sdv, autosar and software factory papers on arxiv and their references
o:original
r: replacement
n:new version
b:bibliography
on | s | pn | rn | title author url | |
---|---|---|---|---|---|
407 | 12 | 2 | eCall in all new cars from April 2018. https://ec.europa.eu/digital-single-market/en/news/ecall-all-new-cars-april-2018 | ||
406 | r | 12 | 1 | Birthday Attack. https://en.wikipedia.org/wiki/Birthday_attack | Introduction to Modern Cryptography Mihir Bellare1 Phillip Rogaway2 May 11, 2005 https://web.cs.ucdavis.edu/~rogaway/classes/227/spring05/book/main.pdf |
408 | n | 12 | 3 | ISO 15765-2:2016. [n. d.]. Road vehicles – Diagnostic communication over Controller Area Network (DoCAN) – Part 2: Transport protocol and network layer services. https://www.iso.org/standard/66574.html | ISO 15765-2:2024 https://www.iso.org/standard/84211.html Road vehicles — Diagnostic communication over Controller Area Network (DoCAN) Part 2: Transport protocol and network layer services |
431 | 12 | 26 | Pedro Umbelino. [n. d.]. OBD-II DONGLE ATTACK: STOPPING A MOVING CAR VIA BLUETOOTH. https://hackaday.com/2017/04/14/obd-ii-dongle-attack-stopping-a-moving-car-via-bluetooth/ | ||
286 | o | 8 | 8 | Angelo Brillout, Nannan He, Michele Mazzucchi, Daniel Kroening, Mitra Purandare, Philipp R¨ummer, and Georg Weissenbacher. Mutation-based test case generation for Simulink models. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 6286 LNCS, pages 208–227, 2010. | https://qiita.com/kaizen_nagoya/items/5fbfcbf2514f96085fa1 |
283 | 8 | 5 | AUTOSAR. Autosar development partnership. http://www.autosar.org, 2018. | ||
280 | b | 8 | 2 | Bernhard K. Aichernig and Florian Lorber. Towards generation of adaptive test cases from partial models of determinized timed automata. In 2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW), pages 1–6. IEEE, apr 2015. | https://qiita.com/kaizen_nagoya/items/63c81caa7271552450f5 |
279 | o | 8 | 1 | Bernhard K. Aichernig, Harald Brandl, Elisabeth J¨ obstl, Willibald Krenn, Rupert Schlick, and Stefan Tiran. Killing strategies for model-based mutation testing. Software Testing, Verification and Reliability, 25(8):716–748, dec 2015. | https://qiita.com/kaizen_nagoya/items/9729745494a7306c62f1 |
354 | b | 10 | 6 | C. Q. Wu, X. Lin, D. Yu, W. Xu and L. Li,"End-to-End Delay Minimization for Scientific Workflows in Clouds under Budget Constraint," in IEEE Transactions on Cloud Computing, vol. 3, no. 2, pp. 169-181, 1 April-June 2015, doi:10.1109/TCC.2014.2358220. | https://qiita.com/kaizen_nagoya/items/879af7b81529f1dfc740 |
358 | b | 10 | 10 | Cheng, S.; Xu, W.; Mueller, K. RadViz Deluxe: An Attribute-Aware Display for Multivariate Data. Processes 2017, 5, 75. https://doi.org/10.3390/pr5040075 | https://qiita.com/kaizen_nagoya/items/d15321c9b24f0fec66fc |
293 | b | 8 | 15 | Cl´ audio Gomes, Romain Franceschini, Nick Battle, Casper Thule, Kenneth Lausdahl, Hans Vangheluwe, and Peter Gorm Larsen. Application of model-based testing to dynamic evaluation of functional mockup units. 2020. | https://qiita.com/kaizen_nagoya/items/778e9014c54f6f9ec456 |
285 | b | 8 | 7 | Daniel Bouskela, Alberto Falcone, Alfredo Garro, Audrey Jardin, Martin Otter, Nguyen Thuy, and Andrea Tundis. Formal requirements modeling for cyber-physical systems engineering: an integrated solution based on form-l and modelica. Requirements Engineering, pages 1–30, 2021. | https://qiita.com/kaizen_nagoya/items/70734f32b6bd19efad78 |
284 | b | 8 | 6 | Fevzi Belli, Christof J. Budnik, Axel Hollmann, Tugkan Tuglular, and W. Eric Wong. Model-based mutation testing—Approach and case studies. Science of Computer Programming, 120:25–48, may 2016. | https://qiita.com/kaizen_nagoya/items/dc3c287411e2902ee996 |
357 | b | 10 | 9 | G. K. L. Tam, H. Fang, A. J. Aubrey, P. W. Grant, P. L. Rosin, D. Marshall, and M. Chen. Visualization of time-series data in parameter space for understanding facial dynamics. Computer Graphics Forum, 30(3):901–910, 2011. | https://qiita.com/kaizen_nagoya/items/da8b88ac3c63e0947d2d |
350 | b | 10 | 2 | J. Liu, Z. Wang and L. Zhang, "Integrated Vehicle-Following Control for Four-Wheel-Independent-Drive Electric Vehicles Against Non-Ideal V2X Communication," in IEEE Transactions on Vehicular Technology, vol.71, no. 4, pp. 3648-3659, April 2022, doi:10.1109/TVT.2022.3141732. | https://qiita.com/kaizen_nagoya/items/441b58f1840b0a4675b9 |
352 | b | 10 | 4 | J. Yang, "Key Technologies and Optimization for Dynamic Migration of Virtual Machines in Cloud Computing," 2012 Second International Conference on Intelligent System Design and Engineering Application, 2012, pp. 643-647, doi:10.1109/ISdea.2012.742. | https://qiita.com/kaizen_nagoya/items/9924242f661b487b168b |
287 | b | 8 | 9 | Jian Chen, Manar H Alalfi, Thomas R Dean, and S Ramesh. Modeling autosar implementations in simulink. In European Conference on Modelling Foundations and Applications, pages 279–292. Springer, 2018. | https://qiita.com/kaizen_nagoya/items/be28d57ac100d31fa009 |
363 | b | 10 | 15 | Li, M. Q., Xiong, A. M., Cheng, S. H., Huang, W. C., Li, Y. C., & Lin, H. (2004). Effects of process parameters on the microstructure during the hot compression of a TC6 titanium alloy. Rare Metals, 23(3), 263-268. | https://qiita.com/kaizen_nagoya/items/afc62a4b62e821eb2fb4 |
351 | 10 | 3 | Li, R., Cheng, S., Luo, C. et al. Epidemiological Characteristics and Spatial-Temporal Clusters of Mumps in Shandong Province, China, 2005–2014. Sci Rep 7, 46328 (2017). | https://qiita.com/kaizen_nagoya/items/93b319b2bc2a663779c3 | |
282 | 8 | 4 | Rajeev Alur and David L. Dill. A theory of timed automata. Theoretical Computer Science, 126(2):183–235, apr 1994. | https://qiita.com/kaizen_nagoya/items/53e57015c12cf76f8d20 | |
349 | 10 | 1 | S. Cheng and K. Mueller, "The Data Context Map: Fusing Data and Attributes into a Unified Display," in IEEE Transactions on Visualization and Computer Graphics, vol. 22, no. 1, pp. 121-130, 31 Jan. 2016, doi:10.1109/TVCG.2015.2467552. | https://qiita.com/kaizen_nagoya/items/59eb304fdd45763ac3da | |
367 | 10 | 19 | S. Cheng et al., "Model-driven visual analytics for big data," 2016 New York Scientific Data Summit (NYSDS), 2016, pp.1-2, doi: 10.1109/NYSDS.2016.7747827. | https://qiita.com/kaizen_nagoya/items/acb5ccd5f52843dc144d | |
362 | 10 | 14 | S. Cheng, K. Mueller and W. Xu, "A framework to visualize temporal behavioral relationships in streaming multivariate data," 2016 New York Scientific Data Summit (NYSDS), 2016, pp. 1-10, doi:10.1109/NYSDS.2016.7747808. | ||
361 | 10 | 13 | S. Cheng, P. De, S. H. . -C. Jiang and K. Mueller, "TorusVis^ND: Unraveling High-Dimensional Torus Networks for Network Traffic Visualizations," 2014 First Workshop on Visual Performance Analysis, 2014, pp. 9-16, doi: 10.1109/VPA.2014.7. | ||
353 | 10 | 5 | S. Cheng, W. Xu and K. Mueller, "ColorMapND: A Data-Driven Approach and Tool for Mapping Multivariate Data to Color," in IEEE Transactions on Visualization and Computer Graphics, vol.25, no. 2, pp. 1361-1377, 1 Feb. 2019, doi:10.1109/TVCG.2018.2808489. | ||
360 | 10 | 12 | S. Cheng, W. Zhong, K. E. Isaacs and K. Mueller, "Visualizing the Topology and Data Traffic of Multi-Dimensional Torus Interconnect Networks," in IEEE Access, vol. 6, pp. 57191-57204, 2018, doi:10.1109/ACCESS.2018.2872344. | ||
365 | 10 | 17 | S. Cheng, Z. Jiang, Q. Qi, S. Li and X. Meng, "The Polar Parallel Coordinates Method for Time-Series Data Visualization," 2012 Fourth International Conference on Computational and Information Sciences, 2012, pp. 179-182, doi: 10.1109/ICCIS.2012.334. | ||
368 | 10 | 20 | S. Garc´ıa and F. Herrera. An extension on “statistical comparisons of classifiers over multiple data sets” for all pairwise comparisons. Journal of Machine Learning Research, 9:2677–2694, 2008. | https://qiita.com/kaizen_nagoya/items/4e9ad26d597309890d44 | |
355 | 10 | 7 | Shenghui Cheng and K. Mueller, "Improving the fidelity of contextual data layouts using a Generalized Barycentric Coordinates framework," 2015 IEEE Pacific Visualization July/August 2019 3 Department Head Symposium (PacificVis), 2015, pp. 295-302, doi: 10.1109/PACIFICVIS.2015.7156390. | https://qiita.com/kaizen_nagoya/items/c8969d82e9cbaa3a3c38 | |
356 | 10 | 8 | Yan X, Zhang N, Cheng S, Wang Z, Qin Y. Gender Differences in Vitamin D Status in China. Med Sci Monit. 2019;25:7094-7099. Published 2019 Sep 21. doi:10.12659/MSM.916326 | https://qiita.com/kaizen_nagoya/items/cb0a21632f23e98e78ff | |
366 | 10 | 18 | Z. Jiang, S. Cheng, X. Meng and Z. Zhang, "Research on time-series data visualization method based on parameterized parallel coordinates and color mapping function," 2012 International Conference on Systems and Informatics (ICSAI2012), 2012, pp. 510-514, doi: 10.1109/ICSAI.2012.6223048. | ||
364 | 10 | 16 | Z. Zhang, Z. Jiang, X. Meng, S. Cheng and W. Sun, "Research on prediction method of api based on the enhanced moving average method," 2012 International Conference on Systems and Informatics (ICSAI2012), 2012, pp. 2388-2392, doi:10.1109/ICSAI.2012.6223534. | ||
359 | 10 | 11 | Zhong, Wen, et al. "Evolutionary visual analysis of deep neural networks." ICML Workshop on Visualization for Deep Learning. 2017. | ||
2 | 1 | 1 | AMD LogiCORE™ CAN IP core ,” https://www.xilinx.com/products/intellectual-property/do-di-can.html, last accessed:26.6.2024. | ||
3 | 1 | 2 | CAN Injection: Keyless Car Theft,” https://kentindell.github.io/2023/04/03/can-injection/, last accessed: 29.8.2024. | ||
217 | 6 | 19 | Dependable Real-time Infrastructure for Safery-critical Computer,” https://derisc-project.eu/ . Figure 5: (a) Original CLINT + PLIC interrupt interface. (b) Improved CLIC + PLIC interrupt interface. Figure 6: Worst-case overhead of CVA6 with CLINT and CLIC interrupt controllers against the Cortex-R5. https://github.com/riscv/riscv-plic-spec/blob/master/riscv-plic.adoc , 2022. | ||
239 | 6 | 41 | micro-ROS,” https://micro.ros.org/. | ||
4 | 1 | 3 | NXP FlexCAN Controller,” https://www.nxp.com/products/nxp-product-information/ip-block-licensing/flexcan-controller: FLEXCAN-CONTROLLER, last accessed: 26.6.2024. | ||
257 | 7 | 13 | 3rd D. Eastlake, “Domain Name System Security Extensions,” IETF, RFC 2535, Mar. 1999. | ||
467 | 15 | 8 | A. Biondi and M. Di Natale, “Achieving predictable multicore execution of automotive applications using the LET paradigm,” in 2018 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS), Apr. 2018, pp. 240–250. | ||
109 | 3 | 34 | A. Casparsen, D. G. Sϕrensen, J. N. Andersen, J. I. Christensen, P. Antoniou, R. Krϕyer, T. Madsen, and K. Gjoerup, “Closing the security gaps in some/ip through implementation of a host-based intrusion detection system,” in 2022 25th International Symposium on Wireless Personal Multimedia Communications (WPMC). IEEE, 2022, pp. 436–441. | ||
18 | 1 | 17 | A. de Faveri Tron, S. Longari, M. Carminati, M. Polino, and S. Zanero, “CANflict: Exploiting Peripheral Conflicts for DataLink Layer Attacks on Automotive Networks,” in Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security (CCS), 2022, DOI: 10.1145/3548606.3560618. | ||
187 | 5 | 18 | A. Ferrari, M. Di Natale, G. Gentile, G. Reggiani, and P. Gai. Time and memory tradeoffs in the implementation of AUTOSAR components. In 2009 Design, Automation & Test in Europe Conference & Exhibition, pages 864–869. IEEE, apr 2009. | ||
149 | 4 | 22 | A. Fox and M. Myreen: A Trustworthy Monadic Formalization of the ARMv7 Instruction Set Architecture. International Conference on Interactive Theorem Proving, pp.243–258, 2010. | ||
222 | 6 | 24 | A. Gruin, T. Carle, H. Cass´e, and C. Rochange, “Speculative execution and timing predictability in an open source risc-v core,” in 2021 IEEE Real-Time Systems Symposium (RTSS), 2021, pp. 393–404. | ||
274 | 7 | 30 | A. Gulbrandsen et al., “A DNS RR for specifying the location of services (DNS SRV),” IETF, RFC 2782, Feb. 2000. | ||
