An Overview of Attacks and Defences on Intelligent Connected Vehicles

Cyber security is one of the most significant challenges in connected vehicular systems and connected vehicles are prone to different cybersecurity attacks that endanger passengers' safety. Cyber security in intelligent connected vehicles is composed of in-vehicle security and security of inter-vehicle communications. Security of Electronic Control Units (ECUs) and the Control Area Network (CAN) bus are the most significant parts of in-vehicle security. Besides, with the development of 4G LTE and 5G remote communication technologies for vehicle-toeverything (V2X) communications, the security of inter-vehicle communications is another potential problem. After giving a short introduction to the architecture of next-generation vehicles including driverless and intelligent vehicles, this review paper identifies a few major security attacks on the intelligent connected vehicles. Based on these attacks, we provide a comprehensive survey of available defences against these attacks and classify them into four categories, i.e. cryptography, network security, software vulnerability detection, and malware detection. We also explore the future directions for preventing attacks on intelligent vehicle systems.

[1]  Paul Rad,et al.  Driverless vehicle security: Challenges and future research opportunities , 2020, Future Gener. Comput. Syst..

[2]  Jin Cui,et al.  A review on safety failures, security attacks, and available countermeasures for autonomous vehicles , 2019, Ad Hoc Networks.

[3]  Attiya Baqai,et al.  Experimental Evaluation of Intelligent Transport System with VLC Vehicle-to-Vehicle Communication , 2019, Wirel. Pers. Commun..

[4]  Robert Abbas,et al.  Security and reliability performance analysis for two-way wireless energy harvesting based untrusted relaying with cooperative jamming , 2019, IET Commun..

[5]  Paul Rimba,et al.  Data-Driven Cybersecurity Incident Prediction: A Survey , 2019, IEEE Communications Surveys & Tutorials.

[6]  Guizhen Yu,et al.  Virus-traffic coupled dynamic model for virus propagation in vehicle-to-vehicle communication networks , 2018, Veh. Commun..

[7]  John Yearwood,et al.  A malicious threat detection model for cloud assisted internet of things (CoT) based industrial control system (ICS) networks using deep belief network , 2018, J. Parallel Distributed Comput..

[8]  Kiyoung Choi,et al.  Deep neural networks with weighted spikes , 2018, Neurocomputing.

[9]  Kun Jiang,et al.  Intelligent and connected vehicles: Current status and future perspectives , 2018, Science China Technological Sciences.

[10]  Geoffrey E. Hinton Deep Learning-A Technology With the Potential to Transform Health Care. , 2018, JAMA.

[11]  Nirwan Ansari,et al.  A Hierarchical Detection and Response System to Enhance Security Against Lethal Cyber-Attacks in UAV Networks , 2018, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[12]  Jeremy Bryans,et al.  Building an automotive security assurance case using systematic security evaluations , 2018, Comput. Secur..

[13]  Rafal Leszczyna,et al.  A review of standards with cybersecurity requirements for smart grid , 2018, Comput. Secur..

[14]  Ali Dehghantanha,et al.  A deep Recurrent Neural Network based approach for Internet of Things malware threat hunting , 2018, Future Gener. Comput. Syst..

[15]  Miroslaw Staron,et al.  Software traceability in the automotive domain: Challenges and solutions , 2018, J. Syst. Softw..

[16]  Abdullah Al Nahid,et al.  Effective Intrusion Detection System Using XGBoost , 2018, Inf..

[17]  Christine Julien,et al.  Efficient and Scalable Runtime Monitoring for Cyber–Physical System , 2018, IEEE Systems Journal.

[18]  Xi Zhang,et al.  The Coming Era of AlphaHacking?: A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques , 2018, 2018 IEEE Third International Conference on Data Science in Cyberspace (DSC).

[19]  Weihua Zhuang,et al.  User-Centric View of Unmanned Aerial Vehicle Transmission Against Smart Attacks , 2018, IEEE Transactions on Vehicular Technology.

[20]  Ajay Kaul,et al.  A survey on Intrusion Detection Systems and Honeypot based proactive security mechanisms in VANETs and VANET Cloud , 2018, Veh. Commun..

