A taxonomy of attack mechanisms in the automotive domain
暂无分享,去创建一个
Michael Felderer | Clemens Sauerwein | Irdin Pekaric | Stefan Haselwanter | Clemens Sauerwein | M. Felderer | Irdin Pekaric | Stefanie Haselwanter | Stefan Haselwanter
[1] Andrei Vladyko,et al. Forecasting Issues of Wireless Communication Networks' Cyber Resilience for An Intelligent Transportation System: An Overview of Cyber Attacks , 2019, Inf..
[2] Wenyuan Xu,et al. DolphinAttack: Inaudible Voice Commands , 2017, CCS.
[3] Kang G. Shin,et al. Error Handling of In-vehicle Networks Makes Them Vulnerable , 2016, CCS.
[4] Qishi Wu,et al. AVOIDIT: A Cyber Attack Taxonomy , 2009 .
[5] Prathyush P. Menon,et al. Analysis of Automotive Cyber-Attacks on Highways Using Partial Differential Equation Models , 2018, IEEE Transactions on Control of Network Systems.
[6] Ina Schieferdecker,et al. A taxonomy of risk-based testing , 2014, International Journal on Software Tools for Technology Transfer.
[7] Pascal Urien. Designing Attacks Against Automotive Control Area Network Bus and Electronic Control Units , 2019, 2019 16th IEEE Annual Consumer Communications & Networking Conference (CCNC).
[8] Yuanchao Shu,et al. A Practical GPS Location Spoofing Attack in Road Navigation Scenario , 2017, HotMobile.
[9] Shalini Stalin,et al. Analysis of Attacks and Challenges in VANET , 2014 .
[10] Zhuo Lu,et al. On modeling and understanding vehicle evacuation attacks in VANETs , 2017, 2017 IEEE International Conference on Communications (ICC).
[11] Prateek Mittal,et al. DARTS: Deceiving Autonomous Cars with Toxic Signs , 2018, ArXiv.
[12] Elyes Ben Hamida,et al. Security of Cooperative Intelligent Transport Systems: Standards, Threats Analysis and Cryptographic Countermeasures , 2015 .
[13] Kai Petersen,et al. Worldviews, Research Methods, and their Relationship to Validity in Empirical Software Engineering Research , 2013, 2013 Joint Conference of the 23rd International Workshop on Software Measurement and the 8th International Conference on Software Process and Product Measurement.
[14] Qian Wang,et al. Probing Attacks on Physical Layer Key Agreement for Automotive Controller Area Networks , 2018, 2018 Asian Hardware Oriented Security and Trust Symposium (AsianHOST).
[15] Rakesh Kumar,et al. VANET security: Issues, challenges and solutions , 2016, 2016 International Conference on Electrical, Electronics, and Optimization Techniques (ICEEOT).
[16] Martin Mullins,et al. Connected and autonomous vehicles: A cyber-risk classification framework , 2019, Transportation Research Part A: Policy and Practice.
[17] Farhan Ahmad,et al. A systematic approach for cyber security in vehicular networks , 2016 .
[18] Shwetak N. Patel,et al. Experimental Security Analysis of a Modern Automobile , 2010, 2010 IEEE Symposium on Security and Privacy.
[19] Ruth Breu,et al. Security Testing: A Survey , 2016, Adv. Comput..
[20] Tobias Hoppe,et al. Automotive IT-Security as a Challenge: Basic Attacks from the Black Box Perspective on the Example of Privacy Threats , 2009, SAFECOMP.
[21] Ruth Breu,et al. Model‐based security testing: a taxonomy and systematic classification , 2016, Softw. Test. Verification Reliab..
[22] Alexandre M. Bayen,et al. Creating complex congestion patterns via multi-objective optimal freeway traffic control with application to cyber-security , 2016 .
[23] Stefano Zanero,et al. A Stealth, Selective, Link-Layer Denial-of-Service Attack Against Automotive Networks , 2017, DIMVA.