164 | 4 | 37 | A. Hall: Seven myths of formal methods,IEEE Software, vol. 7, no. 5, pp. 11-19, Sept. 1990. | ||
255 | 7 | 11 | A. Kampmann et al., “A Dynamic Service-Oriented Software Architecture for Highly Automated Vehicles,” in 2019 IEEE Intelligent Transportation Systems Conference (ITSC). 2019, pp. 2101–2108. | ||
121 | 3 | 46 | A. Kleyner and R. Knoell, “Calculating probability metric for random hardware failures (pmhf) in the new version of iso 26262 functional safety-methodology and case studies,” SAE Technical Paper, Tech. Rep., 2018. | ||
230 | 6 | 32 | A. Kurth, B. Forsberg, and L. Benini, “Herov2: Full-stack open-source research platform for heterogeneous computing,” 2022.Online | ||
250 | 7 | 6 | A. Mart´ınez-Cruz et al., “Security on in-vehicle communication protocols: Issues, challenges, and future research directions,” Computer Communications, vol. 180, pp. 1–20, 2021. | ||
115 | 3 | 40 | A. R. Javed, S. Ur Rehman, M. U. Khan, M. Alazab, and T. Reddy, “Canintelliids: Detecting in-vehicle intrusion attacks on a controller area network using cnn and attention-based gru,” IEEE transactions on network science and engineering, vol. 8, no. 2, pp. 1456–1466, 2021. | ||
84 | 3 | 9 | A. S. of Quality (ASQ). Failure Modes and Effects Analysis (FMEA). | ||
113 | 3 | 38 | A. Taylor, N. Japkowicz, and S. Leblanc, “Frequency-based anomaly detection for the automotive can bus,” in 2015 World Congress on Industrial Control Systems Security (WCICSS). IEEE, 2015, pp. 45–49. | ||
205 | 6 | 7 | A. Waterman, Y. Lee, R. Avizienis, D. A. Patterson, and K. Asanovi´c, “The risc-v instruction set manual volume ii: Privileged architecture version 1.9,” EECS Department, University of California, Berkeley,Tech. Rep. UCB/EECS-2016-129, Jul 2016. Online | ||
26 | 2 | 2 | Abdelrahman Ahmed Omar Abdelgawad, Youssief Ahmed Mohamed Anas Morsy, Mohamed Emad Mohamed Mohi, Ahmed Tawfeeq Elsayed, and Mohamed Ahmed Ezzat Tahoon. Shared autonomy steering haptic assistance: A deep reinforcement learning approach, 2024. Supervised by Dr. Haitham El-Hussieny and Dr. Victor Parque. | ||
459 | 15 | 0 | Achieving Determinism in Adaptive AUTOSAR Christian Menard, Andres Goens, Marten Lohstroh, Jeronimo Castrillon https://arxiv.org/pdf/1912.01367 | ||
419 | 388 | 12 | 14 | Ahmed Hazem and HA Fahmy. 2012. Lcap-a lightweight can authentication protocol for securing in-vehicle networks. In 10th escar Embedded Security in Cars Conference, Berlin, Germany, Vol. 6. | |
388 | 11 | 19 | Ahmed Hazem and HA Fahmy. Lcap-a lightweight can authentication protocol for securing in-vehicle networks. In 10th escar Embedded Security in Cars Conference, Berlin, Germany, volume 6, 2012. | ||
195 | 5 | 26 | Alessandro Biondi, Paolo Pazzaglia, Alessio Balsini, and Marco Di Natale. Logical execution time implementation and memory optimization issues in autosar applications for multicores. In International Workshop on Analysis Tools and Methodologies for Embedded and Real-time Systems (WATERS), 2017. | ||
411 | 12 | 6 | Alessandro Bruni, Michal Sojka, Flemming Nielson, and Hanne Riis Nielson. 2014. Formal Security Analysis of the MaCAN Protocol. In Integrated Formal Methods, Elvira Albert and Emil Sekerinski (Eds.). Springer International Publishing, Cham, 241–255. | ||
289 | 8 | 11 | Alessandro Cornaglia, Shakib Hasan, Alexander Viehl, Oliver Bringmann, and Wolfgang Rosenstiel. Modeltime: Fully automated timing exploration of simulink models for embedded processors. In AmE 2019 - Automotive meets Electronics; 10th GMM- Symposium, pages 1–6, 2019. | ||
343 | 9 | 21 | Alex Oyler, “Software-defined vehicles foreshadow the union of Silicon Valley & the automotive industry,” https://www.sbdautomotive.com/en/software-defined-vehicles | ||
27 | 2 | 3 | AlveyTech. Alveytech 24v 250w electric motor, 2025. Accessed: 2025-02-05. | ||
28 | 2 | 4 | AmpFlow. Ampflow s-400-24 power supply, 2025. Accessed: 2025-02-05. | ||
424 | 12 | 19 | Andreas Mueller, Timo Lothspeich, and Robert Bosch. 2015. Plug-and-Secure Communication for CAN. In CAN Newsletter. | ||
186 | 5 | 17 | Andreas Naderlinger, Josef Templ, and Wolfgang Pree. Simulating real-time software components based on logical execution time. In Proceedings of the 2009 Summer Computer Simulation Conference, SCSC ’09, pages 148–155, Vista, CA, 2009. Society for Modeling & Simulation International. | ||
192 | 5 | 23 | Andreas Naderlinger. Simulating preemptive scheduling with timing-aware blocks in Simulink. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, pages 758–763. IEEE, mar 2017. | ||
305 | 192 | 8 | 27 | Andreas Naderlinger. Simulating preemptive scheduling with timing-aware blocks in Simulink. In Design, Automation & Test in Europe Conference & Exhibition (DATE), 2017, pages 758–763. IEEE, mar 2017. | |
427 | 12 | 22 | Andreea-Ina Radu and Flavio D. Garcia. 2016. LeiA: A Lightweight Authentication Protocol for CAN. In Computer Security - ESORICS 2016 - 21st European Symposium on Research in Computer Security, Heraklion, Greece, September 26-30, 2016, Proceedings, Part II. 283–300. https://doi.org/10.1007/978-3-319-45741-3_15 | ||
396 | 11 | 27 | Andreea-Ina Radu and Flavio D. Garcia. Leia: A lightweight authentication protocol for can. In Ioannis Askoxylakis, Sotiris Ioannidis, Sokratis Katsikas, and Catherine Meadows, editors, Computer Security ESORICS 2016, pages 283–300, Cham, 2016. Springer International Publishing. | ||
33 | 2 | 9 | Andrew Baker and Sarah Johnson. Real-time communication in automotive networks using can protocols. IEEE Transactions on Vehicular Technology, 68(6):3547–3560, 2019. | ||
48 | 2 | 24 | Andrew Green and Michelle White. Error detection and correction in controller area network (can). Automotive Safety Journal, 18(2):75–89, 2020. | ||
34 | 2 | 10 | Andrew J. Baker and Michelle L. Stone. Integrating can and spi protocols for efficient communication in automotive systems. IEEE Transactions on Vehicular Technology, 69(5):4567–4580, 2020. | ||
432 | 399 | 12 | 27 | Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. 2011. CANAuth-a simple, backward compatible broadcast authentication protocol for CAN bus. In ECRYPT Workshop on Lightweight Cryptography. Vol. 2011. | |
399 | 11 | 30 | Anthony Van Herrewege, Dave Singelee, and Ingrid Verbauwhede. Canauth-a simple, backward compatible broadcast authentication protocol for can bus. In ECRYPT Workshop on Lightweight Cryptography. Vol. 2011., 2011. | ||
243 | 6 | 45 | ARM, “Cortex®-M3 Technical reference manual,” https://developer.arm.com/documentation/ddi0337/latest/ , Tech. Rep., 2008. | ||
371 | 11 | 2 | ARM. Arm TrustZone Technology, 2020. | ||
403 | 11 | 34 | Artem Yushev, Mohammed Barghash, Minh Phuong Nguyen, Andreas Walz, and Axel Sikora. Tls-over-can: An experimental study of internet-grade end-to-end communication security for can networks. IFAC- PapersOnLine, 51(6):96 – 101, 2018. 15th IFAC Conference on Programmable Devices and Embedded Systems PDeS 2018. | ||
435 | 13 | 1 | Atlidakis, V., Andrus, J., Geambasu, R., Mitropoulos, D., Nieh, J., 2016. POSIX abstractions in modern operating systems: the old, the new, and the missing, in: Proceedings of the Eleventh European Conference on Computer Systems. Presented at the EuroSys ’16: Eleventh EuroSys Conference 2016, ACM, London United Kingdom, pp. 1–17. https://doi.org/10.1145/2901318.2901350 | ||
244 | 7 | 0 | Authenticated and Secure Automotive Service Discovery with DNSSEC and DANE Mehmet Mueller, Timo Häckel, Philipp Meyer, Franz Korf, Thomas C. Schmidt https://arxiv.org/pdf/2303.15128 | ||
252 | 77 | 7 | 8 | AUTomotive Open System ARchitecture Consortium, “SOME/IP Protocol Specification,” AUTOSAR, Tech. Rep. 696, Nov. 2022. | |
256 | 101 | 7 | 12 | AUTomotive Open System ARchitecture Consortium, “SOME/IP Service Discovery Protocol Specification,” AUTOSAR, Tech. Rep. 802, Nov. 2021. | |
487 | 16 | 5 | AUTOSAR Consortium (2013): AUTomotive Open System ARchitecture, standard documents. https://autosar.org/. | ||
488 | 16 | 6 | AUTOSAR Consortium (2014): Acceptance Test Specification of Communication on CAN bus – Release 1.0.0. | ||
44 | 2 | 20 | AUTOSAR Consortium. Autosar architecture: The cornerstone of scalable automotive software development. AUTOSAR Technical Report, 3:1–15, 2018. | ||
30 | 2 | 6 | AUTOSAR Development Partnership. AUTOSAR Architecture Overview, 2021. | ||
32 | 2 | 8 | AUTOSAR Development Partnership. AUTOSAR Specification of Memory Services, 2022. | ||
31 | 2 | 7 | AUTOSAR Development Partnership. AUTOSAR Specification of Software Update Management, 2021. | ||
211 | 6 | 13 | AUTOSAR, “Adaptive Platform,” https://www.autosar.org/standards/adaptive-platform/, AUTOSAR, Standard. | ||
119 | 3 | 44 | AUTOSAR, “AUTOSAR software specification: Diagnostic event manager,” https://www.autosar.org/fileadmin/standards/R20-11/CP/AUTOSAR SWS DiagnosticEventManager.pdf, 2020. | ||
210 | 6 | 12 | AUTOSAR, “Classic platform,” https://www.autosar.org/standards/classic-platform/, AUTOSAR, Standard. | ||
470 | 224 | 15 | 11 | AUTOSAR, “SOME/IP protocol specification,” AUTOSAR FO Release 1.5.0, Oct. 2018. | |
224 | 6 | 26 | AUTOSAR, “SOME/IP Protocol Specification,” https://www.autosar.org/fileadmin/user upload/standards/foundation/21-11/AUTOSAR PRS SOMEIPProtocol.pdf. | ||
100 | 224 | 3 | 25 | AUTOSAR, “SOME/IP Protocol Specification,” in In AUTOSAR Foundation Release R19-11. Munich, Germany: AUTOSAR, 2019, p. 696. | |
468 | 15 | 9 | AUTOSAR, “Specification of communication management,” AUTOSAR AP Release 19-03, Mar. 2019. | ||
473 | 15 | 14 | AUTOSAR, “Specification of execution management,” AUTOSAR AP Release 19-03, Mar. 2019. | ||
6 | 1 | 5 | Autosar, “Specification of Secure Onboard Communication Protocol, AUTOSAR FO R20-11,” Standard, 2020, https://www.autosar.org/fileadmin/standards/R20-11/FO/AUTOSAR PRS SecOcProtocol.pdf. | ||
480 | 15 | 21 | AUTOSAR, “Specification of time synchronization for adaptive platform,” AUTOSAR AP Release 19-03, Mar. 2019. | ||
466 | 15 | 7 | AUTOSAR, “Specification of timing extensions,” AUTOSAR CP Release 4.4.0, Oct. 2018. | ||
77 | 3 | 2 | AUTOSAR. (2022) SOME/IP Protocol Specification. Accessed on 20 April 2023. | ||
101 | 3 | 26 | AUTOSAR. (2022) SOME/IP Service Discovery Protocol Specification. Accessed on 20 April 2023. | ||
409 | 12 | 4 | AUTOSAR. [n. d.]. “Specification of Module Secure Onboard Communication - AUTOSAR Release 4.2.2.”. https://www.autosar.org/fileadmin/user_upload/standards/classic/4-2/AUTOSAR_SWS_SecureOnboardCommunication.pdf | ||
410 | 12 | 5 | AUTOSAR. [n. d.]. “Specification of Secure Onboard Communication - AUTOSAR CP Release 4.3.1”. https://www.autosar.org/standards/classic-platform/classic-platform-431/ | ||
170 | 5 | 1 | AUTOSAR. Autosar development partnership. http://www.autosar.org, 2021. | ||
372 | 11 | 3 | AUTOSAR. Requirements on Secure Onboard Communication, 2019. | ||
373 | 11 | 4 | AUTOSAR. Specification of Key Manager, 2019. | ||
374 | 11 | 5 | AUTOSAR. Specification of Secure Onboard Communication AUTOSAR CP R19-11, 2019. | ||
339 | 9 | 17 | AUTOSAR. Standards. Accessed: Sep. 18, 2021.Online | ||
471 | 15 | 12 | AYTISAR, “SOME/IP service discovery protocol specification,” AUTOSAR FO Release 1.5.0, Oct. 2018. | ||
417 | 12 | 12 | B. Groza and P. Murvay. 2018. Security Solutions for the Controller Area Network: Bringing Authentication to In-Vehicle Networks. IEEE Vehicular Technology Magazine 13, 1 (March 2018), 40–47. https://doi.org/10.1109/MVT.2017.2736344 | ||
276 | 7 | 32 | B. M. Schwartz et al., “Service binding and parameter specification via the DNS (DNS SVCB and HTTPS RRs),” IETF, Internet-Draft draft-ietf-dnsop-svcb-https-11, Oct. 2022, work in Progress. | ||
272 | 7 | 28 | B. Ma et al., “An Authentication and Secure Communication Scheme for In-Vehicle Networks Based on SOME/IP,” Sensors, vol. 22, pp. 1–23, Jan. 2022. | ||
