Towards a distributed secure in-vehicle communication architecture for modern vehicles
暂无分享,去创建一个
Constantinos Patsakis | Mélanie Bouroche | Kleanthis Dellios | C. Patsakis | Kleanthis Dellios | Mélanie Bouroche
[1] William B. Ribbens. Understanding automotive electronics , 1988 .
[2] Heinz Heisler,et al. Advanced vehicle technology , 1989 .
[3] Gavin Lowe,et al. A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.
[4] Sjouke Mauw,et al. Defining authentication in a trace model , 2003 .
[5] Horng-Twu Liaw,et al. A secure electronic voting protocol for general elections , 2004, Comput. Secur..
[6] Hiroaki Kikuchi,et al. ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System , 2004, SEC.
[7] Matthew Green,et al. Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.
[8] Christof Paar,et al. Embedded Security in Cars: Securing Current and Future Automotive IT Applications , 2005 .
[9] Christof Paar,et al. Secure In-Vehicle Communication , 2006 .
[10] Christof Paar,et al. Embedded Security in Cars , 2006 .
[11] André Weimerskirch,et al. State of the Art: Embedding Security in Vehicles , 2007, EURASIP J. Embed. Syst..
[12] Guna Seetharaman,et al. Embedded Systems for Intelligent Vehicles , 2007, EURASIP J. Embed. Syst..
[13] Eli Biham,et al. How to Steal Cars - A Practical Attack on KeeLoq R , 2007 .
[14] Erland Jonsson,et al. An Approach to using Honeypots in In-Vehicle Networks , 2008, 2008 IEEE 68th Vehicular Technology Conference.
[15] Hideki Imai,et al. New Attestation Based Security Architecture for In-Vehicle Communication , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.
[16] Erland Jonsson,et al. Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes , 2008, 2008 IEEE 68th Vehicular Technology Conference.
[17] Jana Dittmann,et al. Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment , 2008, 2008 The Fourth International Conference on Information Assurance and Security.
[18] Christof Paar,et al. Physical Cryptanalysis of KeeLoq Code Hopping Applications , 2008, IACR Cryptol. ePrint Arch..
[19] D.K. Nilsson,et al. An approach to specification-based attack detection for in-vehicle networks , 2008, 2008 IEEE Intelligent Vehicles Symposium.
[20] Philip Koopman,et al. A Flexible Approach to Embedded Network Multicast Authentication , 2008 .
[21] Allen Fuhs,et al. Hybrid Vehicles : and the Future of Personal Transportation , 2008 .
[22] Jana Dittmann,et al. Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..
[23] Ulf E. Larson,et al. Simulated attacks on CAN buses: vehicle virus , 2008 .
[24] David W. Chadwick,et al. How to Securely Break into RBAC: The BTG-RBAC Model , 2009, 2009 Annual Computer Security Applications Conference.
[25] Christoph Ruland,et al. Secure and authentic communication on existing in-vehicle networks , 2009, 2009 IEEE Intelligent Vehicles Symposium.
[26] Shwetak N. Patel,et al. Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.
[27] Eli Biham,et al. A Practical Attack on KeeLoq , 2008, Journal of Cryptology.
[28] Wenyuan Xu,et al. Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.
[29] Marko Wolf,et al. Design, Implementation, and Evaluation of a Vehicular Hardware Security Module , 2011, ICISC.
[30] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[31] Tomas Olovsson,et al. Security aspects of the in-vehicle network in the connected car , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).
[32] Rafail Ostrovsky,et al. Broadcast-Efficient Secure Multiparty Computation , 2012, IACR Cryptol. ePrint Arch..
[33] Constantinos Patsakis,et al. Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer , 2012, SECRYPT.
[34] Stuart McClure. Caution: malware ahead , 2013 .