[21]  Ajay Kaul,et al.  Hybrid fuzzy multi-criteria decision making based multi cluster head dolphin swarm optimized IDS for VANET , 2018, Veh. Commun..

[22]  Xinyi Huang,et al.  A matrix-based cross-layer key establishment protocol for smart homes , 2018, Inf. Sci..

[23]  Quanyan Zhu,et al.  Distributed Privacy-Preserving Collaborative Intrusion Detection Systems for VANETs , 2018, IEEE Transactions on Signal and Information Processing over Networks.

[24]  Jian Shen,et al.  An over-the-air key establishment protocol using keyless cryptography , 2018, Future Gener. Comput. Syst..

[25]  Senlin Luo,et al.  Cloud-based security and privacy-aware information dissemination over ubiquitous VANETs , 2018, Comput. Stand. Interfaces.

[26]  Shouhuai Xu,et al.  VulDeePecker: A Deep Learning-Based System for Vulnerability Detection , 2018, NDSS.

[27]  Irfan-Ullah Awan,et al.  CloudIntell: An intelligent malware detection system , 2017, Future Gener. Comput. Syst..

[28]  Xiao Liu,et al.  SmartVM: a SLA-aware microservice deployment framework , 2018, World Wide Web.

[29]  Georgia Sakellari,et al.  Cloud-Based Cyber-Physical Intrusion Detection for Vehicles Using Deep Learning , 2018, IEEE Access.

[30]  Christine Julien,et al.  Perceptions on the State of the Art in Verification and Validation in Cyber-Physical Systems , 2017, IEEE Systems Journal.

[31]  Xuelong Li,et al.  Adaptive Multimedia Data Forwarding for Privacy Preservation in Vehicular Ad-Hoc Networks , 2017, IEEE Transactions on Intelligent Transportation Systems.

[32]  Lynn Batten,et al.  Cyber security attacks to modern vehicular systems , 2017, J. Inf. Secur. Appl..

[33]  Bruno Crispo,et al.  Security and privacy in vehicular communications: Challenges and opportunities , 2017, Veh. Commun..

[34]  Hamid Reza Shahriari,et al.  Software Vulnerability Analysis and Discovery Using Machine-Learning and Data-Mining Techniques , 2017, ACM Comput. Surv..

[35]  Yaqin Zhou,et al.  Automated identification of security issues from commit messages and bug reports , 2017, ESEC/SIGSOFT FSE.

[36]  Nir Kshetri,et al.  Can Blockchain Strengthen the Internet of Things? , 2017, IT Professional.

[37]  Huy Kang Kim,et al.  OTIDS: A Novel Intrusion Detection System for In-vehicle Network by Using Remote Frame , 2017, 2017 15th Annual Conference on Privacy, Security and Trust (PST).

[38]  Avishai Wool,et al.  Field classification, modeling and anomaly detection in unknown CAN bus networks , 2017, Veh. Commun..

[39]  Guihai Chen,et al.  Using Wireless Link Dynamics to Extract a Secret Key in Vehicular Scenarios , 2017, IEEE Transactions on Mobile Computing.

[40]  Matti Latva-aho,et al.  Vehicle clustering for improving enhanced LTE-V2X network performance , 2017, 2017 European Conference on Networks and Communications (EuCNC).

[41]  Sevil Sen,et al.  A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.

[42]  Tao Zhang,et al.  Attacks and countermeasures in the internet of vehicles , 2016, Annals of Telecommunications.

[43]  Volker Willert,et al.  Efficient graph-based V2V free space fusion , 2017, 2017 IEEE Intelligent Vehicles Symposium (IV).

[44]  Markus Kucera,et al.  Automotive E/E-architecture enhancements by usage of ethernet TSN , 2017, 2017 13th Workshop on Intelligent Solutions in Embedded Systems (WISES).

[45]  Aubrey Alston Attribute-based Encryption for Attribute-based Authentication, Authorization, Storage, and Transmission in Distributed Storage Systems , 2017, ArXiv.