108 | 3 | 33 | B. Ma, S. Yang, Z. Zuo, B. Zou, Y. Cao, X. Yan, S. Zhou, and J. Li, “An authentication and secure communication scheme for in-vehicle networks based on some/ip,” Sensors, vol. 22, no. 2, p. 647, 2022. | ||
328 | 9 | 6 | Bagloee, S.A., Tavana, M., Asadi, M. et al. Autonomous vehicles: challenges, opportunities, and future implications for transportation policies. J. Mod. Transport. 24, 284–303, 2016. https://doi.org/10.1007/s40534-016-0117-3 | ||
375 | 11 | 6 | BBC. Hack attacks mounted on car control systems. https://www.bbc.com/news/10119492, 2010. | ||
281 | 8 | 3 | Bernhard K. Aichernig, Florian Lorber, and Dejan Niˇ ckovi´ c. Time for mutants - Model-based mutation testing with timed automata. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 7942 LNCS, pages 20–38. Springer, Berlin, Heidelberg, 2013. | ||
273 | 7 | 29 | BMW AG, “vsomeip v3.1.20.3,” GitHub repository.Online | ||
418 | 12 | 13 | Bogdan Groza, Stefan Murvay, Anthony Van Herrewege, and Ingrid Verbauwhede. 2012. Libra-can: a lightweight broadcast authentication protocol for controller area networks. In International Conference on Cryptology and Network Security. Springer, 185–200. | ||
387 | 11 | 18 | Bogdan Groza, Stefan Murvay, Anthony Van Herrewege, and Ingrid Verbauwhede. Libra-can: a lightweight broadcast authentication protocol for controller area networks. In International Conference on Cryptology and Network Security, pages 185–200, Cham, 2012. Springer. | ||
436 | 13 | 2 | Bunzel, S., 2011. AUTOSAR – the Standardized Software Architecture. Inform.-Spektrum 34, 79–83. https://doi.org/10.1007/s00287-010-0506-7 | ||
141 | 4 | 14 | C. A. R. Hoare: Communicating sequential processes, Communications of ACM, Vol. 21, No.8, pp.666–677, 1978. | ||
451 | 14 | 2 | C. Esposito, A. Natale, P. Berardino, G. Palmese, R. Lanari and S. Perna, "AXIS: an airborne X-band interferometric FMCW SAR system,” in Proc. IEEE Int. Geosci. Remote Sensing Symp., Valencia, Spain, Jul. 2018, pp. 5697-5699. | ||
474 | 15 | 15 | C. Hewitt, “Viewing control structures as patterns of passing messages,” Artificial intelligence, vol. 8, no. 3, pp. 323–364, 1977. | ||
193 | 5 | 24 | C. L. Liu and James W. Layland. Scheduling Algorithms for Multiprogramming in a Hard- Real-Time Environment Scheduling Algorithms for Multiprogramming. Journal of the Association for Computing Machinery, 20(1):46–61, jan 1973. | ||
465 | 15 | 6 | C. M. Kirsch and A. Sokolova, “The logical execution time paradigm,” in Advances in Real-Time Systems, S. Chakraborty and J. Ebersp¨ acher, Eds. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012, pp. 103–120. | ||
247 | 7 | 3 | C. Miller and C. Valasek, , “Remote Exploitation of an Unaltered Passenger Vehicle,” Black Hat USA, vol. 2015, p. 91, 2015. | ||
246 | 7 | 2 | C. Miller and C. Valasek, “A Survey of Remote Automotive Attack Surfaces,” Black Hat USA, vol. 2014, 2014. | ||
91 | 3 | 16 | C. Miller and C. Valasek, “Adventures in automotive networks and control units,” Def Con, vol. 21, no. 260-264, pp. 15–31, 2013. | ||
80 | 3 | 5 | C. Miller and C. Valasek, “Remote exploitation of an unaltered passenger vehicle,” Black Hat USA, vol. 2015, no. S 91, pp. 1–91, 2015. | ||
308 | 8 | 30 | C. Norstrom, A. Wall, and Wang Yi. Timed automata as task models for event-driven systems. In Proceedings Sixth International Conference on Real-Time Computing Systems and Applications. RTCSA’99 (Cat. No.PR00306), pages 182–189, 1999. | ||
426 | 12 | 21 | C. Reuber O.Hartkopp and R.Schilling. [n. d.]. "MaCAN-message authenticated CAN", Proc. 10th Int. Conf. Embedded Security in Cars (ESCAR) (Ed.). | ||
87 | 3 | 12 | C. Schmittner, Z. Ma, and P. Smith, “Fmvea for safety and security analysis of intelligent and cooperative vehicles,” in Computer Safety, Reliability, and Security: SAFECOMP 2014 Workshops: ASCoMS, DECSoS, DEVVARTS, ISSE, ReSA4CI, SASSUR. Florence, Italy, September 8-9, 2014. Proceedings 33. Springer, 2014, pp. 282–288. | ||
233 | 6 | 35 | C. Scordino and G. Lipari, “Linux and real-time: Current approaches and future opportunities,” in IEEE International Congress ANIPLA, 2006. | ||
227 | 6 | 29 | C. Scordino, A. G. Mari˜no, and F. Fons, “Hardware acceleration of data distribution service (dds) for automotive communication and computing,” IEEE Access, vol. 10, pp. 109 626–109 651, 2022. | ||
241 | 6 | 43 | C. Scordino, I. M. Savino, L. Cuomo, L. Miccio, A. Tagliavini, M. Bertogna, and M. Solieri, “Real-time virtualization for industrial automation,” in 2020 25th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA), vol. 1. IEEE, 2020, pp.353–360. | ||
1 | 1 | 0 | CAIBA: Multicast Source Authentication for CAN Through Reactive Bit Flipping Eric Wagner, Frederik Basels, Jan Bauer, Till Zimmermann, Klaus Wehrle, Martin Henze https://arxiv.org/pdf/2504.16695 | ||
41 | 2 | 17 | Canoz Civelek. Lane detection with steering and departure. https://github.com/canozcivelek/lane-detection-with-steer-and-departure, 2021. | ||
191 | 5 | 22 | Caroline Brandberg and Marco Di Natale. A SimEvents Model for the Analysis of Scheduling and Memory Access Delays in Multicores. In 2018 IEEE 13th International Symposium on Industrial Embedded Systems (SIES), pages 1–10. IEEE, jun 2018. | ||
311 | 8 | 33 | Chanchal K. Roy and James R. Cordy. A mutation / injection-based automatic framework for evaluating code clone detection tools. In IEEE International Conference on Software Testing, Verification, and Validation Workshops, ICSTW 2009, pages 157–166, 2009. | ||
312 | 8 | 34 | Chanchal K. Roy, James R. Cordy, and Rainer Koschke. Comparison and evaluation of code clone detection techniques and tools: A qualitative approach. Science of Computer Programming, 74(7):470–495, may 2009. | ||
326 | 9 | 4 | Chaowei Yang, Qunying Huang, Zhenlong Li, Kai Liu & et al, “Big Data and cloud computing: innovation opportunities and challenges,” International Journal of Digital Earth, vol. 10, no.1, pp 13-53, 2016, DOI: 10.1080/17538947.2016.1239771 | ||
412 | 12 | 7 | Charlie Miller Chris Valasek. 2014. Adventures in Automotive Networks and Control Units. http://illmatics.com/car_hacking.pdf. | ||
381 | 11 | 12 | Charlie Miller Chris Valasek. Adventures in Automotive Networks and Control Units, 2020. | ||
437 | 13 | 3 | Choi, D.-K., Jung, J.-H., koh, S.-J., Kim, J.-I., Park, J., 2019. In-Vehicle Infotainment Management System in Internet-of-Things Networks, in: 2019 International Conference on Information Networking (ICOIN). Presented at the 2019 International Conference on Information Networking (ICOIN), IEEE, Kuala Lumpur, Malaysia, pp. 88–92. https://doi.org/10.1109/ICOIN.2019.8718192 | ||
398 | 11 | 29 | Chris Valasek and Charlie Miller. Remote Exploitation of an Unaltered Passenger Vehicle. http://illmatics.com/Remote%20Car%20Hacking. pdf, 2015. | ||
298 | 8 | 20 | Christopher Henard, Mike Papadakis, Gilles Perrouin, Jacques Klein, and Yves Le Traon. Assessing Software Product Line Testing Via Model-Based Mutation: An Application to Similarity Testing. In 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation Workshops, pages 188–197. IEEE, mar 2013. | ||
422 | 12 | 17 | Chung-Wei Lin and Alberto Sangiovanni-Vincentelli. 2012. Cyber-security for the Controller Area Network (CAN) communication protocol. In Cyber Security (CyberSecurity), 2012 International Conference on. IEEE, 1–7. | ||
369 | 11 | 0 | CINNAMON: A Module for AUTOSAR Secure Onboard CommunicationGiampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci https://arxiv.org/pdf/2111.12026 | ||
379 | 11 | 10 | Cinzia Bernardeschi, Marco Di Natale, Gianluca Dini, and Dario Varano. Modeling and generation of secure component communications in AUTOSAR. In Proceedings of the Symposium on Applied Computing, SAC ’17, page 1473–1480, New York, NY, USA, 2017. Association for Computing Machinery. | ||
294 | 8 | 16 | Cl´ audio Gomes, Casper Thule, David Broman, Peter Gorm Larsen, and Hans Vangheluwe. Cosimulation: a survey. ACM Computing Surveys (CSUR), 51(3):1–33, 2018. | ||
434 | 13 | 0 | Comparison between autosar platforms with functional safety for automotive software architectures Youssef Elkharaz, Saad Motahhir, Abdelaziz Elghzizal https://arxiv.org/pdf/2109.00099 | ||
43 | 2 | 19 | Components101. What is bootloader in microcontroller? why do you need it?, 2023. Accessed: 2025-01-25. | ||
10 | 1 | 9 | D. Boneh and V. Shoup, A Graduate Course in Applied Cryptography, 2023. | ||
264 | 7 | 20 | D. Cooper et al., “Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile,” IETF, RFC 5280, May 2008. | ||
275 | 7 | 31 | D. Crocker, “Scoped Interpretation of DNS Resource Records through ’Underscored’ Naming of Attribute Leaves,” IETF, RFC 8552, Mar. 2019. | ||
162 | 4 | 35 | D. H. Vu, Y. Chiba et al.: Verifying OSEK/VDX OS Design using Its Formal Specification, TASE, pp.81-88, 2016. | ||
450 | 14 | 1 | D. Jung and S.-O. Park, "Ku-band car-borne FMCW stripmap synthetic aperture radar," in Proc. 2019 Int. Symp. Antennas Propag., Phuket, Thailand, Oct. 2017, pp. 1-2. | ||
454 | 14 | 5 | D. Jung, D. Kim, M. T. Azim, J. Park and S. Park, "A novel signal processing technique for Ku-band automobile FMCW fully polarimetric SAR system using triangular LFM," IEEE Trans. Instrum. Meas., Early Access, pp. 1-10, Jul. 2020. | ||
453 | 14 | 4 | D. Jung, H. Kang, C. Kim, J. Park and S.-O. Park, "Sparse scene recovery for high-resolution automobile FMCW SAR via scaled compressed sensing," in IEEE Trans. Geosci. Remote Sens., vol. 57, no. 12, pp.10136-10146, Dec. 2019. | ||
165 | 4 | 38 | D. Lee. and M. Yannakakis: Principles and methods of testing finite state machines- a survey, in Proceedings of the IEEE, vol. 84, no. 8, pp. 1090-1123, 1996. | ||
107 | 3 | 32 | D. Ren, S. Du, and H. Zhu, “A novel attack tree based risk assessment approach for location privacy preservation in the vanets,” in 2011 IEEE International Conference on Communications (ICC). IEEE, 2011, pp.1–5. | ||
428 | 12 | 23 | D. Stabili, L. Ferretti, and M. Marchetti. 2018. Analyses of Secure Automotive Communication Protocols and Their Impact on Vehicles Life-Cycle. In 2018 IEEE International Conference on Smart Computing (SMARTCOMP). 452–457. https://doi.org/10.1109/SMARTCOMP.2018.00045 | ||
271 | 7 | 27 | D. Zelle et al., “Analyzing and Securing SOME/IP Automotive Services with Formal and Practical Methods,” in The 16th International Conference on Availability, Reliability and Security, ser. ARES 21. ACM, Aug. 2021, pp. 1–20. | ||
78 | 3 | 3 | D. Zelle, T. Lauser, D. Kern, and C. Krauß, “Analyzing and securing some/ip automotive services with formal and practical methods,” in Proceedings of the 16th International Conference on Availability, Reliability and Security, 2021, pp. 1–20. | ||
299 | 8 | 21 | Dan Henriksson, Anton Cervin, and Karl-Erik ˚ Arz´ en. TrueTime : Real-time Control System Simulation with MATLAB / Simulink. Proceedings of the Nordic MATLAB Conference, 2003. | ||
173 | 5 | 4 | Dan Henriksson, Anton Cervin, and Karl-Erik Årzén. TrueTime : Real-time Control System Simulation with MATLAB / Simulink. Proceedings of the Nordic MATLAB Conference, 2003. | ||
64 | 2 | 40 | Daniel Perez and Sarah Martinez. Lane following assist: Enhancing lka through adaptive cruise control integration. Journal of Advanced Vehicle Systems, 11(4):205–218, 2021. | ||
36 | 2 | 12 | David Black and Emma Green. Implementing fota in electronic control units: Challenges and solutions. In Proceedings of the International Symposium on Vehicle Software, pages 76–84, 2019. | ||
335 | 9 | 13 | Deloitte, “Software-Defined Vehicles A Forthcoming Industrial Evolution,” Accessed: Sep. 18, 2021.https://www2.deloitte.com/cn/en/pages/consumer-business/articles/software-defined-cars-industrial-revolution-on-the-arrow.html | ||
348 | 10 | 0 | Diagnostic Communication and Visual System based on Vehicle UDS Protocol Hong Zhang, Ding Li https://arxiv.org/pdf/2206.12653 | ||
332 | 9 | 10 | Dipl. -Ing. (FH) Markus Helmling, “Service-oriented Architectures and Ethernet in Vehicles,” Elektronik automotive, magazine Special issue, Automotive Ethernet, March 2017. | ||
