-
1
-
-
85076495556
-
Hack attacks mounted on car control systems
-
BBC. May 17
-
BBC. Hack attacks mounted on car control systems. BBC News, May 17, 2010. Online: Http://www.bbc.co. uk/news/10119492.
-
(2010)
BBC News
-
-
-
2
-
-
84877887414
-
Security analysis of a cryptographicallyenabled RFID device
-
In P. McDaniel, editor, USENIX Association, July
-
S. Bono, M. Green, A. Stubblefield, A. Juels, A. D. Rubin, and M. Szydlo. Security analysis of a cryptographicallyenabled RFID device. In P. McDaniel, editor, USENIX Security 2005, pages 1-16. USENIX Association, July 2005.
-
(2005)
USENIX Security 2005
, pp. 1-16
-
-
Bono, S.1
Green, M.2
Stubblefield, A.3
Juels, A.4
Rubin, A.D.5
Szydlo, M.6
-
3
-
-
84942471831
-
Proof-of-concept CarShark software hacks car computers, shutting down brakes, engines, and more
-
May 14
-
R. Boyle. Proof-of-concept CarShark software hacks car computers, shutting down brakes, engines, and more. Popular Science, May 14, 2010. Online: Http: //www.popsci.com/cars/article/2010-05/researchers-hack-car-computersshutting-down-brakes-engine-and-more.
-
(2010)
Popular Science
-
-
Boyle, R.1
-
4
-
-
33747406625
-
-
CAMP Vehicle Safety Communications Consortium, Mar.
-
CAMP Vehicle Safety Communications Consortium. Vehicle safety communications project task 3 final report, Mar. 2005. Online: Http://www.intellidriveusa. org/documents/vehicle-safety.pdf.
-
(2005)
Vehicle Safety Communications Project Task 3 Final Report
-
-
-
6
-
-
51849131973
-
On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme
-
In D. Wagner, editor, Springer-Verlag, Aug.
-
T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, and M. Manzuri Shalmani. On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme. In D. Wagner, editor, Crypto '08, volume 5157 of LNCS, pages 203-20. Springer-Verlag, Aug. 2008.
-
(2008)
Crypto '08, Volume 5157 of LNCS
, pp. 203-220
-
-
Eisenbarth, T.1
Kasper, T.2
Moradi, A.3
Paar, C.4
Salmasizadeh, M.5
Manzuri Shalmani, M.6
-
9
-
-
84872923638
-
Relay attacks on passive keyless entry and start systems in modern cars
-
ISOC, Feb.
-
A. Francillon, B. Danev, and S. Capkun. Relay attacks on passive keyless entry and start systems in modern cars. In A. Perrig, editor, NDSS 2011. ISOC, Feb. 2011.
-
(2011)
A. Perrig, Editor, NDSS 2011
-
-
Francillon, A.1
Danev, B.2
Capkun, S.3
-
10
-
-
56449088090
-
Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures
-
In M. D. Harrison and M.-A. Sujan, editors, Springer-Verlag, Sept.
-
T. Hoppe, S. Kiltz, and J. Dittmann. Security threats to automotive CAN networks - practical examples and selected short-term countermeasures. In M. D. Harrison and M.-A. Sujan, editors, SAFECOMP 2008, volume 5219 of LNCS, pages 235-248. Springer-Verlag, Sept. 2008.
-
(2008)
SAFECOMP 2008, Volume 5219 of LNCS
, pp. 235-248
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
11
-
-
44449126213
-
A practical attack on KeeLoq
-
In N. Smart, editor, Springer-Verlag, Apr.
-
S. Indesteege, N. Keller, O. Dunkelman, E. Biham, and B. Preneel. A practical attack on KeeLoq. In N. Smart, editor, Eurocrypt '08, volume 4965 of LNCS, pages 1-18. Springer-Verlag, Apr. 2008.
-
(2008)
Eurocrypt '08, Volume 4965 of LNCS
, pp. 1-18
-
-
Indesteege, S.1
Keller, N.2
Dunkelman, O.3
Biham, E.4
Preneel, B.5
-
13
-
-
57449086537
-
Secure vehicular communication systems: Implementation, performance, and research challenges
-
F. Kargl, P. Papadimitratos, L. Buttyan, M. Müter, E. Schoch, B. Wiedersheim, T.-V. Thong, G. Calandriello, A. Held, A. Kung, and J.-P. Hubaux. Secure vehicular communication systems: Implementation, performance, and research challenges. IEEE CommunicationsMagazine, 46(11):110-118, 2008.