[46]  Christine Julien,et al.  Real-Time Simulation Support for Runtime Verification of Cyber-Physical Systems , 2017, ACM Trans. Embed. Comput. Syst..

[47]  Qiang Ni,et al.  Driving with Sharks: Rethinking Connected Vehicles with Vehicle Cybersecurity , 2017, IEEE Vehicular Technology Magazine.

[48]  Salil S. Kanhere,et al.  Towards an Optimized BlockChain for IoT , 2017, 2017 IEEE/ACM Second International Conference on Internet-of-Things Design and Implementation (IoTDI).

[49]  Mathias Payer,et al.  Control-Flow Integrity , 2017, ACM Comput. Surv..

[50]  Georgia Sakellari,et al.  Computation offloading of a vehicle's continuous intrusion detection workload for energy efficiency and performance , 2017, Simul. Model. Pract. Theory.

[51]  Sherif Aly Consolidating AUTOSAR with Complex Operating Systems (AUTOSAR on Linux) , 2017 .

[52]  Praveen Gauravaram,et al.  Blockchain for IoT security and privacy: The case study of a smart home , 2017, 2017 IEEE International Conference on Pervasive Computing and Communications Workshops (PerCom Workshops).

[53]  Md. Rafiqul Islam,et al.  Defending unknown attacks on cyber-physical systems by semi-supervised approach and available unlabeled data , 2017, Inf. Sci..

[54]  Xi Zheng,et al.  Security analysis of modern mission critical android mobile applications , 2017, ACSW.

[55]  William R. Harris,et al.  Efficient Protection of Path-Sensitive Control Security , 2017, USENIX Security Symposium.

[56]  Anis Laouiti,et al.  VANet security challenges and solutions: A survey , 2017, Veh. Commun..

[57]  A. Jefferson Offutt,et al.  Mutation operators for testing Android apps , 2017, Inf. Softw. Technol..

[58]  Quanyan Zhu,et al.  Dynamic Differential Privacy for ADMM-Based Distributed Classification Learning , 2017, IEEE Transactions on Information Forensics and Security.

[59]  Nirwan Ansari,et al.  EdgeIoT: Mobile Edge Computing for the Internet of Things , 2016, IEEE Communications Magazine.

[60]  Mahima Gupta,et al.  Infrastructure-less Vehicular Communication System Using Li-Fi Technology , 2016 .

[61]  Ventzislav Nikov,et al.  Low-Latency ECDSA Signature Verification—A Road Toward Safer Traffic , 2016, IEEE Transactions on Very Large Scale Integration (VLSI) Systems.

[62]  Jun Zhang,et al.  A Secure and Authenticated Key Management Protocol (SA-KMP) for Vehicular Networks , 2016, IEEE Transactions on Vehicular Technology.

[63]  Xiang-Yang Li,et al.  Instant and Robust Authentication and Key Agreement among Mobile Devices , 2016, CCS.

[64]  Faissal El Bouanani,et al.  A secure cooperative transmission model in VANET using attribute based encryption , 2016, 2016 International Conference on Advanced Communication Systems and Information Security (ACOSIS).

[65]  Kang G. Shin,et al.  Fingerprinting Electronic Control Units for Vehicle Intrusion Detection , 2016, USENIX Security Symposium.

[66]  Muttukrishnan Rajarajan,et al.  Host-Based Intrusion Detection for VANETs: A Statistical Approach to Rogue Node Detection , 2016, IEEE Transactions on Vehicular Technology.

[67]  Mashrur Chowdhury,et al.  Vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) communication in a heterogeneous wireless network – Performance evaluation , 2016 .

[68]  Yanfang Ye,et al.  Malicious sequential pattern mining for automatic malware detection , 2016, Expert Syst. Appl..

[69]  Simon Fürst,et al.  AUTOSAR for Connected and Autonomous Vehicles: The AUTOSAR Adaptive Platform , 2016, 2016 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshop (DSN-W).

[70]  Jamal Bentahar,et al.  CEAP: SVM-based intelligent detection model for clustered vehicular ad hoc networks , 2016, Expert Syst. Appl..