460 | 15 | 1 | E. A. Lee, “The problem with threads,” Computer, vol. 39, no. 5, pp. 33–42, May 2006. | ||
5 | 1 | 4 | E. Aliwa, O. Rana, C. Perera, and P. Burnap, “Cyberattacks and Countermeasures for In-Vehicle Networks,” ACM Computing Surveys (CSUR), vol. 54, no. 1, pp. 1–37, 2021, DOI:10.1145/3431233. | ||
158 | 4 | 31 | E. Bounimova, P. Godefroid, and D. Molnar: Billions and billions of constraints: Whitebox fuzz testing in production, 35th International Conference on Software Engineering pp. 122–131, 2013. | ||
19 | 1 | 18 | E. C. for Electrotechnical Standardization, “Industrial communications subsystem based on ISO 11898(CAN) for controller-device interfaces – Part 4: CANopen,” Cenelec, Standard, 2002. | ||
140 | 4 | 13 | E. Cohen, M. Dahlweid et al.: VCC: A practical system for verifying concurrent C, Theorem Proving in Higher Order Logics, pages 23–42. Springer, 2009. | ||
265 | 7 | 21 | E. Osterweil et al., “From the Beginning: Key Transitions in the First 15 Years of DNSSEC,” Transactions on Network and Service Management (TNSM), vol. 19, pp. 5265–5283, Dec. 2022. | ||
83 | 3 | 8 | E. Ruijters and M. Stoelinga, “Fault tree analysis: A survey of the state-of-the-art in modeling, analysis and tools,” Computer science review, vol. 15, pp. 29–62, 2015. | ||
452 | 14 | 3 | E. Schreiber, A. Heinzel, M. Peichl, M. Engel and W. Wiesbeck, “Advanced buried object detection by multichannel, UAV/Drone carried synthetic aperture radar,” in 13th Eur. Conf. Antennas Propag., Krakow, Poland, Apr. 2019, pp. 1-5. | ||
116 | 3 | 41 | E. Seo, H. M. Song, and H. K. Kim, “Gids: Gan based intrusion detection system for in-vehicle network,” in 2018 16th Annual Conference on Privacy, Security and Trust (PST). IEEE, 2018, pp. 1–6. | ||
301 | 8 | 23 | Edward A. Lee, Stephen Neuendorffer, and Gang Zhou. Synchronous Reactive Models. In Claudius Ptolemaeus, editor, System Design, Modeling, and Simulation using Ptolemy II. Ptolemy.org, 2014. | ||
125 | 3 | 50 | Egomania. (2016) Some-ip generator. | ||
66 | 2 | 42 | Elena Roberts and James Smith. Efficient memory management in autosar-compliant systems. Journal of Embedded Systems and Automotive Technology, 15(2):102–115, 2021. | ||
63 | 2 | 39 | Elon Musk and Tesla Engineering Team. Revolutionizing vehicle software updates: Tesla’s fota system. Automotive Software Innovations Journal, 15(3):101–112, 2020. | ||
370 | 11 | 1 | Embedded Systems Academy. CANcrypt. https://www.cancrypt.eu/, 2018. | ||
226 | 6 | 28 | Emilio Guijarro, RTI, “Press release — connectivity at the core: The status of dds in autosar,” https://www.rti.com/blog/status-of-dds-in-autosar, Sep. 2022. | ||
54 | 2 | 30 | Emily Johnson and Carlos Martinez. Delta updating within the autosar framework. Embedded Systems Journal, 20(4):210–225, 2021. | ||
55 | 2 | 31 | Emily Johnson and Michael Thompson. Comparing lane departure warning and lane keeping assist systems: A functional overview. Journal of Intelligent Transportation Systems, 29(3):89–101, 2021. | ||
24 | 2 | 0 | Enhancing AUTOSAR-Based Firmware Over-the-Air Updates in the Automotive Industry with a Practical Implementation on a Steering System Mostafa A. Mostafa, Mohamed K. Mohamed, Radwa W. Ezzat https://arxiv.org/pdf/2503.05839 | ||
238 | 6 | 40 | eProsima, “Micro XRCE-DDS,” https://github.com/eProsima/Micro-XRCE-DDS. | ||
416 | 12 | 11 | Eric Evenchick. 2015. Hopping On the CAN Bus - Automotive Security and the CANard Toolkit. In Black Hat Asia (Last Access: 27/12/2018). https://www.blackhat.com/docs/asia-15/materials/asia-15-Evenchick-Hopping-On-The-Can-Bus.pdf | ||
179 | 5 | 10 | ETAS GmbH. RTA-TRACE User Guide, version 2.1.1. https://www.etas.de, 2006. | ||
386 | 11 | 17 | European Data Protection Board. Guidelines 1/2020 on processing personal data in the context of connected vehicles and mobility related applications. https://edpb.europa.eu/sites/edpb/files/consultation/edpb_guidelines_202001_connectedvehicles.pdf, 2020. | ||
397 | 11 | 28 | European Union. General Data Protection Regulation(EU Regulation 2016/679). https://eur-lex.europa.eu/legal-content/EN/TXT/PDF/?uri=OJ:L:2016:119:FULL, 2016. | ||
204 | 6 | 6 | Evidence Srl, “Erika enterprise rtos,” https://github.com/evidence/erika3. | ||
489 | 16 | 7 | F. Cesarini & S. Thompson (2009): Erlang Programming. O’Reilly. | ||
220 | 6 | 22 | F. Cosimi, F. Tronci, S. Saponara, and P. Gai, “Analysis, hardware specification and design of a programmable performance monitoring unit (ppmu) for risc-v ecus,” in 2022 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, 2022, pp. 213–218. | ||
248 | 7 | 4 | F. Kohnh¨auser et al., “Ensuring the Safe and Secure Operation of Electronic Control Units in Road Vehicles,” in 2019 IEEE Security and Privacy Workshops (SPW). 2019, pp. 126–131. | ||
102 | 3 | 27 | F. Luo, Y. Jiang, Z. Zhang, Y. Ren, and S. Hou, “Threat analysis and risk assessment for connected vehicles: A survey,” Security and Communication Networks, vol. 2021, pp. 1–19, 2021. | ||
97 | 3 | 22 | F. Luo, Z. Yang, Z. Zhang, Z. Wang, B. Wang, and M. Wu, “A multi-layer intrusion detection system for some/ip-based in-vehicle network,” Sensors, vol. 23, no. 9, p. 4376, 2023. | ||
174 | 5 | 5 | Fabio Cremona, Matteo Morelli, and Marco Di Natale. TRES: A Modular Representation of Schedulers, Tasks, and Messages to Control Simulations in Simulink. Proceedings of the 30th Annual ACM Symposium on Applied Computing, pages 1940–1947, 2015. | ||
290 | 8 | 12 | Fabio Cremona, Matteo Morelli, and Marco Di Natale. TRES: A Modular Representation of Schedulers, Tasks, and Messages to Control Simulations in Simulink. Proceedings of the 30th Annual ACM Symposium on Applied Computing, pages 1940–1947, 2015. | ||
449 | 14 | 0 | FMCW SAR with New Synthesis Method Based on A-SPC Technique Junhyeong Park, Dae-Hwan Jung, Seong-Ook Park https://arxiv.org/pdf/2009.14415 | ||
438 | 13 | 4 | Foundation Release Overview, n.d. 26. | ||
22 | 1 | 21 | Frenzel+Berg, “CANopen Chip CO4011,” https://www.frenzelberg.de/fileadmin/FrenzelBerg/Datenblaetter/CANopenChip/ds co4011b en.pdf. | ||
439 | 13 | 5 | Furst and Bechter - 2016 - AUTOSAR for Connected and Autonomous Vehicles The.pdf, n.d. | ||
46 | 2 | 22 | FUT Electronics. High power motor driver - 10a continuous, 15a peak, 2025. Accessed: 2025-02-05. | ||
475 | 15 | 16 | G. A. Agha, “Actors: A model of concurrent computation in distributed systems,” MIT Artificial Intelligence Lab, Tech. Rep., 1985. | ||
7 | 1 | 6 | G. Bella, P. Biondi, G. Costantino, and I. Matteucci, “TOUCAN: A proTocol tO secUre Controller Area Network,” in Proceedings of the ACM Workshop on Automotive Cybersecurity (AutoSec), 2019, DOI: 10.1145/3309171.3309175. | ||
462 | 15 | 3 | G. Berry and G. Gonthier, “The Esterel synchronous programming language: Design, semantics, implementation,” Science of computer programming, vol. 19, no. 2, pp. 87–152, 1992. | ||
463 | 15 | 4 | G. Berry, “SCADE: Synchronous design and validation of embedded control software,” in Next Generation Design and Verification Methodologies for Distributed Embedded Control Systems, S. Ramesh and P. Sampath, Eds., Dordrecht: Springer Netherlands, 2007, pp. 19–33. | ||
12 | 1 | 11 | G. Cena, I. C. Bertolotti, T. Hu, and A. Valenzano, “On a software-defined CAN controller for embedded systems,” Computer Standards & Interfaces, vol. 63, pp. 43–51, 2019, DOI:10.1016/j.csi.2018.11.007. | ||
136 | 4 | 9 | G. Holzmann: Spin Model Checker: the Primer and Reference Manual, Addison-Wesley, 2003. | ||
147 | 4 | 20 | G. Klein et al.: Comprehensive formal verification of an OS microkernel ACM Transactions on Computer Systems, Volume 32 Issue 1, pp.1–70, 2014. | ||
146 | 4 | 19 | G. Klein et.al: seL4: Formal verification of an OS kernel, ACM Symposium on Operating Systems Principles, pp.207–220, 2009. | ||
144 | 4 | 17 | G. Klein: Operating System Verification - An Overview, S¯ adhan¯ a , 34(1), pp.26–69, 2009. | ||
112 | 3 | 37 | G. Zhang, Q. Liu, C. Cao, J. Li, and Y. Li, “Bit scanner: Anomaly detection for in-vehicle can bus using binary sequence whitelisting,” Computers & Security, vol. 134, p. 103436, 2023. | ||
345 | 9 | 23 | Garcia, P., Tiago Gomes, Filipe Salgado, Joao Monteiro, and et al., “Towards Hardware Embedded Virtualization Technology: Architectural Enhancements to an ARM SoC”, ACM SIGBED Review, vol. 11, no. 2, pp 45–47, June 2014, https://doi.org/10.1145/2668138.2668145 | ||
377 | 11 | 8 | Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, and Ilaria Matteucci. Are you secure in your car?: poster. In Proceedings of the 12th Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2019, Miami, Florida, USA, May 15-17, 2019, pages 308–309. ACM, 2019. | ||
378 | 11 | 9 | Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, and Ilaria Matteucci. TOUCAN: A protocol to secure controller area network. In Proceedings of the ACM Workshop on Automotive Cybersecurity, AutoSec@CODASPY 2019, Richardson, TX, USA, March 27, 2019, pages 3–8, 2019. | ||
384 | 11 | 15 | Gianpiero Costantino and Ilaria Matteucci. CANDY CREAM - hacking infotainment android systems to command instrument cluster via can data frame. In Meikang Qiu, editor, 2019 IEEE International Conference on Computational Science and Engineering, CSE 2019, and IEEE International Conference on Embedded and Ubiquitous Computing, EUC 2019, New York, NY, USA, August 1-3, 2019, pages 476–481. IEEE, 2019. | ||
324 | 9 | 2 | Glenn Trevor, “Shared Mobility: Consumer Insights and Trends, ” Accessed: Sep. 10, 2021. https://thedigitalmomentum.com/shared-mobility-consumer-insights-and-trends/ | ||
440 | 13 | 6 | Gopu, G.L., Kavitha, K.V., Joy, J., 2016. Service Oriented Architecture based connectivity of automotive ECUs, in: 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT). Presented at the 2016 International Conference on Circuit, Power and Computing Technologies (ICCPCT), IEEE, Nagercoil, India, pp. 1–4. https://doi.org/10.1109/ICCPCT.2016.7530358 | ||
267 | 7 | 23 | H. Khemissa and P. Urien, “Centralized architecture for ECU security management in connected and autonomous vehicles,” in 2022 13th In- ternational Conference on Information and Communication Technology Convergence (ICTC). IEEE, Oct. 2022. | ||
114 | 3 | 39 | H. M. Song, H. R. Kim, and H. K. Kim, “Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network,” in 2016 international conference on information networking (ICOIN). IEEE, 2016, pp. 63–68. | ||
340 | 9 | 18 | Häckel, Timo. “Service Classification in Service-Oriented ICT Architectures of Future Vehicles,” Hochschule für Angewandte Wissenschaften Hamburg, 2017. | ||
188 | 5 | 19 | Haibo Zeng and Marco Di Natale. Mechanisms for guaranteeing data consistency and flow preservation in AUTOSAR software on multi-core platforms. In SIES 2011 - 6th IEEE International Symposium on Industrial Embedded Systems, Conference Proceedings, pages 140–149. IEEE, jun 2011. | ||
338 | 9 | 16 | Han, S., He, Y., Ding, Y. , “Enable an Open Software Defined Mobility Ecosystem through VEC-OF,” In 2020 IEEE 20th International Conference on Software Quality, Reliability and Security Companion (QRS-C) pp. 229-236, 2020. | ||
137 | 4 | 10 | http://starbed.nict.go.jp/en/index.html | ||
135 | 4 | 8 | https://plantuml.com/ | ||
138 | 4 | 11 | https://www.esol.com/embedded/lineup_rtos.html | ||
441 | 13 | 7 | Hussain, R., Zeadally, S., 2019. Autonomous Cars: Research Results, Issues, and Future Challenges. IEEE Commun. Surv. Tutor. 21, 1275–1313. https://doi.org/10.1109/COMST.2018.2869360 | ||
442 | 13 | 8 | Huszak, G., Morita, H., 2019. On the 10BASE-T1S preamble for multidrop, in: 2019 Global Information Infrastructure and Networking Symposium (GIIS). Presented at the 2019 Global Information Infrastructure and Networking Symposium (GIIS), IEEE, Paris, France, pp. 1–6. https://doi.org/10.1109/GIIS48668.2019.9044963 | ||
