IT-Sicherheit und Datenschutz im vernetzten Fahrzeug
Tóm tắt
Từ khóa
Tài liệu tham khảo
A. Herrewege, D. Singelee, I. Verbauwhede, CANAuth–A Simple, Backward Compatible Broadcast Authentication Protocol for CAN, 9th Embedded Security in Cars, 2011
T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh, M. Shalmani, On the power of power analysis in the real world: A complete break of the KeeLoq code hopping scheme, Advances in Cryptology CRYPTO, 2008
R. Verdult, F. Garcia, J. Balasch, Gone in 360 seconds: Hijacking with Hitag2, 21st USENIX Security Symposium, 2012
K. Koscher et al., Experimental Security Analysis of a Modern Automobile, IEEE Symposium on Security and Privacy, 2010
S. Checkoway et al., Comprehensive Experimental Analyses of Automotive Attack Surfaces, 20st USENIX Security Symposium, 2011
C. Miller, C. Valasek, A Survey of Remote Automotive Attack Surfaces, Blackhat, 2014
I. Rouf et al., Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study, 19st USENIX Security Symposium, 2010
K. Nohl, J. Lell, BadUSB–On accessories that turn evil, Blackhat 2014
S. Bono, M. Green, A. Stubblefield, A. Rubin, A. Juels, M. Szydlo, Security Analysis of a Cryptographically-Enabled RFID Device, 14th USENIX Security Symposium, 2005
EVITA: E-safety vehicle intrusion protected applications, http://www.evita- project.org/
PRESERVE: Preparing Secure Vehicle-to-X Communication Systems, https://www.preserve-project.eu
simTD: Sichere Intelligente Mobilität Testfeld Deutschland, http://simtd.de