EDA for secure and dependable cybercars: Challenges and opportunities
暂无分享,去创建一个
[1] Jana Dittmann,et al. Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..
[2] Elmar Schoch,et al. A Generic Public Key Infrastructure for Securing Car-to-X Communication , 2011 .
[3] Alberto L. Sangiovanni-Vincentelli,et al. Quo Vadis, SLD? Reasoning About the Trends and Challenges of System Level Design , 2007, Proceedings of the IEEE.
[4] Srinivas Devadas,et al. Silicon physical random functions , 2002, CCS '02.
[5] Tobias Hoppe,et al. Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats , 2009, SAFECOMP.
[6] Giovanni De Micheli,et al. Synthesis and Optimization of Digital Circuits , 1994 .
[7] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[8] Farinaz Koushanfar,et al. Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management , 2012, IEEE Transactions on Information Forensics and Security.
[9] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: implementation, performance, and research challenges , 2008, IEEE Communications Magazine.
[10] Srinivas Devadas,et al. Security Based on Physical Unclonability and Disorder , 2012 .
[11] Matthew Green,et al. Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.
[12] André Weimerskirch,et al. State of the Art: Embedding Security in Vehicles , 2007, EURASIP J. Embed. Syst..
[13] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[14] Petru Eles,et al. Timing analysis of the FlexRay communication protocol , 2006, 18th Euromicro Conference on Real-Time Systems (ECRTS'06).
[15] Yilin Zhao. Telematics: Safe and Fun Driving , 2002, IEEE Intell. Syst..
[16] Jana Dittmann,et al. Future Perspectives: The Car and Its IP-Address - A Potential Safety and Security Risk Assessment , 2007, SAFECOMP.
[17] Ilya V. Kolmanovsky,et al. Control, Computing and Communications: Technologies for the Twenty-First Century Model T , 2007, Proceedings of the IEEE.
[18] Thomas A. Henzinger,et al. Interface Theories for Component-Based Design , 2001, EMSOFT.
[19] Thomas A. Henzinger,et al. INTERFACE-BASED DESIGN , 2005 .
[20] Christof Paar,et al. On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoqCode Hopping Scheme , 2008, CRYPTO.
[21] Alberto L. Sangiovanni-Vincentelli,et al. Embedded System Design for Automotive Applications , 2007, Computer.
[22] Christof Paar,et al. Security in Automotive Bus Systems , 2004 .
[23] Miodrag Potkonjak,et al. Can EDA combat the rise of electronic counterfeiting? , 2012, DAC Design Automation Conference 2012.
[24] Peter R. Thom,et al. A Spy Under the Hood: Controlling Risk and Automotive EDR , 2008 .
[25] Tomas Olovsson,et al. Security aspects of the in-vehicle network in the connected car , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).
[26] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[27] Frederik Armknecht,et al. A Formalization of the Security Features of Physical Functions , 2011, 2011 IEEE Symposium on Security and Privacy.
[28] Jörg Ott,et al. Research challenges in intervehicular communication: lessons of the 2010 Dagstuhl Seminar , 2011, IEEE Communications Magazine.
[29] Erland Jonsson,et al. Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes , 2008, 2008 IEEE 68th Vehicular Technology Conference.
[30] Wenyuan Xu,et al. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.
[31] Ulf E. Larson,et al. Securing vehicles against cyber attacks , 2008, CSIIRW '08.
[32] Frank Kargl,et al. PREparing SEcuRe VEhicle-to-X Communication Systems , 2011 .
[33] Miodrag Potkonjak,et al. Lightweight secure PUFs , 2008, 2008 IEEE/ACM International Conference on Computer-Aided Design.
[34] Elmar Schoch,et al. On the efficiency of secure beaconing in VANETs , 2010, WiSec '10.
[35] Ulf E. Larson,et al. Simulated attacks on CAN buses: vehicle virus , 2008 .
[36] Norman Hardy,et al. The Confused Deputy: (or why capabilities might have been invented) , 1988, OPSR.
[37] Farinaz Koushanfar,et al. A Survey of Hardware Trojan Taxonomy and Detection , 2010, IEEE Design & Test of Computers.