21 | 1 | 20 | I. Foster, A. Prudhomme, K. Koscher, and S. Savage, “Fast and Vulnerable: A Story of Telematic Failures,” in Proceedings of the 9th USENIX Workshop on Offensive Technologies (WOOT), 2015, DOI: 10.5555/2831211.2831226. | ||
128 | 4 | 1 | IEC 61508: Functional safety of electrical/electronic/programmable electronic safety-related systems, 1998. T. Aoki et al. | ||
254 | 7 | 10 | IEEE 802.1 Working Group, “IEEE Standard for Local and Metropolitan Area Network–Bridges and Bridged Networks,” IEEE, Standard Std 802.1Q-2018 (Revision of IEEE Std 802.1Q-2014), Jul. 2018. | ||
126 | 3 | 51 | IEEE 802.1 Working Group. (2019) Ieee 802.1 time-sensitive networking task group.Online | ||
212 | 6 | 14 | IEEE, “Portable Operating System Interface (POSIX(TM)) Base Specifications,” https://standards.ieee.org/ieee/1003.1/7101/, IEEE, Standard. | ||
194 | 5 | 25 | Ignacio Sanudo, Paolo Burgio, and Marko Bertogna. Schedulability and timing analysis of mixed preemptive-cooperative tasks on a partitioned multi-core system. In Proceedings of the 7th International Workshop on Analysis Tools and Methodologies for Embedded and Real-Time Systems (WATERS’16), in conjuction with the 28th Euromicro Conference on Real-Time Systems (ECRTS 2016), Toulouse, France, 2016. | ||
443 | 13 | 9 | IISO - Standards [WWW Document], n.d. . ISO. URL https://www.iso.org/standards.html (accessed7.26.21). | ||
444 | 13 | 10 | IISO 26262-1:2018(en), Road vehicles — Functional safety — Part 1: Vocabulary [WWW Document], n.d. URL https://www.iso.org/obp/ui/#iso:std:iso:26262![]() |
||
178 | 5 | 9 | INCHRON GmbH. chronSIM, version 2.9. https://www.inchron.com/tool-suite/chronsim/, 2019. | ||
81 | 3 | 6 | International Organization for Standardization (ISO), “ISO-26262: Road Vehicles - Functional Safety,” International Organization for Standardization, Tech. Rep., Dec. 2016. | ||
251 | 7 | 7 | International Organization for Standardization, “Road vehicles – Cyber-security engineering,” Standard ISO/SAE DIS 21434, 2020. | ||
420 | 12 | 15 | International Organization for Standardization. 2015. Road vehicles — Controller area network (CAN) — Part 1: Data link layer and physical signalling. https://www.iso.org/standard/63648.html. | ||
389 | 11 | 20 | International Organization for Standardization. ISO/IEC 11889-1:2015 - Trusted Platform Module library. https://www.iso.org/standard/66510.html, 2015. | ||
390 | 11 | 21 | International Organization for Standardization. Road vehicles — Controller area network (CAN) — Part 1: Data link layer and physical signalling. https://www.iso.org/standard/63648.html, 2015. | ||
25 | 2 | 1 | Iso 14229: Road vehicles — unified diagnostic services (uds), 2020. | ||
129 | 4 | 2 | ISO 26262 Road vehicles - functional safety, 2011. | ||
208 | 6 | 10 | ISO, “ISO 17356 Road vehicles — Open interface for embedded automotive applications — Part 3: OSEK/VDX Operating System (OS),” https://www.iso.org/standard/40079.html, International Organization for Standardization, Standard. | ||
82 | 3 | 7 | ISO/SAE 21434:Road Vehicles, Cybersecurity Engineering, ISO Std., 2021. | ||
218 | 6 | 20 | J. Abella, S. Alcaide, J. Anders, F. Bas, S. Becker, E. De Mulder, N. Elhamawy, F. K. G¨urkaynak, H. Handschuh, C. Hernandez et al., “Security, reliability and test aspects of the risc-v ecosystem,” in 2021 IEEE European Test Symposium (ETS). IEEE, 2021, pp. 1–10. | ||
336 | 9 | 14 | J. Bach, S. Otten, and E. Sax, “A taxonomy and systematic approach for automotive system architectures. from functional chains to functional networks,” in Proceedings of the 3rd International Conference on Vehicle Technology and Intelligent Transport Systems (VEHITS2017), Porto, Portugal, April 2017. | ||
143 | 4 | 16 | J. Bengtsson, K. Larsen et al.: UPPAAL – a Tool Suite for Automatic Verification of Real-time Systems, DIMACS/SYCON Workshop on Hybrid Systems III, pp.232–243, 1996. | ||
160 | 4 | 33 | J. Chen and T. Aoki: Conformance Testing for OSEK/VDX Operating System Using Model Checking, APSEC, pp.274–281, 2011. | ||
89 | 3 | 14 | J. Cui and B. Zhang, “Vera: A simplified security risk analysis method for autonomous vehicles,” IEEE Transactions on Vehicular Technology, vol. 69, no. 10, pp. 10 494–10 505, 2020. | ||
124 | 3 | 49 | J. Gao, L. Gan, F. Buschendorf, L. Zhang, H. Liu, P. Li, X. Dong, and T. Lu, “Omni scada intrusion detection using deep learning algorithms,” IEEE Internet of Things Journal, vol. 8, no. 2, pp. 951–961, 2020. | ||
23 | 1 | 22 | J. Griffith, “Learn the inner workings of a CAN bus driver and how to debug your system,” Texas Instruments, Technical Article, 2016, https://www.ti.com/lit/ta/ssztbo8/ssztbo8.pdf. | ||
490 | 16 | 8 | J. Hughes (2007): QuickCheck testing for fun and profit. In: Proceedings of PADL’07, Springer, pp. 1–32, doi:10.1007/978-3-540-69611-7 1. | ||
154 | 4 | 27 | J. L. Bechennec, M. Briday et al.: Trampoline An Open Source Implementation of the OSEK/VDX RTOS Specification, Emerging Technologies and Factory Automation, pp. 62–69, 2006, | ||
302 | 8 | 24 | J. Lehoczky, L. Sha, and Y. Ding. The rate monotonic scheduling algorithm: exact characterization and average case behavior. 1989 Proceedings. Real-Time Systems Symposium, pages 0–5, 1989. | ||
182 | 5 | 13 | J. Lehoczky, L. Sha, and Y. Ding. The rate monotonic scheduling algorithm: exact characterization and average case behavior. 1989 Proceedings. Real-Time Systems Symposium, pages 0–5,1989. | ||
234 | 6 | 36 | J. Lelli, C. Scordino, L. Abeni, and D. Faggioli, “Deadline scheduling in the linux kernel,” Software: Practice and Experience, vol. 46, no. 6, pp.821–839, 2016. | ||
145 | 4 | 18 | J. Liedtke: On 𝜇-kernel construction, Symposium on Operating System Principles, Operating System Review 29(5), pp. 237–250, 1995. | ||
457 | 14 | 8 | J. Park, D.-H. Jung, K.-B. Bae, and S.-O. Park, "Range-Doppler map improvement in FMCW radar for small moving drone detection using the stationary point concentration technique," IEEE Trans. Microw. Theory and Techn., vol. 68, no. 5, pp. 1858-1871, May 2020. | ||
458 | 14 | 9 | J. Park, J. -S. Park, K.-B. Bae, and S.-O. Park, "Advanced stationary point concentration technique for leakage mitigation and small drone detection with FMCW radar," submitted for publication in IEEE.Online | ||
456 | 14 | 7 | J. Park, K.-B. Bae, D.-H. Jung, and S.-O. Park, "Micro-drone detection with FMCW radar based on stationary point concentration technique," in Proc. 2019 Int. Symp. Antennas Propag., Xi'an, China, Oct. 2019, pp. 1-3. | ||
455 | 14 | 6 | J. Park, S. Park, D.-H Kim, and S.-O. Park, "Leakage mitigation in heterodyne FMCW radar for small drone detection with stationary point concentration technique," IEEE Trans. Microw. Theory and Techn., vol. 67, no. 3, pp. 1221-1232, Mar. 2019. | ||
150 | 4 | 23 | J. Penix et.al: Verifying Time Partitioning in the DEOS Scheduling Kernel, Formal Methods in System Design, Vol.26, No.2, pp.103–135, 2005. | ||
167 | 4 | 40 | J. Rushby : The Versatile Synchronous Observer, Specification, Algebra, and Software. Lecture Notes in Computer Science, vol 8373. pp.110–128, Springer, 2014. | ||
156 | 4 | 29 | J. Shi, J. He et al.: ORIENTAIS: formal verified OSEK/VDX real-time operating system, international conference on engineering of complex computer systems, pp.293–301, 2012. | ||
142 | 4 | 15 | J. Sun, Y. Liu et al.: PAT: Towards Flexible Verification under Fairness, International Conference on Computer Aided Verification, pp.709–714, 2009. | ||
492 | 16 | 10 | J. Svenningsson, H. Svensson, N. Smallbone, T. Arts, U. Norell & J. Hughes (2014): An Expressive Semantics of Mocking. In: Fundamental Approaches to Software Engineering, LNCS 8411, Springer, pp. 385–399, doi:10.1007/978-3-642-54804-8 27. | ||
493 | 16 | 11 | J. Tretmans (2011): Model-Based Testing and Some Steps towards Test-Based Modelling. In: Formal Methods for Eternal Networked Software Systems, LNCS 6659, Springer, pp. 297–326, doi:10.1007/978-3-642-21455-4 9. | ||
209 | 6 | 11 | J.-L. Bechennec, M. Briday, S. Faucou, and Y. Trinquet, “Trampoline an open source implementation of the osek/vdx rtos specification,” in 2006 IEEE Conference on Emerging Technologies and Factory Automation. IEEE, 2006, pp. 62–69. | ||
464 | 15 | 5 | J.-L. Boulanger, F.-X. Fornari, J.-L. Camus, and B. Dion, SCADE: Language and applications, 1st. Wiley-IEEE Press, 2015. | ||
105 | 3 | 30 | J.-P. Monteuuis, A. Boudguiga, J. Zhang, H. Labiod, A. Servel, and P. Urien, “Sara: Security automotive risk analysis method,” in Proceedings of the 4th ACM Workshop on Cyber-Physical System Security, 2018, pp. 3–14. | ||
85 | 3 | 10 | J.-P. Signoret and A. Leroy, “Hazard and operability study (hazop),” Reliability Assessment of Safety and Production Systems: Analysis. Modelling. Calculations and Case Studies, pp. 157–164, 2021. | ||
40 | 2 | 16 | James Carter and Susan Lee. Implementing lane keeping assist: Hardware and software integration on stm32 microcontrollers. Embedded Systems Review, 15(2):45–56, 2020. | ||
42 | 2 | 18 | James Collins and Erica Brooks. Efficient data transfer using serial peripheral interface (spi) in embedded systems. Embedded Systems Review, 14(3):140–155, 2019. | ||
29 | 2 | 5 | James T. Anderson and Emily R. Carter. Challenges in traditional firmware over-the-air updates for automotive systems. Automotive Software Engineering Review, 12(4):345–360, 2021. | ||
72 | 2 | 48 | James Williams and Laura Thompson. Fota-driven predictive maintenance in modern vehicles. Journal of Automotive Engineering, 23(2):75–89, 2021. | ||
73 | 2 | 49 | Jane D. Williams and Robert K. Lee. Securing firmware updates: The role of uds 0x27 protocol in modern vehicles. Journal of Automotive Cybersecurity, 7(3):210–225, 2022. | ||
45 | 2 | 21 | Jane Doe and Mark Smith. Advancements in autosar for scalable automotive systems. Automotive Software Review, 15(2):123–135, 2022. | ||
391 | 11 | 22 | Jeff Crume. OwnStar: Yet another car hack. https://insideinternetsecurity.wordpress.com/2015/08/05/ownstar-yet-another-car-hack/, 2015. | ||
71 | 2 | 47 | Jessica Taylor and Robert Morgan. Evaluating patch-based updating techniques for embedded systems. Journal of Embedded System Design, 14(3):176–189, 2020. | ||
175 | 5 | 6 | Jian Chen, Manar H Alalfi, Thomas R Dean, and S Ramesh. Modeling AUTOSAR implementations in simulink. In European Conference on Modelling Foundations and Applications, pages 279–292. Springer, 2018. | ||
62 | 2 | 38 | John D. Miller and Sophia K. Chen. The role of lane keeping assist in adas: Bridging ai decision-making with real-time motor control. Journal of Autonomous Vehicle Systems, 29(3):456–472, 2023. | ||
65 | 2 | 41 | John Richardson and Emily Clark. Advanced security protocols for fota in automotive systems. Journal of Automotive Cybersecurity, 10(4):299–312, 2021. | ||
68 | 2 | 44 | John Smith and Sarah Doe. The benefits and challenges of fota in modern vehicles. Journal of Automotive Software Engineering, 12(3):45–58, 2020. | ||
313 | 8 | 35 | Julien Schmaltz and Jan Tretmans. On conformance testing for timed systems. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 5215 LNCS, pages 250–264. Springer, Berlin, Heidelberg, 2008. | ||
139 | 4 | 12 | K. L. McMillan: Symbolic Model Checking: An Approach to the State Explosion Problem, Kluwer Academic Publishers, 1993. | ||
253 | 7 | 9 | K. Matheus and T. K¨onigseder, Automotive Ethernet. Cambridge, United Kingdom: Cambridge University Press, Jan. 2015. | ||
199 | 6 | 1 | K. Strandberg, T. Olovsson, and E. Jonsson, “Securing the Connected Car: A Security-Enhancement Methodology,” IEEE Vehicular Technology Magazine, vol. 13, no. 1, pp. 56–65, 2018. | ||
153 | 4 | 26 | K. T. G. Tigori, J-L Béchennec et.al: Formal Model-Based Synthesis of Application- Specific Static RTOS, ACM Trans. Embed. Comput. Syst., vol.16, no.4, pp.97:1–97:25, 2017. | ||
159 | 4 | 32 | K. Yatake and T. Aoki: Automatic Generation of Model Checking Scripts based on Environment Modeling, SPIN Workshop on Model Checking of Software, pp.58–75, 2010. | ||
