Experimental security analysis of a modern automobile, " in Proc. IEEE Symp. Security Privacy (SP), Oakland, CA, USA, 2010, pp. 447-462.
-
(2010)
Proc. IEEE Symp. Security Privacy (SP)
, pp. 447-462
-
-
Koscher, K.1
-
12
-
-
84892657849
-
Delay bounds for CAN communication in automotive applications
-
Dortmund, Germany
-
U. Klehmet, T. Herpel, K.-S. Hielscher, R. German, "Delay bounds for CAN communication in automotive applications, " in Proc. Conf. Meas. Model. Eval. Comput. Commun. Syst. (MMB), Dortmund, Germany, 2008, pp. 1-15.
-
(2008)
Proc. Conf. Meas. Model. Eval. Comput. Commun. Syst. (MMB)
, pp. 1-15
-
-
Klehmet, U.1
Herpel, T.2
Hielscher, K.-S.3
German, R.4
-
13
-
-
84893763875
-
A general framework for analysing system properties in platform-based embedded system designs
-
Munich, Germany
-
S. Chakraborty, S. Kunzli, L. Thiele, "A general framework for analysing system properties in platform-based embedded system designs, " in Proc. Conf. Design Autom. Test Europe (DATE), Munich, Germany, 2003, pp. 190-195.
-
(2003)
Proc. Conf. Design Autom. Test Europe (DATE)
, pp. 190-195
-
-
Chakraborty, S.1
Kunzli, S.2
Thiele, L.3
-
14
-
-
84892653121
-
Generating event traces based on arrival curves
-
Nuremberg, Germany
-
S. Kuenzli, L. Thiele, "Generating event traces based on arrival curves, " in Proc. Conf. Meas. Modelling, Eval. Comput. Commun. Syst. (MMB), Nuremberg, Germany, 2006, pp. 1-18.
-
(2006)
Proc. Conf. Meas. Modelling, Eval. Comput. Commun. Syst. (MMB)
, pp. 1-18
-
-
Kuenzli, S.1
Thiele, L.2
-
15
-
-
84944045478
-
Scheduling periodic task systems to minimize output jitter
-
S. Baruah, G. Buttazzo, S. Gorinsky, G. Lipari, "Scheduling periodic task systems to minimize output jitter, " in Proc. Int. Conf. Real Time Comput. Syst. Appl. (RTCSA), Hong Kong, 1999, pp. 62-69.
-
(1999)
Proc. Int. Conf. Real Time Comput. Syst. Appl. (RTCSA), Hong Kong
, pp. 62-69
-
-
Baruah, S.1
Buttazzo, G.2
Gorinsky, S.3
Lipari, G.4
-
16
-
-
84884305237
-
Minimizing CAN responsetime jitter by message manipulation
-
San Jose, CA, USA
-
T. Nolte, H. Hansson, C. Norstrom, "Minimizing CAN responsetime jitter by message manipulation, " in Proc. IEEE Real Time Embedded Technol. Appl. Symp. (RTAS), San Jose, CA, USA, 2002, pp. 197-206.
-
(2002)
Proc. IEEE Real Time Embedded Technol. Appl. Symp. (RTAS)
, pp. 197-206
-
-
Nolte, T.1
Hansson, H.2
Norstrom, C.3
-
17
-
-
85010388906
-
-
ETH at Zurich, Zürich, Switzerland, Tech. Rep.
-
U. Suppiger, S. Perathoner, K. Lampka, L. Thiele, "A simple approximation method for reducing the complexity of modular performance analysis, " ETH at Zurich, Zürich, Switzerland, Tech. Rep. 329, 2010.
-
(2010)
A Simple Approximation Method for Reducing the Complexity of Modular Performance Analysis
, vol.329
-
-
Suppiger, U.1
Perathoner, S.2
Lampka, K.3
Thiele, L.4
-
18
-
-
34247215426
-
Comparison of event-triggered, time-triggered concepts with regard to distributed control systems
-
Nuremberg, Germany
-
A. Albert, "Comparison of event-triggered, time-triggered concepts with regard to distributed control systems, " in Proc. Embedded World Conf., Nuremberg, Germany, 2004, pp. 235-252.
-
(2004)
Proc. Embedded World Conf.
, pp. 235-252
-
-
Albert, A.1
-
19
-
-
84944128120
-
Security analysis of automotive architectures using probabilistic model checking
-
San Francisco, CA, USA
-
P. Mundhenk, S. Steinhorst, M. Lukasiewycz, S. A. Fahmy, S. Chakraborty, "Security analysis of automotive architectures using probabilistic model checking, " in Proc. Design Autom. Conf. (DAC), San Francisco, CA, USA, 2015, pp. 1-6.
