메뉴 건너뛰기




Volumn , Issue , 2016, Pages 911-927

Fingerprinting electronic control units for vehicle intrusion detection

Author keywords

[No Author keywords available]

Indexed keywords

CLOCKS; COMPUTER CRIME; CONTROL SYSTEMS; INDUSTRIAL ELECTRONICS; INTRUSION DETECTION; NETWORK SECURITY; SAFETY ENGINEERING; SERVOMECHANISMS; VEHICLES;

EID: 85074463893     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (519)

References (42)
  • 10
    • 84954175333 scopus 로고    scopus 로고
    • CPS approach to checking norm operation of a brake-by-wire system
    • CHO, K. T., PARK, T., AND SHIN, K. G. CPS Approach to Checking Norm Operation of a Brake-by-Wire System. In ICCPS (2015).
    • (2015) ICCPS
    • Cho, K.T.1    Park, T.2    Shin, K.G.3
  • 11
    • 85072507054 scopus 로고    scopus 로고
    • Analysis of critical speed yaw scuffs using spiral curves
    • DAILY, J. Analysis of critical speed yaw scuffs using spiral curves. In SAE Technical Paper 2012-01-0606 (2012).
    • (2012) SAE Technical Paper 2012-01-0606
    • Daily, J.1
  • 12
    • 80052981982 scopus 로고    scopus 로고
    • Controller area network (can) schedulability analysis with fifo queues
    • DAVIS, R., KOLLMANN, S., POLLEX, V., AND SLOMKA, F. Controller area network (can) schedulability analysis with fifo queues. ECRTS (2011).
    • (2011) ECRTS
    • Davis, R.1    Kollmann, S.2    Pollex, V.3    Slomka, F.4
  • 13
    • 85084164330 scopus 로고    scopus 로고
    • Fast and vulnerable: A story of telematic failures
    • FOSTER, I., PRUDHOMME, A., KOSCHER, K., AND SAVAGE, S. Fast and Vulnerable: A Story of Telematic Failures. In WOOT (2015).
    • (2015) WOOT
    • Foster, I.1    Prudhomme, A.2    Koscher, K.3    Savage, S.4
  • 16
    • 78649321196 scopus 로고    scopus 로고
    • Security threats to automotive can networks - Practical examples and selected short-term countermeasures
    • Jan
    • HOPPE, T., KILTZ, S., AND DITTMANN, J. Security threats to automotive can networks - practical examples and selected short-term countermeasures. In Reliability Engineering and System Safety (Jan. 2011).
    • (2011) Reliability Engineering and System Safety
    • Hoppe, T.1    Kiltz, S.2    Dittmann, J.3
  • 17
    • 60349083720 scopus 로고    scopus 로고
    • On fast and accurate detection of unauthorized wireless access points using clock skews
    • JANA, S., AND KASERA, S. K. On fast and accurate detection of unauthorized wireless access points using clock skews. In ACM MobiCom (2008).
    • (2008) ACM MobiCom
    • Jana, S.1    Kasera, S.K.2
  • 18
    • 77957573198 scopus 로고    scopus 로고
    • Integrating hardware limitations in can scbedulability analysis
    • May
    • KHAN, D., BRIL, R., AND NAVET, N. Integrating hardware limitations in can scbedulability analysis. In WFCS (May. 2010).
    • (2010) WFCS
    • Khan, D.1    Bril, R.2    Navet, N.3
  • 22
    • 51549083617 scopus 로고    scopus 로고
    • An investigation of the clique problem in flexray
    • MILBREDT, P., HORAUER, M., AND STEININGER, A. An investigation of the clique problem in flexray. SIES (2008).
    • (2008) SIES
    • Milbredt, P.1    Horauer, M.2    Steininger, A.3
  • 23
    • 84901675643 scopus 로고    scopus 로고
    • Adventures in automotive networks and control units
    • MILLER, C., AND VALASEK, C. Adventures in automotive networks and control units. Defcon 21 (2013).
    • (2013) Defcon , vol.21
    • Miller, C.1    Valasek, C.2
  • 24
    • 84929768227 scopus 로고    scopus 로고
    • A survey of remote automotive attack surfaces
    • MILLER, C., AND VALASEK, C. A survey of remote automotive attack surfaces. Black Hat USA (2014).
    • (2014) Black Hat USA
    • Miller, C.1    Valasek, C.2
  • 25
    • 84964764354 scopus 로고    scopus 로고
    • Remote exploitation of an unaltered passenger vehicle
    • MILLER, C., AND VALASEK, C. Remote exploitation of an unaltered passenger vehicle. Black Hat USA (2015).
    • (2015) Black Hat USA
    • Miller, C.1    Valasek, C.2
  • 26
    • 0003871309 scopus 로고    scopus 로고
    • Network time protocol: Specification, implemenation, and analysis
    • MILLS, D. L. Network time protocol: Specification, implemenation, and analysis. RFC 1305.