161 | 4 | 34 | K. Yatake and T. Aoki: Model Checking of OSEK/VDX OS Design Model Based on Environment Modeling, ICTAC, pp.183–197, 2012. | ||
93 | 3 | 18 | K.-T. Cho and K. G. Shin, “Fingerprinting electronic control units for vehicle intrusion detection,” in 25th USENIX Security Symposium (USENIX Security 16), 2016, pp. 911–927. | ||
15 | 1 | 14 | K.-T. Cho and K. G. Shin, “Fingerprinting Electronic Control Units for Vehicle Intrusion Detection,” in Proceedings of the 25th USENIX Security Symposium (USENIX Sec’16’), 2016, DOI:10.5555/3241094.3241165. | ||
16 | 1 | 15 | K.-T. Cho and K. G. Shin,, “Viden: Attacker Identification on In-Vehicle Networks,” in Proceedings of the ACM SIGSAC Conference on Computer and Communications Security (CCS), 2017, DOI:10.1145/3133956.3134001. | ||
445 | 13 | 11 | Kassakian, J.G., Perreault, D.J., 2001. The future of electronics in automobiles, in: Proceedings of the 13th International Symposium on Power Semiconductor Devices & ICs. IPSD ’01 (IEEE Cat. No.01CH37216). Presented at the 13th International Symposium on Power Semiconductor Devices & ICs. IPSD ’01, Inst. Electr. Eng. Japan, Osaka, Japan, pp. 15–19. https://doi.org/10.1109/ISPSD.2001.934550 | ||
74 | 2 | 50 | Kevin Wright and Laura Davis. Future directions in fota for advanced automotive applications. Automotive Innovations Quarterly, 18(1):45–58, 2022. | ||
292 | 8 | 14 | Khaled El-Fakih, Anton Kolomeez, Svetlana Prokopenko, and Nina Yevtushenko. Extended Finite State Machine Based Test Derivation Driven by User Defined Faults. In 2008 International Conference on Software Testing, Verification, and Validation, pages 308–317. IEEE, apr 2008. | ||
331 | 9 | 9 | L. Deng, J. Offutt, P. Ammann, N. Mirzaei, “Mutation operators for testing android apps,” Inf. Software Technol., 81, pp. 154-168, 2017. | ||
249 | 7 | 5 | L. Xue et al., “SAID: State-aware Defense Against Injection Attacks on In-vehicle Network,” in 31st USENIX Security Symposium (USENIX Security 22). Aug. 2022, pp. 1921–1938. | ||
118 | 3 | 43 | L. Xue, Y. Liu, T. Li, K. Zhao, J. Li, L. Yu, X. Luo, Y. Zhou, and G. Gu, “{SAID}: State-aware defense against injection attacks on in-vehicle network,” in 31st USENIX Security Symposium (USENIX Security 22), 2022, pp. 1921–1938. | ||
59 | 2 | 35 | Lars Kr¨uger and John Smith. The role of uds in the osi model: A standardized approach to automotive diagnostics. Journal of Embedded Systems and Applications, 18(3):87–95, 2020. | ||
296 | 8 | 18 | Le Thi My Hanh and Nguyen Thanh Binh. Mutation operators for simulink models. In Proceedings - 4th International Conference on Knowledge and Systems Engineering, KSE 2012, pages 54–59. IEEE, aug 2012. | ||
56 | 2 | 32 | Liam Johnson and Olivia Martin. Delta updates: Enhancing efficiency in fota systems. Journal of Embedded Systems, 8(2):25–36, 2021. | ||
49 | 2 | 25 | Linda Green and Michael Turner. Efficiency of delta updating for firmware management. Journal of Embedded Computing, 12(5):87–101, 2020. | ||
413 | 12 | 8 | Luca Dariz, Gianpiero Costantino, Massimiliano Ruggeri, and Fabio Martinelli. 2018. A Joint Safety and Security Analysis of message protection for CAN bus protocol. Advances in Science, Technology and Engineering Systems Journal 3, 1 (2018), 384–393. https://doi.org/10.25046/aj030147 | ||
414 | 12 | 9 | Luca Dariz, Michele Selvatici, Massimiliano Ruggeri, Gianpiero Costantino, and Fabio Martinelli. 2017. Trade-Off Analysis of Safety and Security in CAN bus communication. In The 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems (MT-ITS 2017). | ||
385 | 11 | 16 | Luca Dariz, Michele Selvatici, Massimiliano Ruggeri, Gianpiero Costantino, and Fabio Martinelli. Trade-off analysis of safety and security in CAN bus communication. In 5th IEEE International Conference on Models and Technologies for Intelligent Transportation Systems, MT-ITS 2017, Naples, Italy, June 26-28, 2017, pages 226–231. IEEE, 2017. | ||
382 | 11 | 13 | Lucian Constantin. Researchers hack Tesla Model S with remote attack. https://www.pcworld.com/article/3121999/researchers-demonstrate-remote-attack-against-tesla-model-s.html, 2016. | ||
344 | 9 | 22 | LynuxWorks, “low-level & boot-level rootkits revisited,” White Paper, https://www.slideshare.net/aziv69/whitepaper-lynx-secure-rootkit-detection-protection-by-means-of-secure-virtualization, Accessed: Oct.10, 2021. | ||
269 | 7 | 25 | M. A. Al-Shareeda et al., “Survey of Authentication and Privacy Schemes in Vehicular ad hoc Networks,” IEEE Sensors Journal, vol. 21, pp. 2422–2433, Jan 2021. | ||
270 | 7 | 26 | M. Asghar et al., “A Scalable and Efficient PKI Based Authentication Protocol for VANETs,” in 2018 28th International Telecommunication Networks and Applications Conference (ITNAC). IEEE, Nov. 2018. | ||
166 | 4 | 39 | M. B. Dwyer, G. S. Avrunin, and J. C. Corbett: Patterns in Property Specifications for Finite-state Verification, International Conference on Software Engineering, pp. 411–420, 1999. | ||
8 | 1 | 7 | M. Bellare, R. Gu´ erin, and P. Rogaway, “XOR MACs: New Methods for Message Authentication Using Finite Pseudorandom Functions,” in Proceedings of the Annual International Cryptology Conference (CRYPTO), 1995, DOI: 10.1007/3-540-44750-4 2. | ||
260 | 7 | 16 | M. Cakir et al., “A QoS Aware Approach to Service-Oriented Communication in Future Automotive Networks,” in 2019 IEEE Vehicular Networking Conference (VNC). Dec. 2019. | ||
415 | 12 | 10 | M. Dworkin. 2005. Recommendation for Block Cipher Modes of Operation: The CMAC Mode for Authentication. NIST Special Publication 800-38B. | ||
20 | 1 | 19 | M. Foruhandeh, Y. Man, R. Gerdes, M. Li, and T. Chantem, “SIMPLE: single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks,” in Proceedings of the 35th Annual Computer Security Applications Conference (ACSAC), 2019, DOI: 10.1145/3359789.3359834. | ||
259 | 7 | 15 | M. Iorio et al., “Securing SOME/IP for In-Vehicle Service Protection,” IEEE Transactions on Vehicular Technology, vol. 69, pp. 13 450–13 466, 2020. | ||
76 | 3 | 1 | M. Iorio, A. Buttiglieri, M. Reineri, F. Risso, R. Sisto, and F. Valenza, “Protecting in-vehicle services: Security-enabled some/ip middleware,” IEEE Vehicular Technology Magazine, vol. 15, no. 3, pp. 77–85, 2020. | ||
346 | 9 | 24 | M. Iorio, M. Reineri, F. Risso, R. Sisto and F. Valenza, "Securing SOME/IP for In-Vehicle Service Protection," in IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp.13450-13466, Nov. 2020, doi: 10.1109/TVT.2020.3028880. | ||
79 | 3 | 4 | M. Iorio, M. Reineri, F. Risso, R. Sisto, and F. Valenza, “Securing some/ip for in-vehicle service protection,” IEEE Transactions on Vehicular Technology, vol. 69, no. 11, pp. 13 450–13 466, 2020. | ||
476 | 15 | 17 | M. Lohstroh and E. A. Lee, “Deterministic actors,” in 2019 Forum on Specification and Design Languages (FDL), IEEE, 2019. | ||
477 | 15 | 18 | M. Lohstroh, I. Incer Romeo, A. Goens, et al., “Reactors: A determin- istic model for composable reactive systems,” in Model-Based Design of Cyber Physical Systems (CyPhy’19), 2019, To appear. | ||
469 | 15 | 10 | M. Lohstroh, M. Schoeberl, A. Goens, et al., “Actors revisited for time-critical systems,” in Proceedings of the 56th Annual Design Automation Conference 2019, ser. DAC ’19, Las Vegas, NV, USA: ACM, 2019, 152:1–152:4. | ||
90 | 3 | 15 | M. M¨ uter and N. Asaj, “Entropy-based anomaly detection for in-vehicle networks,” in 2011 IEEE Intelligent Vehicles Symposium (IV). IEEE, 2011, pp. 1110–1115. | ||
92 | 3 | 17 | M. M¨ uter, A. Groll, and F. C. Freiling, “A structured approach to anomaly detection for in-vehicle networks,” in 2010 Sixth International Conference on Information Assurance and Security. IEEE, 2010, pp.92–98. | ||
266 | 7 | 22 | M. M¨uller et al., “Roll, Roll, Roll Your Root: A Comprehensive Analysis of the First Ever DNSSEC Root KSK Rollover,” in Internet Measurement Conference, ser. IMC ’19. ACM, 2019, p. 1–14. | ||
229 | 6 | 31 | M. P¨ohnl, A. Tamisier, and T. Blass, “A middleware journey from microcontrollers to microprocessors,” in 2022 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2022, pp. 282–286. | ||
219 | 6 | 21 | M. Pietzsch, “Risc-v processor for network platforms according to iso 26262,” ATZelectronics worldwide, vol. 16, no. 11, pp. 8–13, 2021. | ||
261 | 7 | 17 | M. Rumez et al., “An Overview of Automotive Service-Oriented Architectures and Implications for Security Countermeasures,” IEEE Access, vol. 8, pp. 221 852–221 870, 2020. | ||
337 | 9 | 15 | M. Traub, A. Maier, and K. L. Barbehon,‘‘Future automotive architecture and the impact of IT trends,’’ IEEE Softw., vol. 34, no. 3, pp. 27–32, May 2017. | ||
327 | 9 | 5 | Mahdi Dibaei, Xi Zheng, Kun Jiang and et al., “An Overview of Attacks and Defences on Intelligent Connected Vehicles,” Digital Communications and Networks, vol.6, no.4, pp 399-421 Nov 2020. | ||
341 | 9 | 19 | Marc Bellanger, Edward Marmounier, “Service Oriented Architecture: impacts and challenges of an architecture paradigm change,” 10th European Congress on Embedded Real Time Software and Systems (ERTS 2020), Toulouse, France. Jan 2020. | ||
380 | 11 | 11 | Mario Luca Bernardi, Marta Cimitile, Fabio Martinelli, and Francesco Mercaldo. Driver and Path Detection through Time-Series Classification. Journal of Advanced Transportation, 2018:1–20, 2018. | ||
57 | 2 | 33 | Mark Johnson and Emily White. The role of memory stacks in autosar: A case study in firmware updates. In Proceedings of the International Conference on Automotive Software Systems, pages 145–152, 2020. | ||
319 | 8 | 41 | Mark Trakhtenbrot. Implementation-Oriented Mutation Testing of Statechart Models. In 2010 Third International Conference on Software Testing, Verification, and Validation Workshops, pages 120–125. IEEE, apr 2010. | ||
53 | 2 | 29 | Markus Hoffmann and Anna Becker. Unified diagnostic services: Enhancing automotive communication and maintenance. Automotive Engineering Journal, 29(5):123–135, 2021. | ||
197 | 5 | 28 | MathWorks. Developing S-Functions, r2017b. http://www.mathworks.com, 2017. | ||
181 | 5 | 12 | MathWorks. Simulink User’s Guide, r2017b. http://www.mathworks.com, 2017. | ||
303 | 181 | 8 | 25 | MathWorks. Simulink User’s Guide, r2017b. http://www.mathworks.com, 2017. | |
183 | 181 | 5 | 14 | MathWorks. Stateflow User’s Guide, r2017b. http://www.mathworks.com, 2017. | |
316 | 8 | 38 | Matthew Stephan, Manar H Alalfi, and James R Cordy. Towards a taxonomy for Simulink model mutations. In Proceedings - IEEE 7th International Conference on Software Testing, Verification and Validation Workshops, ICSTW 2014, pages 206–215, 2014. | ||
315 | 8 | 37 | Matthew Stephan, Manar H. Alafi, Andrew Stevenson, and James R. Cordy. Using mutation analysis for a model-clone detector comparison framework. In Proceedings - International Conference on Software Engineering, pages 1261–1264, 2013. | ||
314 | 8 | 36 | Matthew Stephan. Model clone detector evaluation using mutation analysis. In Proceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014, pages 633–638. Institute of Electrical and Electronics Engineers Inc., dec 2014. | ||
325 | 9 | 3 | McKinsey & Company, “Automotive revolution—perspective towards 2030: How the convergence of disruptive technology-driven trends could transform the auto industry,” January 2016. | ||
200 | 6 | 2 | McKinsey, “The case for an end-to-end automotive software platform,” https://www.mckinsey.com/industries/automotive-and-assembly/our-insights/the-case | ||
38 | 2 | 14 | Michael Brown and Anna White. Autosar standards and their role in fota systems. International Conference on Automotive Software Systems, pages 123–130, 2021. | ||
50 | 2 | 26 | Michael Green and Rachel Adams. Compliance of lane keeping assist systems with iso11270 standards: Enhancing vehicle dynamics control. International Journal of Automotive Engineering, 45(6):789–802, 2021. | ||
