Design and verification for transportation system security
暂无分享,去创建一个
[1] Ashish Tiwari,et al. Safety envelope for security , 2014, HiCoNS.
[2] Panagiotis Papadimitratos,et al. Secure vehicular communication systems: design and architecture , 2008, IEEE Communications Magazine.
[3] André Platzer,et al. KeYmaera: A Hybrid Theorem Prover for Hybrid Systems (System Description) , 2008, IJCAR.
[4] Alberto L. Sangiovanni-Vincentelli,et al. Security-aware mapping for CAN-based real-time distributed automotive systems , 2013, 2013 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[5] André Platzer,et al. Adaptive Cruise Control: Hybrid, Distributed, and Now Formally Verified , 2011, FM.
[6] Peng Deng,et al. Robust and extensible task implementations of synchronous finite state machines , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[7] Philip Koopman,et al. Flexible multicast authentication for time-triggered embedded control network applications , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.
[8] John B. Kenney,et al. Dedicated Short-Range Communications (DSRC) Standards in the United States , 2011, Proceedings of the IEEE.
[9] Eylem Ekici,et al. Vehicular Networking: A Survey and Tutorial on Requirements, Architectures, Challenges, Standards and Solutions , 2011, IEEE Communications Surveys & Tutorials.
[10] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[11] Matthew Green,et al. Security Analysis of a Cryptographically-Enabled RFID Device , 2005, USENIX Security Symposium.
[12] Panagiotis Papadimitratos,et al. Adaptive message authentication for vehicular networks , 2009, VANET '09.
[13] Adil Mudasir Malla,et al. Security Attacks with an Effective Solution for DOS Attacks in VANET , 2013 .
[14] Ludovic Apvrille,et al. Security requirements for automotive on-board networks , 2009, 2009 9th International Conference on Intelligent Transport Systems Telecommunications, (ITST).
[15] Bart van Arem,et al. The Impact of Cooperative Adaptive Cruise Control on Traffic-Flow Characteristics , 2006, IEEE Transactions on Intelligent Transportation Systems.
[16] A. Kajackas,et al. Inter-Vehicle Communication: Emergency Message Delay Distributions , 2015 .
[17] Christof Paar,et al. Security in Automotive Bus Systems , 2004 .
[18] Ingrid Verbauwhede,et al. CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus , 2011 .
[19] Natarajan Shankar,et al. A framework for high-assurance quasi-synchronous systems , 2014, 2014 Twelfth ACM/IEEE Conference on Formal Methods and Models for Codesign (MEMOCODE).
[20] Erland Jonsson,et al. Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes , 2008, 2008 IEEE 68th Vehicular Technology Conference.
[21] Alberto L. Sangiovanni-Vincentelli,et al. Security-aware mapping for TDMA-based real-time distributed systems , 2014, 2014 IEEE/ACM International Conference on Computer-Aided Design (ICCAD).
[22] Yunxin Li,et al. An Overview of the DSRC/WAVE Technology , 2010, QSHINE.
[23] Mohammed Saeed Al-kahtani,et al. Survey on security attacks in Vehicular Ad hoc Networks (VANETs) , 2012, 2012 6th International Conference on Signal Processing and Communication Systems.
[24] Patrick C. Hickey,et al. Securing the Automobile: a Comprehensive Approach , 2015 .
[25] Alejandro Quintero,et al. VANET security surveys , 2014, Comput. Commun..
[26] Alberto L. Sangiovanni-Vincentelli,et al. Cyber-Security for the Controller Area Network (CAN) Communication Protocol , 2012, 2012 International Conference on Cyber Security.
[27] Peng Deng,et al. Task synthesis for latency-sensitive synchronous block diagram , 2014, Proceedings of the 9th IEEE International Symposium on Industrial Embedded Systems (SIES 2014).
[28] Tim Leinmüller,et al. POSITION VERIFICATION APPROACHES FOR VEHICULAR AD HOC NETWORKS , 2006, IEEE Wireless Communications.
[29] Yves Deswarte,et al. Survey on security threats and protection mechanisms in embedded automotive networks , 2013, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W).
[30] Natarajan Shankar,et al. PVS: A Prototype Verification System , 1992, CADE.
[31] Xiaomin Ma,et al. Delay and Broadcast Reception Rates of Highway Safety Applications in Vehicular Ad Hoc Networks , 2007, 2007 Mobile Networking for Vehicular Environments.
[32] André Platzer,et al. Differential Dynamic Logic for Hybrid Systems , 2008, Journal of Automated Reasoning.
[33] Bruno Dutertre,et al. Modeling and Verification of a Fault-Tolerant Real-Time Startup Protocol Using Calendar Automata , 2004, FORMATS/FTRTFT.
[34] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[35] Jessica Staddon,et al. Detecting and correcting malicious data in VANETs , 2004, VANET '04.
[36] Nathan van de Wouw,et al. Design and experimental evaluation of cooperative adaptive cruise control , 2011, 2011 14th International IEEE Conference on Intelligent Transportation Systems (ITSC).
[37] Erland Jonsson,et al. A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay , 2008, CISIS.
[38] Xue Liu,et al. Delay analysis and study of IEEE 802.11p based DSRC safety communication in a highway environment , 2013, 2013 Proceedings IEEE INFOCOM.
[39] Y. Roudier,et al. Security and privacy for in-vehicle networks , 2012, 2012 IEEE 1st International Workshop on Vehicular Communications, Sensing, and Computing (VCSC).
[40] Sangjin Kim,et al. Privacy-Aware VANET Security: Putting Data-Centric Misbehavior and Sybil Attack Detection Schemes into Practice , 2012, WISA.
[41] Peng Deng,et al. Design synthesis and optimization for automotive embedded systems , 2014, ISPD '14.
[42] Alberto L. Sangiovanni-Vincentelli,et al. Loosely time-triggered architectures based on communication-by-sampling , 2007, EMSOFT '07.
[43] Bruno Dutertre,et al. Yices 2.2 , 2014, CAV.
[44] Panagiotis Papadimitratos,et al. SECURING VEHICULAR COMMUNICATIONS , 2006, IEEE Wireless Communications.
[45] Alberto L. Sangiovanni-Vincentelli,et al. Optimizations of an application-level protocol for enhanced dependability in FlexRay , 2009, 2009 Design, Automation & Test in Europe Conference & Exhibition.
[46] Maarten Steinbuch,et al. String-Stable CACC Design and Experimental Validation: A Frequency-Domain Approach , 2010, IEEE Transactions on Vehicular Technology.
[47] Zhiyi Fang,et al. Securing Vehicular Ad Hoc Networks , 2007, 2007 2nd International Conference on Pervasive Computing and Applications.
[48] César Muñoz,et al. An Overview of SAL , 2000 .
[49] Peng Deng,et al. A model-based synthesis flow for automotive CPS , 2015, ICCPS.
[50] Kenneth P. Laberteaux,et al. STRONG VANET SECURITY ON A BUDGET , 2006 .
[51] Thomas Peyrin,et al. Security challenges in automotive hardware/software architecture design , 2013, 2013 Design, Automation & Test in Europe Conference & Exhibition (DATE).
[52] Bo Yu,et al. Detecting Sybil attacks in VANETs , 2013, J. Parallel Distributed Comput..
[53] Naim Asaj,et al. Entropy-based anomaly detection for in-vehicle networks , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).