    • RFC 1305
    • Mills, D.L.1
  • 27
    • 51549088024 scopus 로고    scopus 로고
    • Model checking based analysis of end-to-end latency in embedded, real-time systems with clock drifts
    • MOHALIK, S., RAJEEV, A. C., DIXIT, M. G., RAMESH, S., SUMAN, P. V., PANDYA, P. K., AND JIANG, S. Model checking based analysis of end-to-end latency in embedded, real-time systems with clock drifts. In DAC (2008).
    • (2008) DAC
    • Mohalik, S.1    Rajeev, A.C.2    Dixit, M.G.3    Ramesh, S.4    Suman, P.V.5    Pandya, P.K.6    Jiang, S.7
  • 29
    • 0032660830 scopus 로고    scopus 로고
    • Estimation and removal of clock skew from network delay measurements
    • MOON, S. B., SKELLY, P., AND TOWSLEY, D. Estimation and removal of clock skew from network delay measurements. In INFOCOM (1999).
    • (1999) INFOCOM
    • Moon, S.B.1    Skelly, P.2    Towsley, D.3
  • 30
    • 84995529674 scopus 로고    scopus 로고
    • Entropy-based anomaly detection for in-vehicle networks
    • MUTER, M., AND ASAJ, N. Entropy-based anomaly detection for in-vehicle networks. IEEE IVS (2011).
    • (2011) IEEE IVS
    • Muter, M.1    Asaj, N.2
  • 32
    • 84995525860 scopus 로고    scopus 로고
    • Understanding and using the controller area network communication protocol: Theory and practice
    • NATALE, M. D., ZENG, H., GIUSTO, P., AND GHOSAL, A. Understanding and using the controller area network communication protocol: Theory and practice. In Springer Science & Business Media (2012).
    • (2012) Springer Science & Business Media
    • Natale, M.D.1    Zeng, H.2    Giusto, P.3    Ghosal, A.4
  • 33
    • 58149105204 scopus 로고    scopus 로고
    • Efficient in-vehicle delayed data authentication based on compound message authentication codes
    • NILSSON, D., LARSON, D., AND JONSSON, E. Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes. In VTC-Fall (2008).
    • (2008) VTC-Fall
    • Nilsson, D.1    Larson, D.2    Jonsson, E.3
  • 34
    • 4143086663 scopus 로고    scopus 로고
    • Pc based precision timing without GPS
    • PASZTOR, A., AND VEITCH, D. Pc based precision timing without gps. In ACM SIGMETRICS (2002).
    • (2002) ACM SIGMETRICS
    • Pasztor, A.1    Veitch, D.2
  • 35
    • 0002964172 scopus 로고    scopus 로고
    • On calibrating measurements of packet transit times
    • PAXSON, V. On calibrating measurements of packet transit times. In SIGMETRICS (1998).
    • (1998) SIGMETRICS
    • Paxson, V.1
  • 36
    • 85072488021 scopus 로고    scopus 로고
    • Accuracy of event data in the 2010 and 2011 Toyota camry during steady state and braking conditions
    • RUTH, R., BARTLETT, W., AND DAILY, J. Accuracy of event data in the 2010 and 2011 Toyota camry during steady state and braking conditions. In SAE International Journal on Passenger Cars (2012).
    • (2012) SAE International Journal on Passenger Cars
    • Ruth, R.1    Bartlett, W.2    Daily, J.3
  • 39
    • 85042363884 scopus 로고    scopus 로고
    • Comparison of fieldbus systems, can, ttcan, flexray and lin in passenger vehicles
    • TALBOT, S. C., AND REN, S. Comparison of fieldbus systems, can, ttcan, flexray and lin in passenger vehicles. In ICDCSW (2009).
    • (2009) ICDCSW
    • Talbot, S.C.1    Ren, S.2
  • 40
    • 14944359938 scopus 로고    scopus 로고
    • Robust synchronization of software cclock across the internet
    • VEITCH, D., BABU, S., AND PASZTOR, A. Robust synchronization of software cclock across the internet. In IMC (2004).
    • (2004) IMC
    • Veitch, D.1    Babu, S.2    Pasztor, A.3
  • 41
    • 84867037056 scopus 로고
    • The statistical design of cusum charts
    • WOODALL, W. H., AND ADAMS, B. The statistical design of cusum charts. In Quality Engineering, 5(4), (1993).
    • (1993) Quality Engineering , vol.5 , Issue.4
    • Woodall, W.H.1    Adams, B.2
  • 42
    • 65249165857 scopus 로고    scopus 로고
    • An improved clock-skew measurement technique for revealing hidden services
    • ZANDER, S., AND MURDOCH, S. An improved clock-skew measurement technique for revealing hidden services. In USENIX Security (2008).
    • (2008) USENIX Security
    • Zander, S.1    Murdoch, S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.