A Security Analysis of an In-Vehicle Infotainment and App Platform
暂无分享,去创建一个
Aaron Hunter | Damon McCoy | Sahar Mazloom | Mohammad Rezaeirad | Damon McCoy | Mohammad Rezaeirad | Aaron Hunter | Sahar Mazloom
[1] Raja Bose,et al. Terminal mode: transforming mobile devices into automotive application platforms , 2010, AutomotiveUI.
[2] Wenyuan Xu,et al. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.
[3] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[4] Bryan Parno,et al. Bootstrapping Trust in a "Trusted" Platform , 2008, HotSec.
[5] Hovav Shacham,et al. Return-Oriented Programming: Systems, Languages, and Applications , 2012, TSEC.
[6] Jana Dittmann,et al. Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2011, Reliab. Eng. Syst. Saf..
[7] Flavio D. Garcia,et al. Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer , 2013, USENIX Security Symposium.
[8] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[9] Robert C. Seacord,et al. Secure coding in C and C , 2005 .
[10] Jana Dittmann,et al. Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..
[11] Stefan Savage,et al. Fast and Vulnerable: A Story of Telematic Failures , 2015, WOOT.