Car-to-Smartphone Interactions: Experimental Setup, Risk Analysis and Security Technologies
暂无分享,去创建一个
[1] Bruno Blanchet,et al. An efficient cryptographic protocol verifier based on prolog rules , 2001, Proceedings. 14th IEEE Computer Security Foundations Workshop, 2001..
[2] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[3] Alexandra Dmitrienko,et al. Smart keys for cyber-cars: secure smartphone-based NFC-enabled car immobilizer , 2013, CODASPY.
[4] Bart Preneel,et al. SePCAR: A Secure and Privacy-Enhancing Protocol for Car Access Provision , 2017, ESORICS.
[5] Bogdan Groza,et al. An Experimental Model for In-vehicle Networks and Subsystems , 2017, VEHITS.
[6] Sebastian Mödersheim,et al. The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications , 2005, CAV.
[7] Bogdan Groza,et al. Risk Assessment and Security Countermeasures for Vehicular Instrument Clusters , 2018, 2018 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops (DSN-W).
[8] Flavio D. Garcia,et al. Gone in 360 Seconds: Hijacking with Hitag2 , 2012, USENIX Security Symposium.
[9] Roberto Di Pietro,et al. Key is in the Air: Hacking Remote Keyless Entry Systems , 2018, ISSA/CSITS@ESORICS.
[10] Bharat K. Bhargava,et al. Incorporating attacker capabilities in risk estimation and mitigation , 2015, Comput. Secur..