메뉴 건너뛰기




Volumn , Issue , 2011, Pages 77-92

Comprehensive experimental analyses of automotive attack surfaces

Author keywords

[No Author keywords available]

Indexed keywords

CONTROL SYSTEM SYNTHESIS;

EID: 85061034567     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (1369)

References (28)
  • 1
    • 85076495556 scopus 로고    scopus 로고
    • Hack attacks mounted on car control systems
    • BBC. May 17
    • BBC. Hack attacks mounted on car control systems. BBC News, May 17, 2010. Online: Http://www.bbc.co. uk/news/10119492.
    • (2010) BBC News
  • 2
    • 84877887414 scopus 로고    scopus 로고
    • Security analysis of a cryptographicallyenabled RFID device
    • In P. McDaniel, editor, USENIX Association, July
    • S. Bono, M. Green, A. Stubblefield, A. Juels, A. D. Rubin, and M. Szydlo. Security analysis of a cryptographicallyenabled RFID device. In P. McDaniel, editor, USENIX Security 2005, pages 1-16. USENIX Association, July 2005.
    • (2005) USENIX Security 2005 , pp. 1-16
    • Bono, S.1    Green, M.2    Stubblefield, A.3    Juels, A.4    Rubin, A.D.5    Szydlo, M.6
  • 3
    • 84942471831 scopus 로고    scopus 로고
    • Proof-of-concept CarShark software hacks car computers, shutting down brakes, engines, and more
    • May 14
    • R. Boyle. Proof-of-concept CarShark software hacks car computers, shutting down brakes, engines, and more. Popular Science, May 14, 2010. Online: Http: //www.popsci.com/cars/article/2010-05/researchers-hack-car-computersshutting-down-brakes-engine-and-more.
    • (2010) Popular Science
    • Boyle, R.1
  • 4
    • 33747406625 scopus 로고    scopus 로고
    • CAMP Vehicle Safety Communications Consortium, Mar.
    • CAMP Vehicle Safety Communications Consortium. Vehicle safety communications project task 3 final report, Mar. 2005. Online: Http://www.intellidriveusa. org/documents/vehicle-safety.pdf.
    • (2005) Vehicle Safety Communications Project Task 3 Final Report
  • 6
    • 51849131973 scopus 로고    scopus 로고
    • On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme
    • In D. Wagner, editor, Springer-Verlag, Aug.
    • T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, and M. Manzuri Shalmani. On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme. In D. Wagner, editor, Crypto '08, volume 5157 of LNCS, pages 203-20. Springer-Verlag, Aug. 2008.
    • (2008) Crypto '08, Volume 5157 of LNCS , pp. 203-220
    • Eisenbarth, T.1    Kasper, T.2    Moradi, A.3    Paar, C.4    Salmasizadeh, M.5    Manzuri Shalmani, M.6
  • 9
    • 84872923638 scopus 로고    scopus 로고
    • Relay attacks on passive keyless entry and start systems in modern cars
    • ISOC, Feb.
    • A. Francillon, B. Danev, and S. Capkun. Relay attacks on passive keyless entry and start systems in modern cars. In A. Perrig, editor, NDSS 2011. ISOC, Feb. 2011.
    • (2011) A. Perrig, Editor, NDSS 2011
    • Francillon, A.1    Danev, B.2    Capkun, S.3
  • 10
    • 56449088090 scopus 로고    scopus 로고
    • Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures
    • In M. D. Harrison and M.-A. Sujan, editors, Springer-Verlag, Sept.
    • T. Hoppe, S. Kiltz, and J. Dittmann. Security threats to automotive CAN networks - practical examples and selected short-term countermeasures. In M. D. Harrison and M.-A. Sujan, editors, SAFECOMP 2008, volume 5219 of LNCS, pages 235-248. Springer-Verlag, Sept. 2008.
    • (2008) SAFECOMP 2008, Volume 5219 of LNCS , pp. 235-248
    • Hoppe, T.1    Kiltz, S.2    Dittmann, J.3
  • 15
    • 62849122781 scopus 로고    scopus 로고
