-
9
-
-
85061034567
-
Comprehensive experimental analyses of automotive attack surfaces
-
CHECKOWAY, S., MCCOY, D., KANTOR, B., ANDERSON, D., SHACHAM, H., SAVAGE, S., KOSCHER, K., CZESKIS, A., ROESNER, F., AND KOHNO, T. Comprehensive Experimental Analyses of Automotive Attack Surfaces. In USENIX Security (2011).
-
(2011)
USENIX Security
-
-
Checkoway, S.1
McCoy, D.2
Kantor, B.3
Anderson, D.4
Shacham, H.5
Savage, S.6
Koscher, K.7
Czeskis, A.8
Roesner, F.9
Kohno, T.10
-
10
-
-
84954175333
-
CPS approach to checking norm operation of a brake-by-wire system
-
CHO, K. T., PARK, T., AND SHIN, K. G. CPS Approach to Checking Norm Operation of a Brake-by-Wire System. In ICCPS (2015).
-
(2015)
ICCPS
-
-
Cho, K.T.1
Park, T.2
Shin, K.G.3
-
11
-
-
85072507054
-
Analysis of critical speed yaw scuffs using spiral curves
-
DAILY, J. Analysis of critical speed yaw scuffs using spiral curves. In SAE Technical Paper 2012-01-0606 (2012).
-
(2012)
SAE Technical Paper 2012-01-0606
-
-
Daily, J.1
-
12
-
-
80052981982
-
Controller area network (can) schedulability analysis with fifo queues
-
DAVIS, R., KOLLMANN, S., POLLEX, V., AND SLOMKA, F. Controller area network (can) schedulability analysis with fifo queues. ECRTS (2011).
-
(2011)
ECRTS
-
-
Davis, R.1
Kollmann, S.2
Pollex, V.3
Slomka, F.4
-
13
-
-
85084164330
-
Fast and vulnerable: A story of telematic failures
-
FOSTER, I., PRUDHOMME, A., KOSCHER, K., AND SAVAGE, S. Fast and Vulnerable: A Story of Telematic Failures. In WOOT (2015).
-
(2015)
WOOT
-
-
Foster, I.1
Prudhomme, A.2
Koscher, K.3
Savage, S.4
-
15
-
-
84901675634
-
Canauth - A simple, backward compatible broadcast authentication protocol for can bus
-
HERREWEGE, A., SINGELEE, D., AND VERBAUWHEDE, I. Canauth - a simple, backward compatible broadcast authentication protocol for can bus. In ECRYPT Workshop on Lightweight Cryptography (2011).
-
(2011)
ECRYPT Workshop on Lightweight Cryptography
-
-
Herrewege, A.1
Singelee, D.2
Verbauwhede, I.3
-
16
-
-
78649321196
-
Security threats to automotive can networks - Practical examples and selected short-term countermeasures
-
Jan
-
HOPPE, T., KILTZ, S., AND DITTMANN, J. Security threats to automotive can networks - practical examples and selected short-term countermeasures. In Reliability Engineering and System Safety (Jan. 2011).
-
(2011)
Reliability Engineering and System Safety
-
-
Hoppe, T.1
Kiltz, S.2
Dittmann, J.3
-
17
-
-
60349083720
-
On fast and accurate detection of unauthorized wireless access points using clock skews
-
JANA, S., AND KASERA, S. K. On fast and accurate detection of unauthorized wireless access points using clock skews. In ACM MobiCom (2008).
-
(2008)
ACM MobiCom
-
-
Jana, S.1
Kasera, S.K.2
-
18
-
-
77957573198
-
Integrating hardware limitations in can scbedulability analysis
-
May
-
KHAN, D., BRIL, R., AND NAVET, N. Integrating hardware limitations in can scbedulability analysis. In WFCS (May. 2010).
-
(2010)
WFCS
-
-
Khan, D.1
Bril, R.2
Navet, N.3
-
20
-
-
77955201139
-
Experimental security analysis of a modern automobile
-
KOSCHER, K., CZESKIS, A., ROESNER, F., PATEL, S., KOHNO, T., CHECKOWAY, S., MCCOY, D., KANTOR, B., ANDERSON, D., SHACHAM, H., AND SAVAGE, S. Experimental security analysis of a modern automobile. In IEEE Security and Privacy (2010).
-
(2010)
IEEE Security and Privacy
-
-
Koscher, K.1
Czeskis, A.2
Roesner, F.3
Patel, S.4
Kohno, T.5
Checkoway, S.6
McCoy, D.7
Kantor, B.8
Anderson, D.9
Shacham, H.10
Savage, S.11
-
22
-
-
51549083617
-
An investigation of the clique problem in flexray
-
MILBREDT, P., HORAUER, M., AND STEININGER, A. An investigation of the clique problem in flexray. SIES (2008).
-
(2008)
SIES
-
-
Milbredt, P.1
Horauer, M.2
Steininger, A.3
-
23
-
-
84901675643
-
Adventures in automotive networks and control units
-
MILLER, C., AND VALASEK, C. Adventures in automotive networks and control units. Defcon 21 (2013).
-
(2013)
Defcon
, vol.21
-
-
Miller, C.1
Valasek, C.2
-
24
-
-
84929768227
-
A survey of remote automotive attack surfaces
-
MILLER, C., AND VALASEK, C. A survey of remote automotive attack surfaces. Black Hat USA (2014).