-
(2008)
IEEE CommunicationsMagazine
, vol.46
, Issue.11
, pp. 110-118
-
-
Kargl, F.1
Papadimitratos, P.2
Buttyan, L.3
Müter, M.4
Schoch, E.5
Wiedersheim, B.6
Thong, T.-V.7
Calandriello, G.8
Held, A.9
Kung, A.10
Hubaux, J.-P.11
-
14
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
IEEE Computer Society, May
-
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. Experimental security analysis of a modern automobile. In D. Evans and G. Vigna, editors, IEEE Symposium on Security and Privacy. IEEE Computer Society, May 2010.
-
(2010)
D. Evans and G. Vigna, Editors, IEEE Symposium on Security and Privacy
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
15
-
-
62849122781
-
Securing vehicles against cyber attacks
-
In A. Mili and A. Krings, editors, ACM Press, May
-
U. E. Larson and D. K. Nilsson. Securing vehicles against cyber attacks. In A. Mili and A. Krings, editors, CSIIRW '08, pages 30:1-30:3. ACM Press, May 2008.
-
(2008)
CSIIRW '08
, pp. 301-303
-
-
Larson, U.E.1
Nilsson, D.K.2
-
16
-
-
85076478822
-
Boffins warn on car computer security risk
-
May 14
-
J. Leyden. Boffins warn on car computer security risk. The Register, May 14, 2010. Online: Http://www.theregister.co.uk/2010/05/ 14/car_security_risks/.
-
(2010)
The Register
-
-
Leyden, J.1
-
18
-
-
1642278044
-
Stung by security flaws, Microsoft makes software safety a top goal
-
Jan.
-
J. Markoff. Stung by security flaws, Microsoft makes software safety a top goal. The New York Times, Jan. 2002.
-
(2002)
The New York Times
-
-
Markoff, J.1
-
19
-
-
33645400412
-
-
Oct.
-
C. Mundie. Trustworthy computing. Online: Http: //download.microsoft.com/download/ a/f/2/af22fd56-7f19-47aa-8167-4b1d73cd3c57/twc_mundie.doc, Oct. 2002.
-
(2002)
Trustworthy Computing
-
-
Mundie, C.1
-
22
-
-
85040565418
-
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study
-
In I. Goldberg, editor, USENIX Association, Aug.
-
I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, M. Gruteser, W. Trappe, and I. Seskar. Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study. In I. Goldberg, editor, USENIX Security 2010, pages 323-338. USENIX Association, Aug. 2010.
-
(2010)
USENIX Security 2010
, pp. 323-338
-
-
Rouf, I.1
Miller, R.2
Mustafa, H.3
Taylor, T.4
Oh, S.5
Xu, W.6
Gruteser, M.7
Trappe, W.8
Seskar, I.9
-
23
-
-
85084164108
-
Bluesniff: Eve meets alice and bluetooth
-
In D. Boneh, T. Garfinkel, and D. Song, editors, USENIX Association
-
D. Spill and A. Bittau. Bluesniff: Eve meets alice and bluetooth. In D. Boneh, T. Garfinkel, and D. Song, editors, WOOT 2007, pages 1-10. USENIX Association, 2007.
-
(2007)
WOOT 2007
, pp. 1-10
-
-
Spill, D.1
Bittau, A.2
-
24
-
-
77955207434
-
A spy under the hood: Controlling risk and automotive EDR
-
Feb.
-
P. R. Thorn and C. A. MacCarley. A spy under the hood: Controlling risk and automotive EDR. Risk Management, Feb. 2008.
-
(2008)
Risk Management
-
-
Thorn, P.R.1
MacCarley, C.A.2
-
25
-
-
85076485248
-
Update: Android gaming app hides Trojan, security vendors warn
-
Aug. 17
-
J. Vijayan. Update: Android gaming app hides Trojan, security vendors warn. Computerworld, Aug. 17, 2010. Online: Http://www.computerworld.com/s/ article/9180844/Update_Android_gaming_ app_hides_Trojan_security_vendors_ warn.
-
(2010)
Computerworld
-
-
Vijayan, J.1
-
26
-
-
70449821045
-
Security in automotive bus systems
-
In C. Paar, editor, Nov.
-
M. Wolf, A. Weimerskirch, and C. Paar. Security in automotive bus systems. In C. Paar, editor, ESCAR 2004, Nov. 2004.
-
(2004)
ESCAR 2004
-
-
Wolf, M.1
Weimerskirch, A.2
Paar, C.3
-
28
-
-
0036199902
-
Telematics: Safe and fun driving
-
Jan./Feb.
-
Y. Zhao. Telematics: Safe and fun driving. Intelligent Systems, IEEE, 17(1):10-14, Jan./Feb. 2002.
-
(2002)
Intelligent Systems, IEEE
, vol.17
, Issue.1
, pp. 10-14
-
-
Zhao, Y.1
|