    • Securing vehicles against cyber attacks
    • In A. Mili and A. Krings, editors, ACM Press, May
    • U. E. Larson and D. K. Nilsson. Securing vehicles against cyber attacks. In A. Mili and A. Krings, editors, CSIIRW '08, pages 30:1-30:3. ACM Press, May 2008.
    • (2008) CSIIRW '08 , pp. 301-303
    • Larson, U.E.1    Nilsson, D.K.2
  • 16
    • 85076478822 scopus 로고    scopus 로고
    • Boffins warn on car computer security risk
    • May 14
    • J. Leyden. Boffins warn on car computer security risk. The Register, May 14, 2010. Online: Http://www.theregister.co.uk/2010/05/ 14/car_security_risks/.
    • (2010) The Register
    • Leyden, J.1
  • 18
    • 1642278044 scopus 로고    scopus 로고
    • Stung by security flaws, Microsoft makes software safety a top goal
    • Jan.
    • J. Markoff. Stung by security flaws, Microsoft makes software safety a top goal. The New York Times, Jan. 2002.
    • (2002) The New York Times
    • Markoff, J.1
  • 19
    • 33645400412 scopus 로고    scopus 로고
    • Oct.
    • C. Mundie. Trustworthy computing. Online: Http: //download.microsoft.com/download/ a/f/2/af22fd56-7f19-47aa-8167-4b1d73cd3c57/twc_mundie.doc, Oct. 2002.
    • (2002) Trustworthy Computing
    • Mundie, C.1
  • 21
  • 22
    • 85040565418 scopus 로고    scopus 로고
    • Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
    • In I. Goldberg, editor, USENIX Association, Aug.
    • I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In I. Goldberg, editor, USENIX Security 2010, pages 323-338. USENIX Association, Aug. 2010.
    • (2010) USENIX Security 2010 , pp. 323-338
    • Rouf, I.1    Miller, R.2    Mustafa, H.3    Taylor, T.4    Oh, S.5    Xu, W.6    Gruteser, M.7    Trappe, W.8    Seskar, I.9
  • 23
    • 85084164108 scopus 로고    scopus 로고
    • Bluesniff: Eve meets alice and bluetooth
    • In D. Boneh, T. Garfinkel, and D. Song, editors, USENIX Association
    • D. Spill and A. Bittau. Bluesniff: Eve meets alice and bluetooth. In D. Boneh, T. Garfinkel, and D. Song, editors, WOOT 2007, pages 1-10. USENIX Association, 2007.
    • (2007) WOOT 2007 , pp. 1-10
    • Spill, D.1    Bittau, A.2
  • 24
    • 77955207434 scopus 로고    scopus 로고
    • A spy under the hood: Controlling risk and automotive EDR
    • Feb.
    • P. R. Thorn and C. A. MacCarley. A spy under the hood: Controlling risk and automotive EDR. Risk Management, Feb. 2008.
    • (2008) Risk Management
    • Thorn, P.R.1    MacCarley, C.A.2
  • 25
    • 85076485248 scopus 로고    scopus 로고
    • Update: Android gaming app hides Trojan, security vendors warn
    • Aug. 17
    • J. Vijayan. Update: Android gaming app hides Trojan, security vendors warn. Computerworld, Aug. 17, 2010. Online: Http://www.computerworld.com/s/ article/9180844/Update_Android_gaming_ app_hides_Trojan_security_vendors_ warn.
    • (2010) Computerworld
    • Vijayan, J.1
  • 26
    • 70449821045 scopus 로고    scopus 로고
    • Security in automotive bus systems
    • In C. Paar, editor, Nov.
    • M. Wolf, A. Weimerskirch, and C. Paar. Security in automotive bus systems. In C. Paar, editor, ESCAR 2004, Nov. 2004.
    • (2004) ESCAR 2004
    • Wolf, M.1    Weimerskirch, A.2    Paar, C.3
  • 28
    • 0036199902 scopus 로고    scopus 로고
    • Telematics: Safe and fun driving
    • Jan./Feb.
    • Y. Zhao. Telematics: Safe and fun driving. Intelligent Systems, IEEE, 17(1):10-14, Jan./Feb. 2002.
    • (2002) Intelligent Systems, IEEE , vol.17 , Issue.1 , pp. 10-14
    • Zhao, Y.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.