Practical Security Exploits of the FlexRay In-Vehicle Communication Protocol
暂无分享,去创建一个
[1] Stefano Zanero,et al. A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks , 2017, DIMVA.
[2] Andreas Steininger,et al. Automatic Parameter Identi cation in FlexRay based Automotive Communication Networks , 2006, 2006 IEEE Conference on Emerging Technologies and Factory Automation.
[3] Matti Valovirta,et al. Experimental Security Analysis of a Modern Automobile , 2011 .
[4] Bogdan Groza,et al. DoS Attacks on Controller Area Networks by Fault Injections from the Software Layer , 2017, ARES.
[5] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[6] Christof Paar,et al. Security in Automotive Bus Systems , 2004 .
[7] Klaus D. Müller-Glaser,et al. Physical Layer Extraction of FlexRay Configuration Parameters , 2009, 2009 IEEE/IFIP International Symposium on Rapid System Prototyping.
[8] Markus Iversen Huse. FlexRay Analysis, Configuration Parameter Estimation, and Adversaries , 2017 .
[9] Erland Jonsson,et al. A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay , 2008, CISIS.
[10] Kang G. Shin,et al. Error Handling of In-vehicle Networks Makes Them Vulnerable , 2016, CCS.