[71]  Nanning Zheng,et al.  On-Road Vehicle Detection and Tracking Using MMW Radar and Monovision Fusion , 2016, IEEE Transactions on Intelligent Transportation Systems.

[72]  S. Balaji,et al.  Smart vehicular communication system using Li Fi technology , 2016, 2016 International Conference on Computation of Power, Energy Information and Commuincation (ICCPEIC).

[73]  Guillermo L. Grinblat,et al.  Toward Large-Scale Vulnerability Discovery using Machine Learning , 2016, CODASPY.

[74]  Md. Rafiqul Islam,et al.  Hybrids of support vector machine wrapper and filter based framework for malware detection , 2016, Future Gener. Comput. Syst..

[75]  Liehuang Zhu,et al.  2FLIP: A Two-Factor Lightweight Privacy-Preserving Authentication Scheme for VANET , 2016, IEEE Transactions on Vehicular Technology.

[76]  Sazzadur Chowdhury,et al.  In-Vehicle Networks Outlook: Achievements and Challenges , 2016, IEEE Communications Surveys & Tutorials.

[77]  Huy Kang Kim,et al.  Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network , 2016, 2016 International Conference on Information Networking (ICOIN).

[78]  P. Langjahr,et al.  Cross-domain vehicle control units in modern E/E architectures , 2016 .

[79]  Paulo Resende,et al.  Standardization of Generic Architecture for Autonomous Driving: A Reality Check , 2016 .

[80]  Azzedine Boukerche,et al.  Geo-localized content availability in VANETs , 2016, Ad Hoc Networks.

[81]  Sun Hongbin,et al.  Frontal object perception for Intelligent Vehicles based on radar and camera fusion , 2016, 2016 35th Chinese Control Conference (CCC).

[82]  Guigang Zhang,et al.  Deep Learning , 2016, Int. J. Semantic Comput..

[83]  Harald Haas,et al.  What is LiFi? , 2015, 2015 European Conference on Optical Communication (ECOC).

[84]  Mohamed Azab,et al.  Survey on Security Issues in Vehicular Ad Hoc Networks , 2015 .

[85]  Lionel C. Briand,et al.  Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning , 2015, IEEE Transactions on Dependable and Secure Computing.

[86]  Christine Julien,et al.  BraceAssertion: Runtime Verification of Cyber-Physical Systems , 2015, 2015 IEEE 12th International Conference on Mobile Ad Hoc and Sensor Systems.

[87]  Matthew Smith,et al.  VCCFinder: Finding Potential Vulnerabilities in Open-Source Projects to Assist Code Audits , 2015, CCS.

[88]  Xiaorong Zhu,et al.  Li-Fi: Light fidelity-a survey , 2015, Wirel. Networks.

[89]  Emilio Frazzoli,et al.  The Impact of Cooperative Perception on Decision Making and Planning of Autonomous Vehicles , 2015, IEEE Intelligent Transportation Systems Magazine.

[90]  Roberto Di Pietro,et al.  ESC: An efficient, scalable, and crypto-less solution to secure wireless networks , 2015, Comput. Networks.

[91]  Mohammed M. Bait-Suwailam,et al.  Design and implementation of a vehicle to vehicle communication system using Li-Fi technology , 2015, 2015 International Conference on Information and Communication Technology Research (ICTRC).

[92]  Sidi-Mohammed Senouci,et al.  An accurate and efficient collaborative intrusion detection framework to secure vehicular networks , 2015, Comput. Electr. Eng..

[93]  Emilio Frazzoli,et al.  Multivehicle Cooperative Driving Using Cooperative Perception: Design and Experimental Validation , 2015, IEEE Transactions on Intelligent Transportation Systems.

[94]  Steven E. Shladover,et al.  Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.

[95]  Anand Rajan,et al.  Automotive Security Best Practices , 2015 .

[96]  Bayu Adhi Tama,et al.  A Fine-Grained Privacy Preserving Protocol over Attribute Based Access Control for VANETs , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[97]  Marcus Obst,et al.  Multi-sensor data fusion for checking plausibility of V2V communications by vision-based multiple-object tracking , 2014, 2014 IEEE Vehicular Networking Conference (VNC).

