1 |
B. Weyl, et al., "Securing vehicular on-board IT systems: The EVITA Project," in Proc. 25th Joint VDI/VW Automotive Security Conf., Oct. 2009.
|
2 |
A. Van Herrewege, D. Singelee, I. Verbauwhede, "CANAuth - A Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus," in Proc. ESCAR 2011, 2011.
|
3 |
T. Ziermann, S. Wildermann, and J. Teich, "CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16x higher data rates," in DATE. IEEE, 2009, pp. 1088-1093.
|
4 |
Oliver Hartkopp, Cornel Reuber, "MaCAN - Message Authenticated CAN," in Poc. ESCAR 2012, 2012.
|
5 |
T. Matsumoto, et al., "A Method of Preventing Unauthorized Data Transmission in Controller Area Network," Vehicular Technology Conference (VTC Spring), 2012 IEEE 75th, 2012.
|
6 |
R. Kurachi, et al., "CaCAN - Centralized Authentication System in CAN (Controller Area Network)," in Proc. ESCAR 2014.
|
7 |
"Road vehicles - Controller area network (CAN)," ISO 11898, 2003.
|
8 |
K. Koscher, et al., "Experimental security analysis of a modern automible," in Proc. IEEE Symp. Security and Privacy, Oakland, CA, May 16-19, 2010.
|
9 |
S. Checkoway, et al., "Comprehensive Experimental Analyses of Automotive Attack Surfaces," USENIX Security, August 10-12, 2011.
|
10 |
G. Sigl, "Physical Unclonable Functions: Chances and Risks of a new Security Primitive," in Proc. ESCAR 2013.
|