310 | 8 | 32 | Mike Papadakis, Marinos Kintis, Jie Zhang, Yue Jia, Yves Le Traon, and Mark Harman. Mutation Testing Advances: An Analysis and Survey. Advances in Computers, 112:275–378, jan 2019. | ||
309 | 8 | 31 | Mike Papadakis, Marinos Kintis, Jie Zhang, Yue Jia, Yves Le Traon, and Mark Harman. Mutation testing advances: an analysis and survey. In Advances in Computers, volume 112, pages 275–378. Elsevier, 2019. | ||
393 | 11 | 24 | Miro Enev, Alex Takakuwa, Karl Koscher, and Tadayoshi Kohno. Automobile Driver Fingerprinting. https://petsymposium.org/2016/files/papers/Automobile Driver Fingerprinting.pdf, 2016. | ||
127 | 4 | 0 | Model-Checking in the Loop Model-Based Testing for Automotive Operating Systems Toshiaki Aoki, Aritoshi Hata, Kazusato Kanamori, Satoshi Tanaka, Yuta Kawamoto, Yasuhiro Tanase, Masumi Imai, Fumiya Shigemitsu, Masaki Gondo, Tomoji Kishi https://arxiv.org/pdf/2310.00973 | ||
482 | 16 | 0 | Modelling of Autosar Libraries for Large Scale Testing Authors: Wojciech Mostowski, Thomas Arts, John Hughes https://arxiv.org/pdf/1703.06574 | ||
320 | 8 | 42 | Muhammad Nouman Zafar, Wasif Afzal, and Eduard Enoiu. Towards a workflow for model-based testing of embedded systems. In Proceedings of the 12th International Workshop on Automating TEST Case Design, Selection, and Evaluation, pages 33–40, 2021. | ||
96 | 3 | 21 | N. Alkhatib, H. Ghauch, and J.-L. Danger, “Some/ip intrusion detection using deep learning-based sequential models in automotive ethernet networks,” in 2021 IEEE 12th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON). IEEE, 2021, pp.0954–0962. | ||
98 | 3 | 23 | N. Alkhatib, M. Mushtag, H. Ghauch et al., “Here comes said: A some/ip attention-based mechanism for intrusion detection,” in Proceedings of the Fourteenth International Conference on Ubiquitous and Future Networks (ICUFN). IEEE, 2023, pp. 462–467. | ||
86 | 3 | 11 | N. G. Leveson, Engineering a safer world: Systems thinking applied to safety. The MIT Press, 2016. | ||
168 | 4 | 41 | N. H. Tran, and T. Aoki: Conformance Testing of Schedulers for DSL-based Model Checking, International Symposium on Model Checking of Software, pp. 208-225, 2019 | ||
461 | 15 | 2 | N. Halbwachs, P. Caspi, P. Raymond, and D. Pilaud, “The synchronous data flow programming language LUSTRE,” Proceedings of the IEEE, vol. 79, no. 9, pp. 1305–1320, 1991. | ||
297 | 8 | 19 | N. He, P. R¨ ummer, and D. Kroening. Test-case generation for embedded simulink via formal concept analysis. In 2011 48th ACM/EDAC/IEEE Design Automation Conference (DAC), pages 224–229, 2011. | ||
216 | 6 | 18 | N.-J. Wessman, F. Malatesta, J. Andersson, P. Gomez, M. Masmano, V. Nicolau, J. Le Rhun, G. Cabo, F. Bas, R. Lorenzo et al., “De-risc: the first risc-v space-grade platform for safety-critical systems,” in 2021 IEEE Space Computing Conference (SCC). IEEE, 2021, pp. 17–26. | ||
383 | 11 | 14 | National Instruments Corporation. FlexRay Automotive Communication Bus Overview, 2020. | ||
423 | 12 | 18 | Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, and Ingrid Verbauwhede. 2014. Chaskey: An Efficient MAC Algorithm for 32-bit Microcontrollers. In Selected Areas in Cryptography – SAC 2014, Antoine Joux and Amr Youssef (Eds.). Springer International Publishing, Cham, 306–323. | ||
394 | 11 | 25 | Nicky Mouha, Bart Mennink, Anthony Van Herrewege, Dai Watanabe, Bart Preneel, and Ingrid Verbauwhede. Chaskey: An efficient mac algorithm for 32-bit microcontrollers. In Antoine Joux and Amr Youssef, editors, Selected Areas in Cryptography – SAC 2014, pages 306–323, Cham, 2014. Springer International Publishing. | ||
190 | 5 | 21 | Nicolas Navet, Lionel Havet, Sebastian Altmeyer, and Loïc Fejoz. Lean Model-Driven Development through Model-Interpretation: the CPAL design flow. University of Luxembourg, pages 1–10, jan 2015. | ||
214 | 6 | 16 | NXP, i.MX Reference Manual, NXP, 2018. Online | ||
215 | 6 | 17 | O. Alparslan, S. Arakawa, and M. Murata, “Next generation intra-vehicle backbone network architectures,” in 2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR). IEEE, 2021, pp. 1–7. | ||
203 | 6 | 5 | O. group, “CVA6 RISC-V CPU,” https://github.com/openhwgroup/cva6. | ||
103 | 3 | 28 | O. Henniger, A. Ruddle, H. Seudi´ e, B. Weyl, M. Wolf, and T. Wollinger, “Securing vehicular on-board it systems: The evita project,” in VDI/VW Automotive Security Conference, 2009, p. 41. | ||
395 | 11 | 26 | O.Hartkopp, C. Reuber, and R.Schilling. Macan message authenticated can. 2012. | ||
263 | 7 | 19 | Object Management Group, “DDS Security,” OMG, Standard DDS-SECURITY 1.1, Jul. 2018. | ||
262 | 7 | 18 | Object Management Group, “Data Distribution Service,” OMG, Standard DDS 1.4, Mar. 2015. | ||
425 | 12 | 20 | Odzhan. 2018. Chaskey Cripto Lib. https://github.com/odzhan/tinycrypt/tree/master/mac/chaskey. | ||
225 | 6 | 27 | OMG, “Data Distribution Service (DDS) version 1.4,” https://www.omg.org/spec/DDS/, OMG, Standard. | ||
237 | 6 | 39 | OMG, “DDS for eXtremely Resource Constrained Environments version 1.0,” https://www.omg.org/spec/DDS-XRCE, Nov. 2019. | ||
207 | 6 | 9 | OSEK, “OSEK/VDX Operating System Specification 2.2.3,” https://www.osek-vdx.org/index htm.html, Feb. 2005. | ||
131 | 207 | 4 | 4 | OSEK/VDX Operating System Specification 2.2.3, 2005. | |
132 | 4 | 5 | OSEK/VDX OS Test Plan 2.0, 1999. | ||
213 | 6 | 15 | P. Burgio, M. Bertogna, N. Capodieci, R. Cavicchioli, M. Sojka, P. Houdek, A. Marongiu, P. Gai, C. Scordino, and B. Morelli, “A software stack for next-generation automotive systems on many-core heterogeneous platforms,” Microprocessors and Microsystems, vol. 52, pp. 299–311, 2017. | ||
479 | 15 | 20 | P. Derler, T. H. Feng, E. A. Lee, et al., “PTIDES: A programming model for distributed real-time embedded systems,” EECS Department, University of California, Berkeley, Tech. Rep., May 2008. | ||
232 | 6 | 34 | P. Gai, M. Urbina, E. Guidieri, G. Serano, and N. Serreli, “Autosar university package classic platform,” in 27th IEEE International Conference on Emerging Technologies and Factory Automation (ETFA). IEEE, 2022. | ||
157 | 4 | 30 | P. Godefroid, M. Y Levin, and D. Molnar: Automated Whitebox Fuzz Testing, Network and Distributed Systems Security, pp. 151–166, 2008. | ||
258 | 7 | 14 | P. Hoffman and J. Schlyter, “The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA,” IETF, RFC 6698, Aug. 2012. | ||
185 | 5 | 16 | Patricia Derler, Andreas Naderlinger, Wolfgang Pree, Stefan Resmerita, and Josef Templ. Simulation of LET models in Simulink and Ptolemy. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), volume 6028 LNCS, pages 83–92. Springer, Berlin, Heidelberg, 2010. | ||
240 | 6 | 42 | R. Balas and L. Benini, “Risc-v for real-time mcus-software optimization and microarchitectural gap analysis,” in 2021 Design, Automation & Test in Europe Conference & Exhibition (DATE). IEEE, 2021, pp. 874–877. | ||
9 | 1 | 8 | R. Bhatia, V. Kumar, K. Serag, Z. B. Celik, M. Payer, and D. Xu, “Evading Voltage-Based Intrusion Detection on Automotive CAN,” in Proceedings of the Network and Distributed Systems Security Symposium (NDSS), 2021, DOI: 10.14722/ndss.2021.23013. | ||
11 | 1 | 10 | R. Canetti, J. Garay, G. Itkis, D. Micciancio, M. Naor, and B. Pinkas, “Multicast security: A taxonomy and some efficient constructions,” in Proceedings of the 18th Annual Joint Conference on Computer Communications (INFOCOM), vol. 2, 1999, DOI:10.1109/INFCOM.1999.751457. | ||
481 | 15 | 22 | R. Ernst, L. K¨ ohler, and K.-B. Gemlau, “System level LET: Mastering cause-effect chains in distributed systems,” in 44th Annual Conference of the IEEE Industrial Electronics Society (IECON), Oct. 2018. | ||
472 | 15 | 13 | R. Gu, G. Jin, L. Song, L. Zhu, and S. Lu, “What change history tells us about thread synchronization,” in Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, ser. ESEC/FSE 2015, Bergamo, Italy: ACM, 2015, pp. 426–438. | ||
306 | 8 | 28 | R. Nilsson, J. Offutt, and S.F. Andler. Mutation-based testing criteria for timeliness. In Proceedings of the 28th Annual International Computer Software and Applications Conference, 2004. COMPSAC 2004., pages 306–311. IEEE, 2004. | ||
122 | 3 | 47 | R. Zhao, Y. Wang, Z. Xue, T. Ohtsuki, B. Adebisi, and G. Gui, “Semi-supervised federated learning based intrusion detection method for internet of things,” IEEE Internet of Things Journal, 2022. | ||
201 | 6 | 3 | R.-V. International, https://riscv.org. | ||
291 | 8 | 13 | R.A. DeMillo, R.J. Lipton, and F.G. Sayward. Hints on Test Data Selection: Help for the Practicing Programmer. Computer, 11(4):34–41, apr 1978. | ||
295 | 8 | 17 | R.G. Hamlet. Testing Programs with the Aid of a Compiler. IEEE Transactions on Software Engineering, SE-3(4):279–290, jul 1977. | ||
323 | 9 | 1 | Ralf Hannappel, “The impact of global warming on the automotive industry, ” AIP Conference Proceedings 1871, 060001, 2017. | ||
376 | 11 | 7 | Ray Beaulieu, Douglas Shors, Jason Smith, Stefan Treatman-Clark, Bryan Weeks, and Louis Wingers. The simon and speck families of lightweight block ciphers. Cryptology ePrint Archive, Report 2013/404, 2013. https://eprint.iacr.org/2013/404. | ||
304 | 8 | 26 | Reza Matinnejad, Shiva Nejati, Lionel C. Briand, and Thomas Bruckmann. Automated test suite generation for time-continuous simulink models. In Proceedings of the 38th International Conference on Software Engineering - ICSE ’16, pages 595–606, New York, New York, USA, 2016. ACM Press. | ||
206 | 6 | 8 | RISC-V Community, “”Smclic” Core-Local Interrupt Controller (CLIC) RISC-V Privileged Architecture Extension,” https://github.com/riscv/riscv-fast-interrupt/blob/master/clic.adoc, 2022. | ||
231 | 6 | 33 | RISC-V Community, “RISC-V Platform-Level Interrupt Controller Specification,” | ||
47 | 2 | 23 | Robert Bosch GmbH. Can specification version 2.0. Technical Standard, 1991. | ||
60 | 2 | 36 | Robert Lee and Alice Brown. Uds protocol: Strengthening authentication in fota systems. Journal of Automotive Cybersecurity, 9(3):87–102, 2020. | ||
307 | 8 | 29 | Robert Nilsson and Jeff Offutt. Automated testing of timeliness: A case study. In Proceedings - International Conference on Software Engineering, 2007. | ||
228 | 6 | 30 | Robot Operating System (ROS), https://www.ros.org. | ||
347 | 9 | 25 | Rolf Johansson, Rikard Andersson, Markus Dernevik, “Enabling Tomorrow’s Road Vehicles by Service-Oriented Platform Patterns,” ERTS 2018, Toulouse, France, Jan 2018. | ||
333 | 9 | 11 | Rumez, Marcel & Grimm, Daniel & Kriesten, Reiner & Sax, Eric, “An Overview of Automotive Service-Oriented Architectures and Implications for Security Countermeasures”. IEEE Access. 8. 10.1109/ACCESS, 2020. | ||
421 | 12 | 16 | Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada, Naoki Adachi, Yukihiro Miyashita, and Satoshi Horihata. 2014. CaCAN-centralized authentication system in CAN (controller area network). In 14th Int. Conf. on Embedded Security in Cars (ESCAR 2014). | ||
392 | 11 | 23 | Ryo Kurachi, Yutaka Matsubara, Hiroaki Takada, Naoki Adachi, Yukihiro Miyashita, and Satoshi Horihata. Cacan-centralized authentication system in can (controller area network). In 14th Int. Conf. on Embedded Security in Cars (ESCAR 2014), 2014. | ||
245 | 7 | 1 | S. Checkoway et al., “Comprehensive Experimental Analyses of Automotive Attack Surfaces,” in 20th USENIX Security Symposium, vol. 4.USENIX Association, Aug. 2011, pp. 77–92. | ||
14 | 1 | 13 | S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, K. Koscher, A. Czeskis, F. Roesner, and T. Kohno, “Comprehensive Experimental Analyses of Automotive Attack Surfaces,” in Proceedings of the 20th USENIX Security Symposium (USENIX Sec’11), 2011, DOI: 10.5555/2028067.2028073. | ||
268 | 7 | 24 | S. Fassak et al., “A secure protocol for session keys establishment between ECUs in the CAN bus,” in 2017 International Conference on Wireless Networks and Mobile Communications (WINCOM). IEEE, Nov. 2017. | ||