[24] Vinh Hoa La,et al. SECURITY ATTACKS AND SOLUTIONS IN VEHICULAR AD HOC NETWORKS : A SURVEY , 2014 .
[25] M. Yampolskiy,et al. In-Vehicle Networks: Attacks, Vulnerabilities, and Proposed Solutions , 2015, CISR.
[26] Claes Wohlin,et al. Guidelines for snowballing in systematic literature studies and a replication in software engineering , 2014, EASE '14.
[27] Jana Dittmann,et al. Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment , 2008, 2008 The Fourth International Conference on Information Assurance and Security.
[28] Levente Buttyán,et al. Embedded systems security: Threats, vulnerabilities, and attack taxonomy , 2015, 2015 13th Annual Conference on Privacy, Security and Trust (PST).
[29] Steven E. Shladover,et al. Potential Cyberattacks on Automated Vehicles , 2015, IEEE Transactions on Intelligent Transportation Systems.
[30] Nils Gruschka,et al. Attack Surfaces: A Taxonomy for Attacks on Cloud Services , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.
[31] Roberto Di Pietro,et al. Key is in the Air: Hacking Remote Keyless Entry Systems , 2018, ISSA/CSITS@ESORICS.
[32] Mohammad Samie,et al. Hardware trojan enabled denial of service attack on CAN bus , 2018 .
[33] Mohammad Zulkernine,et al. Towards defending connected vehicles against attacks , 2017, ECBS.
[34] Gang Wang,et al. All Your GPS Are Belong To Us: Towards Stealthy Manipulation of Road Navigation Systems , 2018, USENIX Security Symposium.
[35] Xiang Li,et al. Controlling a Car Through OBD Injection , 2016, 2016 IEEE 3rd International Conference on Cyber Security and Cloud Computing (CSCloud).
[36] Michael Felderer,et al. Applying Security Testing Techniques to Automotive Engineering , 2019, ARES.
[37] Stacy J. Prowell,et al. Modeling inter-signal arrival times for accurate detection of CAN bus signal injection attacks: a data-driven approach to in-vehicle intrusion detection , 2017, CISRC.
[38] Sevil Sen,et al. A survey of attacks and detection mechanisms on intelligent transportation systems: VANETs and IoV , 2017, Ad Hoc Networks.
[39] Indrakshi Ray,et al. Practical DoS Attacks on Embedded Networks in Commercial Vehicles , 2016, ICISS.
[40] Jason Andress. The basics of information security - understanding the fundamentals of InfoSec in theory and practice, Second edition , 2011 .
[41] Lilian Bossuet,et al. JTAG Combined Attack - Another Approach for Fault Injection , 2016, 2016 8th IFIP International Conference on New Technologies, Mobility and Security (NTMS).
[42] Jonathan Miller,et al. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges , 2017, IEEE Transactions on Intelligent Transportation Systems.
[43] Jin Cui,et al. A review on safety failures, security attacks, and available countermeasures for autonomous vehicles , 2019, Ad Hoc Networks.
[44] Bernd Eissfeller,et al. Emerging attacks on VANET security based on GPS Time Spoofing , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[45] Jill Slay,et al. A new approach to developing attack taxonomies for network security - including case studies , 2011, 2011 17th IEEE International Conference on Networks.
[46] Falko Dressler,et al. The scrambler attack: A robust physical layer attack on location privacy in vehicular networks , 2015, 2015 International Conference on Computing, Networking and Communications (ICNC).
[47] Hirofumi Yamashita,et al. Automotive Attacks and Countermeasures on LIN-Bus , 2017, J. Inf. Process..
[48] Bo Xu,et al. VCLT: An Accurate Trajectory Tracking Attack Based on Crowdsourcing in VANETs , 2015, ICA3PP.
