Discovering CAN specification using On-Board Diagnostics

[1]  Mirco Marchetti,et al.  READ: Reverse Engineering of Automotive Data Frames , 2003, IEEE Transactions on Information Forensics and Security.

[2]  Hovav Shacham,et al.  Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.

[3]  Huy Kang Kim,et al.  Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network , 2016, 2016 International Conference on Information Networking (ICOIN).

[4]  Avishai Wool,et al.  Field classification, modeling and anomaly detection in unknown CAN bus networks , 2017, Veh. Commun..

[5]  Kang G. Shin,et al.  LibreCAN: Automated CAN Message Translator , 2019, CCS.

[6]  Peter Hellinckx,et al.  Automatic Reverse Engineering of CAN Bus Data Using Machine Learning Techniques , 2017, 3PGCIC.

[7]  Qiang Hu,et al.  Review of Secure Communication Approaches for In-Vehicle Network , 2018, International Journal of Automotive Technology.

[8]  Robert A. Bridges,et al.  ACTT: Automotive CAN Tokenization and Translation , 2018, 2018 International Conference on Computational Science and Computational Intelligence (CSCI).

[9]  Naim Asaj,et al.  Entropy-based anomaly detection for in-vehicle networks , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).