[98]  Marcelo H. Ang,et al.  Vehicle motion intention reasoning using cooperative perception on urban road , 2014, 17th International IEEE Conference on Intelligent Transportation Systems (ITSC).

[99]  Nanning Zheng,et al.  Bionic vision inspired on-road obstacle detection and tracking using radar and visual information , 2014, 17th International IEEE Conference on Intelligent Transportation Systems (ITSC).

[100]  Kirsten Matheus Automotive Ethernet , 2014 .

[101]  Mosa Ali Abu-Rgheff,et al.  An Efficient and Lightweight Intrusion Detection Mechanism for Service-Oriented Vehicular Networks , 2014, IEEE Internet of Things Journal.

[102]  Thorsten Holz,et al.  Static Detection of Second-Order Vulnerabilities in Web Applications , 2014, USENIX Security Symposium.

[103]  Úlfar Erlingsson,et al.  Enforcing Forward-Edge Control-Flow Integrity in GCC & LLVM , 2014, USENIX Security Symposium.

[104]  Shiyu Song,et al.  Robust Scale Estimation in Real-Time Monocular SFM for Autonomous Driving , 2014, 2014 IEEE Conference on Computer Vision and Pattern Recognition.

[105]  Sidi-Mohammed Senouci,et al.  A new Intrusion Detection Framework for Vehicular Networks , 2014, 2014 IEEE International Conference on Communications (ICC).

[106]  Mohan M. Trivedi,et al.  Looking-in and looking-out vision for Urban Intelligent Assistance: Estimation of driver attentive state and dynamic surround for safe merging and braking , 2014, 2014 IEEE Intelligent Vehicles Symposium Proceedings.

[107]  Hannes Federrath,et al.  REST-Net: A dynamic rule-based IDS for VANETs , 2014, 2014 7th IFIP Wireless and Mobile Networking Conference (WMNC).

[108]  H. Haas,et al.  A 3-Gb/s Single-LED OFDM-Based Wireless VLC Link Using a Gallium Nitride $\mu{\rm LED}$ , 2014, IEEE Photonics Technology Letters.

[109]  Xi Zheng Physically informed assertions for cyber physical systems development and debugging , 2014, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS).

[110]  Constantinos Patsakis,et al.  Towards a distributed secure in-vehicle communication architecture for modern vehicles , 2014, Comput. Secur..

[111]  Ravi Sankar,et al.  A Survey of Intrusion Detection Systems in Wireless Sensor Networks , 2014, IEEE Communications Surveys & Tutorials.

[112]  Sun-Young Hwang,et al.  Robust Range Estimation with a Monocular Camera for Vision-Based Forward Collision Warning System , 2014, TheScientificWorldJournal.

[113]  Xu Ji Automotive Air Conditioning Control System Based on STC12C5A60S2 Singlechip , 2014 .

[114]  Milan Petkovic,et al.  Attribute-based encryption with encryption and decryption outsourcing , 2014 .

[115]  Jussi Kangasharju,et al.  Measuring large-scale distributed systems: case of BitTorrent Mainline DHT , 2013, IEEE P2P 2013 Proceedings.

[116]  Bo Yu,et al.  Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..

[117]  Johannes Sametinger,et al.  Software Security , 2013, 2013 20th IEEE International Conference and Workshops on Engineering of Computer Based Systems (ECBS).

[118]  Thomas Peyrin,et al.  Security challenges in automotive hardware/software architecture design , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).

[119]  Sneha Kumar Kasera,et al.  Secret Key Extraction from Wireless Signal Strength in Real Environments , 2009, IEEE Transactions on Mobile Computing.

[120]  Geoffrey E. Hinton,et al.  ImageNet classification with deep convolutional neural networks , 2012, Commun. ACM.

[121]  Mohammed Saeed Al-kahtani,et al.  Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.

[122]  Jussi Kangasharju,et al.  Real-world sybil attacks in BitTorrent mainline DHT , 2012, 2012 IEEE Global Communications Conference (GLOBECOM).