[49] Umesh Singh,et al. ADMIT- A Five Dimensional Approach towards Standardization of Network and Computer Attack Taxonomies , 2014 .
[50] Kim-Kwang Raymond Choo,et al. Cloud Attack and Risk Assessment Taxonomy , 2015, IEEE Cloud Computing.
[51] Mohamed Azab,et al. Survey on Security Issues in Vehicular Ad Hoc Networks , 2015 .
[52] Tatsuya Mori,et al. Audio Hotspot Attack: An Attack on Voice Assistance Systems Using Directional Sound Beams , 2018, CCS.
[53] Mario Gerla,et al. BOTVEILLANCE: A Vehicular Botnet Surveillance Attack against Pseudonymous Systems in VANETs , 2018, 2018 11th IFIP Wireless and Mobile Networking Conference (WMNC).
[54] Florian Sommer,et al. Survey and Classification of Automotive Security Attacks , 2019, Inf..
[55] Flavio D. Garcia,et al. Lock It and Still Lose It - on the (In)Security of Automotive Remote Keyless Entry Systems , 2016, USENIX Security Symposium.
[56] Tao Zhang,et al. Attacks and countermeasures in the internet of vehicles , 2016, Annals of Telecommunications.
[57] Lynn Batten,et al. Cyber security attacks to modern vehicular systems , 2017, J. Inf. Secur. Appl..
[58] Xiaodong Lin,et al. DeQoS Attack: Degrading Quality of Service in VANETs and Its Mitigation , 2019, IEEE Transactions on Vehicular Technology.
[59] Jana Dittmann,et al. Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures , 2008, Reliab. Eng. Syst. Saf..
[60] Lei Wang,et al. Trajectory tracking and recovery attacks in VANET systems , 2018, Int. J. Commun. Syst..
[61] André Weimerskirch,et al. Truck Hacking: An Experimental Analysis of the SAE J1939 Standard , 2016, WOOT.
[62] Huirong Fu,et al. T-PAAD: Trajectory Privacy Attack on Autonomous Driving , 2018, 2018 IEEE Conference on Communications and Network Security (CNS).
[63] Bin Pang,et al. Research of the interest packet popple broadcast diffusion attack in NDN VANET , 2017, SAC.
[64] R.S.H. Piggin,et al. Safety and security - a story of interdependence , 2015 .
[65] Jain-Shing Wu,et al. Designing a Taxonomy of Web Attacks , 2008, 2008 International Conference on Convergence and Hybrid Information Technology.
[66] Sandro Schulze,et al. IT Security in Automotive Software Development , 2009, Softwaretechnik-Trends.
[67] Thomas Engel,et al. A Car Hacking Experiment: When Connectivity Meets Vulnerability , 2015, 2015 IEEE Globecom Workshops (GC Wkshps).
[68] Xuemin Shen,et al. Connected Vehicles: Solutions and Challenges , 2014, IEEE Internet of Things Journal.
[69] Emilia Mendes,et al. Taxonomies in software engineering: A Systematic mapping study and a revised taxonomy development method , 2017, Inf. Softw. Technol..
[70] Pearl Brereton,et al. Systematic literature reviews in software engineering - A systematic literature review , 2009, Inf. Softw. Technol..
[71] Vrizlynn L. L. Thing,et al. Autonomous Vehicle Security: A Taxonomy of Attacks and Defences , 2016, 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, Physical and Social Computing (CPSCom) and IEEE Smart Data (SmartData).
[72] Hovav Shacham,et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces , 2011, USENIX Security Symposium.
[73] Qassim Nasir,et al. Systematic literature review on Internet-of-Vehicles communication security , 2018, Int. J. Distributed Sens. Networks.
[74] Dong Hoon Lee,et al. A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN , 2015, IEEE Transactions on Intelligent Transportation Systems.
[75] Mario Gerla,et al. Congestion Attacks to Autonomous Cars Using Vehicular Botnets , 2015 .