참고문헌
- A. Saad and U. Weinmann, "Automotive software engineering and concepts," in GI Jahrestagung, pp. 318-319, Frankfurt, Germany, September-October 2003.
- Dongwon Kim, "Traffic Information Service, Inter-Vehicle Communication," The International Journal of Internet, Broadcasting and Communication VOL. 12 No. 3, June, 2012.
- M. Wolf, A. Weimerskirch, and C. Paar, "Security in Automotive Bus Systems," in Proceedings of ESCAR 04, 2004.
- R. Charette, "This car runs on code," Online: http://www.spectrum.ieee.org/feb09/7649, Feb. 2009.
- T. Nolte, H. Hansson and L.L. Bello, "Automotive communications-past, current and future," in Proceedings of ETFA(Emerging Technologies and Factory Automation), 2005. DOI: 10.1109/ETFA.2005.1612631
- K.H. Johansson, M. Torngren, L. Nielsen, "Vehicle applications of controller area network," D. Hristu-Varsakelis, W.S. Levine (Eds.), Handbook of Networked and Embedded Control Systems, Springer (2005) ISBN: 0-8176-3239-5
- CAN in Automation. Webpage, 2004. www.can-cia.org.
- BOSCH CAN. Webpage, 2004. www.can.bosch.com.
- Tobias Hoppe and Jana Dittman. "Sniffing/Replay Attacks on CAN Buses: A simulated attack on the electric window lift classified using an adapted CERT taxonomy". In Proceedings of the 2nd Workshop on Embedded Systems Security (WESS), Salzburg, Austria, 2007.
- Hoppe T, Kiltz S, Dittmann J. "Security threats to automotive CAN networks-practical examples and selected short-term countermeasures," Reliability Engineering & System Safety, Accepted Manuscript, Available online 5 July 2010, in press DOI: 10.1016/j.ress.2010.06.026
- Nilsson, D.K., Larson, U.E., Jonsson, E.: Efficient In-Vehicle Delayed Data Authentication based on Compound Message Authentication Codes. In: Proceedings of the IEEE 68th Vehicular Technology Conference (VTC2008-Fall) (2008) DOI: 10.1109/VETECF.2008.259
- D. K. Nilsson and U. E. Larson, "Secure Firmware Updates over the Air in Intelligent Vehicles," in Proceedings of the First IEEE Vehicular Networking & Applications Workshop (Vehi-Mobi). IEEE, 2008, pp. 380-384. DOI: 10.1109/ICCW.2008.78
- K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, and S. Savage. Experimental security analysis of a modern automobile. The IEEE Symposium on Security and Privacy, Oakland, CA, May 16-19, 2010. DOI: 10.1109/SP.2010.34
- S. Checkoway, D. McCoy, D. Anderson, B. Kantor, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno. "Comprehensive experimental analyses of automotive attack surfaces." In D. Wagner, ed., Proceedings of USENIX Security 2011. USENIX, Aug. 2011.
- Sun Jin Oh "An Anomaly Detection Method for the Security of VANETs", The International Journal of Internet, Broadcasting and Communication, vol. 10, no. 2, pp 77-83, April. 2010.
- W. Samuel, J. HyoJin, and L. DongHoon "A Practical Wireless Attack on the Connected Car and Security Protocol for In-vehicle CAN", IEEE Trans, Intelligent Transportation Systems, vol. 16, no. 2, pp 993-1006,IEEE, 2015. DOI: 10.1109/TITS.2014.2351612
- D. K. Nilsson and Larson, U.E.: "Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks. In: Proceedings of the First ACM International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics). ACM Press, New York (2008)
- S. You, M. Krage, and L. Jalics, "Overview of Remote Diagnosis and Maintenance for Automotive Systems", in 2005 SAE World Congress, Detroit, MI, USA, 2005. DOI: 10.4271/2005-01-1428
- Pierre Kleberger, Tomas Olovsson, and Erland Jonsson, "Security Aspects of the In-Vehicle Network in the Connected Car," EEE Intelligent Vehicles Symposium (IV), Baden-Baden, Germany, June 5-9, 2011
- Black, J., Cochran, M. "MAC Reforgeability", FSE 2009. LNCS, vol. 5665, pp. 345-362. Springer, Heidelberg
- Yasuda, K.: Multilane HMAC-security beyond the birthday limit. INDOCRYPT 2007. LNCS, vol. 4859, pp. 18-32. 2007