-
(2015)
Proc. Design Autom. Conf. (DAC)
, pp. 1-6
-
-
Mundhenk, P.1
Steinhorst, S.2
Lukasiewycz, M.3
Fahmy, S.A.4
Chakraborty, S.5
-
20
-
-
84963649795
-
Decentralized diagnosis of permanent faults in automotive E/E architectures
-
P. Waszecki, M. Lukasiewycz, S. Chakraborty, "Decentralized diagnosis of permanent faults in automotive E/E architectures, " in Proc. Int. Conf. Embedded Comput. Syst. Archit. Model. Simulat. (SAMOS), 2015, pp. 189-196.
-
(2015)
Proc. Int. Conf. Embedded Comput. Syst. Archit. Model. Simulat. (SAMOS)
, pp. 189-196
-
-
Waszecki, P.1
Lukasiewycz, M.2
Chakraborty, S.3
-
22
-
-
84863551513
-
Conforming the runtime inputs for hard real-time embedded systems
-
San Francisco, CA, USA
-
K. Huang, C. Buckl, G. Chen, A. Knoll, "Conforming the runtime inputs for hard real-time embedded systems, " in Proc. Design Autom. Conf. (DAC), San Francisco, CA, USA, 2012, pp. 430-436.
-
(2012)
Proc. Design Autom. Conf. (DAC)
, pp. 430-436
-
-
Huang, K.1
Buckl, C.2
Chen, G.3
Knoll, A.4
-
23
-
-
78149359721
-
Analytic real-time analysis, timed automata: A hybrid methodology for the performance analysis of embedded real-time systems
-
K. Lampka, S. Perathoner, L. Thiele, "Analytic real-time analysis, timed automata: A hybrid methodology for the performance analysis of embedded real-time systems, " Design Autom. Embedded Syst., vol. 14, no. 3, pp. 193-227, 2010.
-
(2010)
Design Autom. Embedded Syst.
, vol.14
, Issue.3
, pp. 193-227
-
-
Lampka, K.1
Perathoner, S.2
Thiele, L.3
-
25
-
-
84943389665
-
-
Gurobi Optimization Inc [Online]Available
-
Gurobi Optimization, Inc. (2015).Gurobi Optimizer Reference Manual. [Online]. Available: Http://www.gurobi.com/
-
(2015)
Gurobi Optimizer Reference Manual
-
-
-
26
-
-
84885675723
-
Priority assignment for event-triggered systems using mathematical programming
-
Grenoble, France
-
M. Lukasiewycz, S. Steinhorst, S. Chakraborty, "Priority assignment for event-triggered systems using mathematical programming, " in Proc. Conf. Design Autom. Test Europe (DATE), Grenoble, France, 2013, pp. 982-987.
-
(2013)
Proc. Conf. Design Autom. Test Europe (DATE)
, pp. 982-987
-
-
Lukasiewycz, M.1
Steinhorst, S.2
Chakraborty, S.3
-
27
-
-
85019470373
-
Likelihood of threats to connected vehicles
-
L. B. Othmane, R. Fernando, R. Ranchal, B. Bhargava, E. Bodden, "Likelihood of threats to connected vehicles, " Int. J. Next Gener. Comput., vol. 5, no. 3, pp. 290-303, 2014.
-
(2014)
Int. J. Next Gener. Comput.
, vol.5
, Issue.3
, pp. 290-303
-
-
Othmane, L.B.1
Fernando, R.2
Ranchal, R.3
Bhargava, B.4
Bodden, E.5
-
28
-
-
84877887414
-
Security analysis of a cryptographically-enabled RFID device
-
Baltimore MD, USA
-
S. C. Bono, et al., "Security analysis of a cryptographically-enabled RFID device, " in Proc. USENIX Security Symp., vol. 5. Baltimore, MD, USA, 2005, pp. 1-16.
-
(2005)
Proc. USENIX Security Symp.
, vol.5
, pp. 1-16
-
-
Bono, S.C.1
-
29
-
-
84962609258
-
Historical spectrum sensing data mining for cognitive radio enabled vehicular ad-hoc networks
-
Jan./Feb.
-
X.-L. Huang, et al., "Historical spectrum sensing data mining for cognitive radio enabled vehicular ad-hoc networks, " IEEE Trans. Depend. Secure Comput., vol. 13, no. 1, pp. 59-70, Jan./Feb. 2015.
-
(2015)
IEEE Trans. Depend. Secure Comput.
, vol.13
, Issue.1
, pp. 59-70
-
-
Huang, X.-L.1
-
30
-
-
84962599577
-
PBA: Prediction-based authentication for vehicle-to-vehicle communications
-
Jan./Feb.
-
C. Lyu, D. Gu, Y. Zeng, P. Mohapatra, "PBA: Prediction-based authentication for vehicle-to-vehicle communications, " IEEE Trans. Depend. Secure Comput., vol. 13, no. 1, pp. 71-83, Jan./Feb. 2016.
-
(2016)
IEEE Trans. Depend. Secure Comput.
, vol.13
, Issue.1
, pp. 71-83
-
-
Lyu, C.1
Gu, D.2
Zeng, Y.3
Mohapatra, P.4
-
31
-
-
80052893572
-
On the performance of secure vehicular communication systems
-
Nov./Dec.
