[1]
Koscher, K. ; Czeskis, A. ; Roesner, F. ; Patel, S. ; Kohno, T. ; Checkoway, S. ; McCoy, D. ; Kantor, B. ; Anderson, D. ; Shacham, H. ; Savage, S. Experimental Security Analysis of a Modern Automobile. Security and Privacy (SP), 2010 IEEE Symposium on Digital Object Identifier: 10. 1109/SP. 2010, Page(s): 447 – 462.
DOI: 10.1109/sp.2010.34
Google Scholar
[2]
I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu et al. Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study, in 19th USENIX Security, (2010).
Google Scholar
[3]
A. Francillon, B. Danev, and S. Capkun. Relay attacks on passive keyless entry and start systems in modern cars. In A. Perrig, editor, NDSS 2011. ISOC, Feb. (2011).
Google Scholar
[4]
Dr. Charlie Miller ; Chris Valasek. Adventures in Automotive Networks and Control Units.
Google Scholar
[5]
Chavez ML, Rosete CH, Henriguez FR. Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study. In: Proceedings of the 15thInternational conference on electronics, communications and computers (CONIELECOMP) 2005. pp.166-70.
Google Scholar
[6]
Weimerskirch A, Paar C, Wolf M. Secure in-vehicle communication. In: Lemke K, Paar C, Wolf M, editors. Embedded security in cars. Springer-Verlag; (2006).
DOI: 10.1007/3-540-28428-1_6
Google Scholar
[7]
Szilagyi C, Koopman P. A flexible approach to embedded network multicast authentication. In: 2nd Workshop on embedded systems security (WESS) 2008. pp.165-74.
Google Scholar
[8]
Szilagyi C, Koopman P. Flexible multicast authentication for time-triggered embedded control network applications in dependable systems networks. In: IEEE/IFIP Int Conf on dependable systems networks 2009. pp.165-74.
DOI: 10.1109/dsn.2009.5270342
Google Scholar
[9]
Groll A, Ruland C. Secure and authentic communication on existing in-vehicle networks. In: Proceedings of the IEEE Intelligent vehicles symposium 2009. pp.1093-7.
DOI: 10.1109/ivs.2009.5164434
Google Scholar