[123]  Flavio D. Garcia,et al.  Gone in 360 Seconds: Hijacking with Hitag2 , 2012, USENIX Security Symposium.

[124]  Keith Yu Kit Leung,et al.  Decentralized Cooperative SLAM for Sparsely-Communicating Robot Networks: A Centralized-Equivalent Approach , 2012, J. Intell. Robotic Syst..

[125]  Steffen Müller,et al.  Automotive Ethernet, a Holistic Approach for a Next Generation In-Vehicle Networking Standard , 2012 .

[126]  Claire Le Goues,et al.  GenProg: A Generic Method for Automatic Software Repair , 2012, IEEE Transactions on Software Engineering.

[127]  Robert Bosch,et al.  CAN with Flexible Data-Rate , 2012 .

[128]  Laurie A. Williams,et al.  Evaluating Complexity, Code Churn, and Developer Activity Metrics as Indicators of Software Vulnerabilities , 2011, IEEE Transactions on Software Engineering.

[129]  Christian Weií,et al.  V2X communication in Europe - From research projects towards standardization and field testing of vehicle communication technology , 2011 .

[130]  Purnendu Sinha Architectural design and reliability analysis of a fail-operational brake-by-wire system from ISO 26262 perspectives , 2011, Reliab. Eng. Syst. Saf..

[131]  Dijiang Huang,et al.  PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs , 2011, IEEE Transactions on Intelligent Transportation Systems.

[132]  Hisato Iwai,et al.  Physical-Layer Secret Key Agreement in Two-Way Wireless Relaying Systems , 2011, IEEE Transactions on Information Forensics and Security.

[133]  Yen-Cheng Chen,et al.  ABACS: An Attribute-Based Access Control System for Emergency Services over Vehicular Ad Hoc Networks , 2011, IEEE Journal on Selected Areas in Communications.

[134]  Keiichi Uchimura,et al.  Driver Inattention Monitoring System for Intelligent Vehicles: A Review , 2009, IEEE Transactions on Intelligent Transportation Systems.

[135]  Christian Weiß,et al.  V2X communication in Europe - From research projects towards standardization and field testing of vehicle communication technology , 2011, Comput. Networks.

[136]  Kpatcha M. Bayarou,et al.  Intrusion detection in VANETs through verification of vehicle movement data , 2010, 2010 IEEE Vehicular Networking Conference.

[137]  Magnus Egerstedt,et al.  Autonomous driving in urban environments: approaches, lessons and challenges , 2010, Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences.

[138]  Andreas Pitsillides,et al.  A survey on secure multipath routing protocols in WSNs , 2010, Comput. Networks.

[139]  Xiaoyan Hong,et al.  Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption , 2010, 2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net).

[140]  David Brumley,et al.  All You Ever Wanted to Know about Dynamic Taint Analysis and Forward Symbolic Execution (but Might Have Been Afraid to Ask) , 2010, 2010 IEEE Symposium on Security and Privacy.

[141]  Adrian Perrig,et al.  Flexible, extensible, and efficient VANET authentication , 2009, Journal of Communications and Networks.

[142]  Elaine Shi,et al.  TACKing Together Efficient Authentication, Revocation, and Privacy in VANETs , 2009, 2009 6th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks.

[143]  Rex Chen,et al.  TARI: Meeting Delay Requirements in VANETs with Efficient Authentication and Revocation , 2009 .

[144]  Mario Gerla,et al.  Dynamic Attributes Design in Attribute Based Encryption , 2009 .

[145]  David Hovemeyer,et al.  Using Static Analysis to Find Bugs , 2008, IEEE Software.

[146]  Ulf Nilsson,et al.  A Comparative Study of Industrial Static Analysis Tools , 2008, SSV.

[147]  Jared D. DeMott,et al.  Fuzzing for Software Security Testing and Quality Assurance , 2008 .

[148]  Sean W. Smith,et al.  PPAA: Peer-to-Peer Anonymous Authentication , 2008, ACNS.

