Towards a distributed secure in-vehicle communication architecture for modern vehicles

[1]  William B. Ribbens Understanding automotive electronics , 1988 .

[2]  Heinz Heisler,et al.  Advanced vehicle technology , 1989 .

[3]  Gavin Lowe,et al.  A hierarchy of authentication specifications , 1997, Proceedings 10th Computer Security Foundations Workshop.

[4]  Sjouke Mauw,et al.  Defining authentication in a trace model , 2003 .

[5]  Horng-Twu Liaw,et al.  A secure electronic voting protocol for general elections , 2004, Comput. Secur..

[6]  Hiroaki Kikuchi,et al.  ModInt: Compact Modular Arithmatic Class Library Available on Cellular Phone and its Application to Secure Electronic Voting System , 2004, SEC.

[7]  Matthew Green,et al.  Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.

[8]  Christof Paar,et al.  Embedded Security in Cars: Securing Current and Future Automotive IT Applications , 2005 .

[9]  Christof Paar,et al.  Secure In-Vehicle Communication , 2006 .

[10]  Christof Paar,et al.  Embedded Security in Cars , 2006 .

[11]  André Weimerskirch,et al.  State of the Art: Embedding Security in Vehicles , 2007, EURASIP J. Embed. Syst..

[12]  Guna Seetharaman,et al.  Embedded Systems for Intelligent Vehicles , 2007, EURASIP J. Embed. Syst..

[13]  Eli Biham,et al.  How to Steal Cars - A Practical Attack on KeeLoq R , 2007 .

[14]  Erland Jonsson,et al.  An Approach to using Honeypots in In-Vehicle Networks , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[15]  Hideki Imai,et al.  New Attestation Based Security Architecture for In-Vehicle Communication , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[16]  Erland Jonsson,et al.  Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes , 2008, 2008 IEEE 68th Vehicular Technology Conference.

[17]  Jana Dittmann,et al.  Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment , 2008, 2008 The Fourth International Conference on Information Assurance and Security.

[18]  Christof Paar,et al.  Physical Cryptanalysis of KeeLoq Code Hopping Applications , 2008, IACR Cryptol. ePrint Arch..

[19]  D.K. Nilsson,et al.  An approach to specification-based attack detection for in-vehicle networks , 2008, 2008 IEEE Intelligent Vehicles Symposium.

[20]  Philip Koopman,et al.  A Flexible Approach to Embedded Network Multicast Authentication , 2008 .

[21]  Allen Fuhs,et al.  Hybrid Vehicles : and the Future of Personal Transportation , 2008 .

[22]  Jana Dittmann,et al.  Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..

[23]  Ulf E. Larson,et al.  Simulated attacks on CAN buses: vehicle virus , 2008 .

[24]  David W. Chadwick,et al.  How to Securely Break into RBAC: The BTG-RBAC Model , 2009, 2009 Annual Computer Security Applications Conference.

[25]  Christoph Ruland,et al.  Secure and authentic communication on existing in-vehicle networks , 2009, 2009 IEEE Intelligent Vehicles Symposium.

[26]  Shwetak N. Patel,et al.  Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.

[27]  Eli Biham,et al.  A Practical Attack on KeeLoq , 2008, Journal of Cryptology.

[28]  Wenyuan Xu,et al.  Security and Privacy Vulnerabilities of In-Car Wireless Networks: A Tire Pressure Monitoring System Case Study , 2010, USENIX Security Symposium.

[29]  Marko Wolf,et al.  Design, Implementation, and Evaluation of a Vehicular Hardware Security Module , 2011, ICISC.

[30]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[31]  Tomas Olovsson,et al.  Security aspects of the in-vehicle network in the connected car , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).

[32]  Rafail Ostrovsky,et al.  Broadcast-Efficient Secure Multiparty Computation , 2012, IACR Cryptol. ePrint Arch..

[33]  Constantinos Patsakis,et al.  Securing In-vehicle Communication and Redefining the Role of Automotive Immobilizer , 2012, SECRYPT.

[34]  Stuart McClure Caution: malware ahead , 2013 .