1 |
Cho, Kyong-Tak, and Kang G. Shin. "Error handling of in-vehicle networks makes them vulnerable." Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. 2016.
|
2 |
Koscher, Karl, et al. "Experimental security analysis of a modern automobile." 2010 IEEE Symposium on Security and Privacy. IEEE, 2010.
|
3 |
Miller, Charlie, and Chris Valasek. "Adventures in automotive networks and control units." Def Con 21 (2013): 260-264.
|
4 |
Miller, Charlie, and Chris Valasek. "Remote exploitation of an unaltered passenger vehicle." Black Hat USA 2015 (2015): 91.
|
5 |
Introduction to CAN (Controller Area Network), https://www.allaboutcircuits.com/techni-cal-articles/introduction-to-can-controller-area-network/, accessed: 2020-11-29
|
6 |
Specification, C. A. N. "Bosch." Robert Bosch GmbH, Postfach 50 (1991).
|
7 |
Stachowski, Stephen, Ron Gaynier, and David J. LeBlanc. An assessment method for automotive intrusion detection system performance. University of Michigan, Ann Arbor, Transportation Research Institute, 2019.
|
8 |
escar 2020 Europe, https://www.escar.info/escar-europe/program.html, accessed: 2020-11-29
|
9 |
Kneib, Marcel, and Christopher Huth. "Scission: Signal characteristic-based sender identification and intrusion detection in automotive networks." Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. 2018.
|
10 |
Cho, Kyong-Tak, and Kang G. Shin. "Fingerprinting electronic control units for vehicle intrusion detection." 25th {USENIX} Security Symposium ({USENIX} Security 16). 2016.
|
11 |
Choi, Wonsuk, et al. "Identifying ecus using inimitable characteristics of signals in controller area networks." IEEE Transactions on Vehicular Technology 67.6 (2018): 4757-4770.
DOI
|
12 |
Pese, Mert D., et al. "LibreCAN: Automated CAN Message Translator." Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security. 2019.
|
13 |
CAN BUS, https://en.wikipedia.org/wiki/CAN_bus, Accessed: 2020-11-29
|
14 |
Checkoway, Stephen, et al. "Comprehensive experimental analyses of automotive attack surfaces." USENIX Security Symposium. Vol. 4. 2011.
|