-
G. Calandriello, P. Papadimitratos, J.-P. Hubaux, A. Lioy, "On the performance of secure vehicular communication systems, " IEEE Trans. Depend. Secure Comput., vol. 8, no. 6, pp. 898-912, Nov./Dec. 2011.
-
(2011)
IEEE Trans. Depend. Secure Comput.
, vol.8
, Issue.6
, pp. 898-912
-
-
Calandriello, G.1
Papadimitratos, P.2
Hubaux, J.-P.3
Lioy, A.4
-
32
-
-
84962491845
-
Securing vehicular IPv6 communications
-
Jan./Feb.
-
P. J. Fernández, J. Santa, F. Bernal, A. F. Gomez-Skarmeta, "Securing vehicular IPv6 communications, " IEEE Trans. Depend. Secure Comput., vol. 13, no. 1, pp. 46-58, Jan./Feb. 2016.
-
(2016)
IEEE Trans. Depend. Secure Comput.
, vol.13
, Issue.1
, pp. 46-58
-
-
Fernández, P.J.1
Santa, J.2
Bernal, F.3
Gomez-Skarmeta, A.F.4
-
33
-
-
84922641849
-
Integrating the security aspect into design space exploration of embedded systems
-
Naples, Italy
-
I. Stierand, S. Malipatlolla, S. Fröschle, A. Stühring, S. Henkler, "Integrating the security aspect into design space exploration of embedded systems, " in Proc. Int. Symp. Softw. Rel. Eng. Workshops (ISSREW), Naples, Italy, 2014, pp. 371-376.
-
(2014)
Proc. Int. Symp. Softw. Rel. Eng. Workshops (ISSREW)
, pp. 371-376
-
-
Stierand, I.1
Malipatlolla, S.2
Fröschle, S.3
Stühring, A.4
Henkler, S.5
-
34
-
-
84893388821
-
Security-aware mapping for CAN-based real-time distributed automotive systems
-
San Jose, CA, USA
-
C.-W. Lin, Q. Zhu, C. Phung, A. Sangiovanni-Vincentelli, "Security-aware mapping for CAN-based real-time distributed automotive systems, " in Proc. Int. Conf. Comput.-Aided Design (ICCAD), San Jose, CA, USA, 2013, pp. 115-121.
-
(2013)
Proc. Int. Conf. Comput.-Aided Design (ICCAD)
, pp. 115-121
-
-
Lin, C.-W.1
Zhu, Q.2
Phung, C.3
Sangiovanni-Vincentelli, A.4
-
35
-
-
84924412098
-
Security-aware modeling, efficient mapping for CAN-based real-time distributed automotive systems
-
Mar.
-
C.-W. Lin, Q. Zhu, A. Sangiovanni-Vincentelli, "Security-aware modeling, efficient mapping for CAN-based real-time distributed automotive systems, " IEEE Embedded Syst. Lett., vol. 7, no. 1, pp. 11-14, Mar. 2015.
-
(2015)
IEEE Embedded Syst. Lett.
, vol.7
, Issue.1
, pp. 11-14
-
-
Lin, C.-W.1
Zhu, Q.2
Sangiovanni-Vincentelli, A.3
-
36
-
-
84903848012
-
SAFE: Security-aware FlexRay scheduling engine
-
Dresden, Germany
-
G. Han, H. Zeng, Y. Li, W. Dou, "SAFE: Security-aware FlexRay scheduling engine, " in Proc. Conf. Design Autom. Test Europe (DATE), Dresden, Germany, 2014, pp. 1-4.
-
(2014)
Proc. Conf. Design Autom. Test Europe (DATE)
, pp. 1-4
-
-
Han, G.1
Zeng, H.2
Li, Y.3
Dou, W.4
-
37
-
-
78349261255
-
A structured approach to anomaly detection for in-vehicle networks
-
Atlanta, GA, USA
-
M. Müter, A. Groll, F. C. Freiling, "A structured approach to anomaly detection for in-vehicle networks, " in Proc. Int. Conf. Inf. Assurance Security (IAS), Atlanta, GA, USA, 2010, pp. 92-98.
-
(2010)
Proc. Int. Conf. Inf. Assurance Security (IAS)
, pp. 92-98
-
-
Müter, M.1
Groll, A.2
Freiling, F.C.3
-
38
-
-
84961720069
-
A consensus based network intrusion detection system
-
Kuala Lumpur, Malaysia
-
M. Toulouse, B. Q. Minh, P. Curtis, "A consensus based network intrusion detection system, " in Proc. IT Int. Conf. Converg. Security (ICITCS), Kuala Lumpur, Malaysia, 2015, pp. 1-6.
-
(2015)
Proc. IT Int. Conf. Converg. Security (ICITCS)
, pp. 1-6
-
-
Toulouse, M.1
Minh, B.Q.2
Curtis, P.3
|