Discovering CAN specification using On-Board Diagnostics
暂无分享,去创建一个
[1] Mirco Marchetti,et al. READ: Reverse Engineering of Automotive Data Frames , 2003, IEEE Transactions on Information Forensics and Security.
[2] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[3] Huy Kang Kim,et al. Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network , 2016, 2016 International Conference on Information Networking (ICOIN).
[4] Avishai Wool,et al. Field classification, modeling and anomaly detection in unknown CAN bus networks , 2017, Veh. Commun..
[5] Kang G. Shin,et al. LibreCAN: Automated CAN Message Translator , 2019, CCS.
[6] Peter Hellinckx,et al. Automatic Reverse Engineering of CAN Bus Data Using Machine Learning Techniques , 2017, 3PGCIC.
[7] Qiang Hu,et al. Review of Secure Communication Approaches for In-Vehicle Network , 2018, International Journal of Automotive Technology.
[8] Robert A. Bridges,et al. ACTT: Automotive CAN Tokenization and Translation , 2018, 2018 International Conference on Computational Science and Computational Intelligence (CSCI).
[9] Naim Asaj,et al. Entropy-based anomaly detection for in-vehicle networks , 2011, 2011 IEEE Intelligent Vehicles Symposium (IV).