-
(2014)
Black Hat USA
-
-
Miller, C.1
Valasek, C.2
-
25
-
-
84964764354
-
Remote exploitation of an unaltered passenger vehicle
-
MILLER, C., AND VALASEK, C. Remote exploitation of an unaltered passenger vehicle. Black Hat USA (2015).
-
(2015)
Black Hat USA
-
-
Miller, C.1
Valasek, C.2
-
26
-
-
0003871309
-
Network time protocol: Specification, implemenation, and analysis
-
MILLS, D. L. Network time protocol: Specification, implemenation, and analysis. RFC 1305.
-
RFC 1305
-
-
Mills, D.L.1
-
27
-
-
51549088024
-
Model checking based analysis of end-to-end latency in embedded, real-time systems with clock drifts
-
MOHALIK, S., RAJEEV, A. C., DIXIT, M. G., RAMESH, S., SUMAN, P. V., PANDYA, P. K., AND JIANG, S. Model checking based analysis of end-to-end latency in embedded, real-time systems with clock drifts. In DAC (2008).
-
(2008)
DAC
-
-
Mohalik, S.1
Rajeev, A.C.2
Dixit, M.G.3
Ramesh, S.4
Suman, P.V.5
Pandya, P.K.6
Jiang, S.7
-
29
-
-
0032660830
-
Estimation and removal of clock skew from network delay measurements
-
MOON, S. B., SKELLY, P., AND TOWSLEY, D. Estimation and removal of clock skew from network delay measurements. In INFOCOM (1999).
-
(1999)
INFOCOM
-
-
Moon, S.B.1
Skelly, P.2
Towsley, D.3
-
30
-
-
84995529674
-
Entropy-based anomaly detection for in-vehicle networks
-
MUTER, M., AND ASAJ, N. Entropy-based anomaly detection for in-vehicle networks. IEEE IVS (2011).
-
(2011)
IEEE IVS
-
-
Muter, M.1
Asaj, N.2
-
31
-
-
78349261255
-
A structured approach to anomaly detection for in-vehicle networks
-
MUTER, M., GROLL, A.,, AND FREILING, F. C. A structured approach to anomaly detection for in-vehicle networks. In Information Assurance and Security (IAS), Sixth International Conference (2010).
-
(2010)
Information Assurance and Security (IAS), Sixth International Conference
-
-
Muter, M.1
Groll, A.2
Freiling, F.C.3
-
32
-
-
84995525860
-
Understanding and using the controller area network communication protocol: Theory and practice
-
NATALE, M. D., ZENG, H., GIUSTO, P., AND GHOSAL, A. Understanding and using the controller area network communication protocol: Theory and practice. In Springer Science & Business Media (2012).
-
(2012)
Springer Science & Business Media
-
-
Natale, M.D.1
Zeng, H.2
Giusto, P.3
Ghosal, A.4
-
33
-
-
58149105204
-
Efficient in-vehicle delayed data authentication based on compound message authentication codes
-
NILSSON, D., LARSON, D., AND JONSSON, E. Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes. In VTC-Fall (2008).
-
(2008)
VTC-Fall
-
-
Nilsson, D.1
Larson, D.2
Jonsson, E.3
-
34
-
-
4143086663
-
Pc based precision timing without GPS
-
PASZTOR, A., AND VEITCH, D. Pc based precision timing without gps. In ACM SIGMETRICS (2002).
-
(2002)
ACM SIGMETRICS
-
-
Pasztor, A.1
Veitch, D.2
-
35
-
-
0002964172
-
On calibrating measurements of packet transit times
-
PAXSON, V. On calibrating measurements of packet transit times. In SIGMETRICS (1998).
-
(1998)
SIGMETRICS
-
-
Paxson, V.1
-
36
-
-
85072488021
-
Accuracy of event data in the 2010 and 2011 Toyota camry during steady state and braking conditions
-
RUTH, R., BARTLETT, W., AND DAILY, J. Accuracy of event data in the 2010 and 2011 Toyota camry during steady state and braking conditions. In SAE International Journal on Passenger Cars (2012).
-
(2012)
SAE International Journal on Passenger Cars
-
-
Ruth, R.1
Bartlett, W.2
Daily, J.3
-
39
-
-
85042363884
-
Comparison of fieldbus systems, can, ttcan, flexray and lin in passenger vehicles
-
TALBOT, S. C., AND REN, S. Comparison of fieldbus systems, can, ttcan, flexray and lin in passenger vehicles. In ICDCSW (2009).
-
(2009)
ICDCSW
-
-
Talbot, S.C.1
Ren, S.2
-
40
-
-
14944359938
-
Robust synchronization of software cclock across the internet
-
VEITCH, D., BABU, S., AND PASZTOR, A. Robust synchronization of software cclock across the internet. In IMC (2004).
-
(2004)
IMC
-
-
Veitch, D.1
Babu, S.2
Pasztor, A.3
-
41
-
-
84867037056
-
The statistical design of cusum charts
-
WOODALL, W. H., AND ADAMS, B. The statistical design of cusum charts. In Quality Engineering, 5(4), (1993).
-
(1993)
Quality Engineering
, vol.5
, Issue.4
-
-
Woodall, W.H.1
Adams, B.2
-
42
-
-
65249165857
-
An improved clock-skew measurement technique for revealing hidden services
-
ZANDER, S., AND MURDOCH, S. An improved clock-skew measurement technique for revealing hidden services. In USENIX Security (2008).
-
(2008)
USENIX Security
-
-
Zander, S.1
Murdoch, S.2
|