1 |
K. Koscher et. al., "Experimental Security Analysis of a Modern Automobile", IEEE Symposium on Security and Privacy, 2010.
|
2 |
S. Checkoway et. al., "Comprehensive Experimental Analyses of Automotive Attack Surfaces", 20th USENIX conf. on Security, 2011.
|
3 |
C. Miller and C. Valasek, "Adventures in Automotive Networks and Control Units", Defcon conf., 2013.
|
4 |
C. Miller and C. Valasek, "A Survey of Remote Attack Surfaces", Defcon conf., 2014.
|
5 |
H. Seudie, "Vehicular On-board Security: EVITA Project", C2C-CC Security Workshop, 2009.
|
6 |
P. Papadimitratos et. al., "Secure Vehicular Communication Systems: Design and Architecture", IEEE Communication Magazine, 2008.
|
7 |
U. E. Larson et. al., "An Approach to Specification-based Attack Detection for In-Vehicle Networks", Proc. of the IEEE Intelligent Vehicles Symposium, 2008.
|
8 |
M. Muter et. al., "A Structured Approach to Anomaly Detection for In-Vehicle Networks", International Conf. on Information Assurance and Security, 2010.
|
9 |
M. Brooks, "Anomaly Detection on Vehicle Networks", Escar Conference USA, 2013.
|
10 |
K. Fisher, "High Assurance Cyber Military System: Making sure you are in control of your vehicle", Escar Conference USA, 2013.
|
11 |
G. Klein et. al., "Comprehensive Formal Verification of an OS Microkernel", ACM Trans. on Computer Systems, Feb. 2014.
|
12 |
D. Elkaduwe et. al., "Verified Protection Model of the seL4 Microkernel", Proc. of the 2nd International Conference on Verified Software: Theories, Tools, Experiments. 2008.
|
13 |
G. Heiser et. al., "Towards Trustworthy Computing Systems: Taking Microkernels to the Next Level", ACM SIGOPS Operating Systems Review Vol 41 Issue 4. Jul. 2007.
|
14 |
P. C. Hickey et. al., "Building Embedded Systems with Embedded DSLs", ICFP Sep. 2014.
|