[149]  D.G. Johnson Development of a high resolution MMW radar employing an antenna with combined frequency and mechanical scanning , 2008, 2008 IEEE Radar Conference.

[150]  Pin-Han Ho,et al.  RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks , 2008, 2008 IEEE International Conference on Communications.

[151]  Xuemin Shen,et al.  PPGCV: Privacy Preserving Group Communications Protocol for Vehicular Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[152]  Erik Lindholm,et al.  NVIDIA Tesla: A Unified Graphics and Computing Architecture , 2008, IEEE Micro.

[153]  Patrice Godefroid,et al.  Automated Whitebox Fuzz Testing , 2008, NDSS.

[154]  Erland Jonsson,et al.  A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay , 2008, CISIS.

[155]  Xuemin Shen,et al.  GSIS: A Secure and Privacy-Preserving Protocol for Vehicular Communications , 2007, IEEE Transactions on Vehicular Technology.

[156]  Panagiotis Papadimitratos,et al.  Efficient and robust pseudonymous authentication in VANET , 2007, VANET '07.

[157]  Alessandro Orso,et al.  Dytan: a generic dynamic taint analysis framework , 2007, ISSTA '07.

[158]  Pedram Amini,et al.  Fuzzing: Brute Force Vulnerability Discovery , 2007 .

[159]  Huirong Fu,et al.  Design and implementation of an intrusion detection system for wireless sensor networks , 2007, 2007 IEEE International Conference on Electro/Information Technology.

[160]  P Iang The Design and Implementation Signal Processing System of the Automotive Collision Avoidance Based on TMS320VC5402 , 2007 .

[161]  Gianni Conte,et al.  Vision-based Automated Vehicle Guidance: the experience of the ARGO vehicle , 2007 .

[162]  Miguel Castro,et al.  Securing software by enforcing data-flow integrity , 2006, OSDI '06.

[163]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[164]  C. Eckert,et al.  Secure Revocable Anonymous Authenticated Inter-Vehicle Communication ( SRAAC ) , 2006 .

[165]  Claude Castelluccia,et al.  Shake them up!: a movement-based pairing protocol for CPU-constrained devices , 2005, MobiSys '05.

[166]  James Newsome,et al.  Dynamic Taint Analysis for Automatic Detection, Analysis, and SignatureGeneration of Exploits on Commodity Software , 2005, NDSS.

[167]  Brent Waters,et al.  Fuzzy Identity-Based Encryption , 2005, EUROCRYPT.

[168]  S. Zhu,et al.  GKMPAN: an efficient group rekeying scheme for secure multicast in ad-hoc networks , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[169]  O. Mano,et al.  Forward collision warning with a single camera , 2004, IEEE Intelligent Vehicles Symposium, 2004.

[170]  Takeo Kato,et al.  An obstacle detection method by fusion of radar and motion stereo , 2003, SICE 2003 Annual Conference (IEEE Cat. No.03TH8734).

[171]  Dawn Song,et al.  The TESLA Broadcast Authentication Protocol , 2002 .

[172]  Liu Bo OSEK/VDX--An Open-Architectured Platform of Vehicle Electronics System , 2002 .

[173]  E. Zeeb Optical data bus systems in cars: current status and future challenges , 2001, Proceedings 27th European Conference on Optical Communication (Cat. No.01TH8551).

[174]  Massimo Bertozzi,et al.  Architectural Issues on Vision-Based Automatic Vehicle Guidance: The Experience of the ARGO Project , 2000, Real Time Imaging.

[175]  Massimo Bertozzi,et al.  Vision-based intelligent vehicles: State of the art and perspectives , 2000, Robotics Auton. Syst..

[176]  Markus Maurer,et al.  A compact vision system for road vehicle guidance , 1996, Proceedings of 13th International Conference on Pattern Recognition.

[177]  Ramakrishnan Srikant,et al.  Mining Sequential Patterns: Generalizations and Performance Improvements , 1996, EDBT.

[178]  Bowen Alpern,et al.  Key Exchange Using 'Keyless Cryptography' , 1983, Inf. Process. Lett..