330 | 9 | 8 | S. Khurshid, C.S. Păsăreanu, W. Visser, “Generalized symbolic execution for model checking and testing,” International Conference On Tools And Algorithms For the Construction And Analysis Of Systems, Springer, pp. 553-568, 2003 | ||
106 | 3 | 31 | S. Kim, R. Shrestha, S. Kim, and R. Shrestha, “Internet of vehicles, vehicular social networks, and cybersecurity,” Automotive cyber security: introduction, challenges, and standardization, pp. 149–181, 2020. | ||
491 | 16 | 9 | S. Kunze, W. Mostowski, M.R. Mousavi & M. Varshosaz (2016): Generation of Failure Models through Automata Learning. In: Second International Workshop on Automotive Software Architectures (WASA 2016), IEEE Society, pp. 22–25, doi:10.1109/WASA.2016.7. | ||
111 | 3 | 36 | S. Lee, W. Choi, and D. H. Lee, “Protecting some/ip communication via authentication ticket,” Sensors, vol. 23, no. 14, p. 6293, 2023. | ||
104 | 3 | 29 | SAE Vehicle Electrical System Security Committee, “SAE J3061 Cybersecurity Guidebook for Cyber-Physical Automotive Systems,” SAE Standard, Warrendale, PA, USA, Work-in-Progress, 2017. | ||
189 | 5 | 20 | Sakthivel Manikandan Sundharam, Lionel Havet, Sebastian Altmeyer, and Nicolas Navet. A model-based development environment for rapid-prototyping of latency-sensitive automotive control software. In Proceedings - 2016 6th International Symposium on Embedded Computing and System Design, ISED 2016, pages 228–233, 2017. | ||
58 | 2 | 34 | Samuel P. Johnson and Laura K. Martinez. Delta updating: Enhancing efficiency in automotive firmware over-the-air systems. Journal of Embedded Systems, 18(2):123–135, 2020. | ||
446 | 13 | 12 | Schafer, J., Klein, D., 2013. Implementing Situation Awareness for Car-to-X Applications Using Domain Specific Languages, in: 2013 IEEE 77th Vehicular Technology Conference (VTC Spring). Presented at the 2013 IEEE 77th Vehicular Technology Conference (VTC Spring), IEEE, Dresden, Germany, pp. 1–5. https://doi.org/10.1109/VTCSpring.2013.6692589 | ||
202 | 6 | 4 | Semico, “Risc-v market analysis: The new kid on the block,” Tech. Rep., 2019. | ||
334 | 9 | 12 | Seon Sim, Seung Jun Lee, “End-to-End Connectivity Design with Automotive Ethernet & Service-Oriented Architecture,” IEEE-SA Ethernet & IP, London, October, 2018. | ||
400 | 11 | 31 | Serge Vaudenay. Security flaws induced by cbc padding — applications to ssl, ipsec, wtls... In Lars R. Knudsen, editor, Advances in Cryptology — EUROCRYPT 2002, pages 534–545, Berlin, Heidelberg, 2002. Springer Berlin Heidelberg. | ||
172 | 5 | 3 | Sha L., Rajkumar R., and Lehoczky J. Priority inheritance protocols: An approach to real-time synchronization. IEEE Transactions on Computers, 30(9):1175–1185, Septebmer 1990. | ||
288 | 8 | 10 | Shafiul Azam Chowdhury, Sohil Lal Shrestha, Taylor T. Johnson, and Christoph Csallner. Slemi: Equivalence modulo input (emi) based mutation of cps models for finding compiler bugs in simulink. In 2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE), pages 335–346, 2020. | ||
242 | 6 | 44 | Siemens, “Jailhouse,” https://github.com/siemens/jailhouse. | ||
223 | 6 | 25 | SiFive, “Press release — sifive rolls out powerful new risc-v portfolio to address unmet performance and feature needs of rapidly evolving next-gen digital automobiles,” https://www.sifive.com/press/sifive-rolls-out-powerful-new-risc-v-portfolio-to-address, Sep. 2022. | ||
169 | 5 | 0 | SimSched: A tool for Simulating Autosar Implementaion in Simulink Jian Chen, Manar H. Alalfi, Thomas R. Dean, Ramesh S https://arxiv.org/pdf/2308.14974 | ||
75 | 3 | 0 | SISSA: Real-time Monitoring of Hardware Functional Safety and Cybersecurity with In-vehicle SOME/IP Ethernet Traffic Qi Liu, Xingyu Li, Ke Sun, Yufeng Li, Yanchen Liu https://arxiv.org/pdf/2402.14862 | ||
39 | 2 | 15 | Sophia Brown and Daniel Gray. Layered software architecture in autosar: Enhancing scalability and modularity. Automotive Software Engineering Journal, 18(3):75–89, 2022. | ||
51 | 2 | 27 | Sophia Green and Michael Roberts. Sustainability benefits of over-the-air updates in the automotive industry. Sustainable Automotive Technology Review, 10(4):210–225, 2019. | ||
61 | 2 | 37 | Sophia Lee and Daniel Carter. Design and implementation of communication protocols in fota systems. Automotive Technology Journal, 20(1):45–60, 2022. | ||
134 | 4 | 7 | Specification of Operating System, R20-11, Adaptive Platform, AUTOSAR, 2020. | ||
133 | 4 | 6 | Specification of Operating System, R20-11, AUTOSAR, 2020. | ||
447 | 13 | 13 | Specification of UDP Network Management, n.d. 103. | ||
429 | 12 | 24 | STMicroelectronics. [n. d.]. X-CUBE-CRYPTOLIB. https://www.st.com/en/embedded-software/x-cube-cryptolib.html | ||
430 | 12 | 25 | STMicroelectronics. 2018. STM32CubeMX. https://www.st.com/en/development-tools/stm32cubemx.html. | ||
69 | 2 | 45 | STMicroelectronics. STM32F4 Series Reference Manual, 2023. Available online at https://www.st.com/resource/en/reference_manual/dm00031020.pdf. | ||
70 | 2 | 46 | STMicroelectronics. Stm32f401re nucleo board, 2025. Accessed: 2025-02-05. | ||
163 | 4 | 36 | T. Aoki, M. Satoh et al.: Combined Model Checking and Testing Create Confidence-A Case on Commercial Automotive Operating System, pp.109-132, Cyber-Physical System Design from an Architecture Analysis Viewpoint, Springer, 2017. | ||
483 | 16 | 1 | T. Arts & J. Hughes (2016): How Well are Your Requirements Tested? In: 2016 IEEE International Conference on Software Testing, Verification and Validation, pp. 244–254, doi:10.1109/ICST.2016.23. | ||
486 | 16 | 4 | T. Arts & M.R. Mousavi (2015): Automatic Consequence Analysis of Automotive Standards (AUTO-CAAS). In: First International Workshop on Automotive Software Architectures (WASA 2015), ACM Press, pp.35–38, doi:10.1145/2752489.2752495. | ||
484 | 16 | 2 | T. Arts, J. Hughes, J. Johansson & U. Wiger (2006): Testing telecoms software with QuviQ QuickCheck. In: Proceedings of ERLANG’06, ACM, pp. 2–10, doi:10.1145/1159789.1159792. | ||
485 | 16 | 3 | T. Arts, J. Hughes, U. Norell & H. Svensson (2015): Testing AUTOSAR software with QuickCheck. In: Eighth IEEE International Conference on Software Testing, Verification and Validation Workshops, pp. 1–4, doi:10.1109/ICSTW.2015.7107466. | ||
99 | 3 | 24 | T. Gehrmann and P. Duplys, “Intrusion detection for some/ip: Challenges and opportunities,” in 2020 23rd Euromicro Conference on Digital System Design (DSD). IEEE, 2020, pp. 583–587. | ||
117 | 3 | 42 | T. He, L. Zhang, F. Kong, and A. Salekin, “Exploring inherent sensor redundancy for automotive anomaly detection,” in 2020 57th ACM/IEEE Design Automation Conference (DAC). IEEE, 2020, pp. 1–6. | ||
110 | 3 | 35 | T. Koyama, M. Tanaka, A. Miyajima, S. Ukai, T. Sugashima, and M. Egawa, “Some/ip intrusion detection system using real-time and retroactive anomaly detection,” in 2022 IEEE 95th Vehicular Technology Conference:(VTC2022-Spring). IEEE, 2022, pp. 1–7. | ||
148 | 4 | 21 | T. Nipkow, L. Paulson et al.: Isabelle/HOL – A Proof Assistant for Higher-Order Logic, vol. 2283, LNCS, Springer, 2002. | ||
130 | 4 | 3 | Technical Assessment of Toyota Electronic Throttle Control Systems, NHTSA, 2011. | ||
180 | 5 | 11 | The AUTOSAR Consortium. Applying simulink to autosar, r3.1., 2006. | ||
317 | 180 | 8 | 39 | The AUTOSAR Consortium. Applying simulink to autosar, r3.1., 2006. | |
171 | 5 | 2 | The AUTOSAR Consortium. AUTOSAR Methodology, r4.3., 2018. | ||
196 | 5 | 27 | The AUTOSAR Consortium. Specification of RTE Software, r4.4., 2018. | ||
177 | 5 | 8 | The AUTOSAR Consortium. Specification of Timing extensions, r4.4., 2018. | ||
176 | 5 | 7 | The AUTOSAR Consortium. The AUTOSAR Standard, r4.3., 2018. | ||
318 | 176 | 8 | 40 | The AUTOSAR Consortium. The AUTOSAR Standard, r4.3., 2018. | |
322 | 9 | 0 | The Digital Foundation Platform -- A Multi-layered SOA Architecture for Intelligent Connected Vehicle Operating System David Yu, Andy Xiao https://arxiv.org/pdf/2210.08818 | ||
236 | 6 | 38 | The Linux Foundation, “Enabling Linux in Safety Applications (ELISA),” https://elisa.tech/. | ||
235 | 6 | 37 | The Linux Foundation, “The real-time linux collaborative project,” https://wiki.linuxfoundation.org/realtime/. | ||
184 | 5 | 15 | Thomas A Henzinger, Benjamin Horowitz, and Christoph Meyer Kirsch. Giotto: A time-triggered lan- guage for embedded programming. Emsoft, 91(1):166–184, 2001. | ||
35 | 2 | 11 | Thomas Becker and Jane Williams. A comprehensive review of lane keeping systems: Advancements and challenges. Automotive Safety Journal, 34(7):125–137, 2022. | ||
37 | 2 | 13 | Thomas Braun and Julia Mayer. Priority arbitration in can protocols for real-time automotive systems. International Journal of Embedded Systems, 12(4):215–229, 2021. | ||
52 | 2 | 28 | Thomas Green and Rachel Adams. Applications of can protocols in modern automotive systems. IEEE Communications Surveys and Tutorials, 23(1):98–115, 2021. | ||
278 | 8 | 0 | Timed Model-Based Mutation Operators for Simulink Models Jian Chen, Manar H. Alalfi, Thomas R. Dean https://arxiv.org/pdf/2301.00efe | ||
404 | 11 | 35 | Tobias Ziermann, Stefan Wildermann, and J¨ urgen Teich. Can+: A new backward-compatible controller area network (can) protocol with up to16x higher data rates. In Proceedings of the Conference on Design, Automation and Test in Europe, pages 1088–1093. European Design and Automation Association, 2009. | ||
433 | 12 | 28 | Tobias Ziermann, Stefan Wildermann, and Jürgen Teich. 2009. CAN+: A new backward-compatible Controller Area Network (CAN) protocol with up to 16x higher data rates. In Proceedings of the Conference on Design, Automation and Test in Europe. European Design and Automation Association, 1088–1093. | ||
405 | 12 | 0 | TOUCAN: A proTocol tO secUre Controller Area Network Giampaolo Bella, Pietro Biondi, Gianpiero Costantino, Ilaria Matteucci https://arxiv.org/pdf/2111.10642 | ||
198 | 6 | 0 | Towards a RISC-V Open Platform for Next-generation Automotive ECUs Luca Cuomo, Claudio Scordino, Alessandro Ottaviano, Nils Wistoff, Robert Balas, Luca Benini, Errico Guidieri, Ida Maria Savino https://arxiv.org/pdf/2307.04148 | ||
342 | 9 | 20 | Tsuyoshi Tsumuraya, “The evolution of E/E architecture and Software platform for R-Car/RH850,” Accessed: Sep. 9, 2021. https://www.renesas.com/us/en/blogs/evolution-ee-architecture-and-software-platform-r-carrh850 | ||
120 | 3 | 45 | V. Prasanth, D. Foley, and S. Ravi, “Demystifying automotive safety and security for semiconductor developer,” in 2017 IEEE International Test Conference (ITC). IEEE, 2017, pp. 1–10. | ||
401 | 11 | 32 | Vector. Solutions for Automotive Ethernet. https://www.vector.com/int/en/know-how/technologies/networks/automotive-ethernet/, 2020. | ||
123 | 3 | 48 | W. Chen, F. Lyu, F. Wu, P. Yang, and J. Ren, “Flag: Flexible, accurate, and long-time user load prediction in large-scale wifi system using deep rnn,” IEEE Internet of Things Journal, vol. 8, no. 22, pp. 16 510–16 521, 2021. | ||
17 | 1 | 16 | W. Choi, K. Joo, H. J. Jo, M. C. Park, and D. H. Lee, “VoltageIDS: Low-Level Communication Characteristics for Automotive Intrusion Detection System,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2114–2129, 2018, DOI:10.1109/TIFS.2018.2812149. | ||
95 | 17 | 3 | 20 | W. Choi, K. Joo, H. J. Jo, M. C. Park, and D. H. Lee, “Voltageids: Low-level communication characteristics for automotive intrusion detection system,” IEEE Transactions on Information Forensics and Security, vol. 13, no. 8, pp. 2114–2129, 2018. | |
277 | 7 | 33 | W. Dai, “Crypto++ library 8.7,”. Website.Online | ||
88 | 3 | 13 | W. Young and R. Porada, “System-theoretic process analysis for security(stpa-sec): Cyber security and stpa,” in 2017 STAMP Conference, 2017. | ||
67 | 2 | 43 | William Scott and Patricia Reed. Practical applications of fota in automotive maintenance. Automotive Software and Maintenance Journal, 19(2):233–245, 2021. | ||
448 | 13 | 14 | Xie, G., Li, Y., Han, Y., Xie, Y., Zeng, G., Li, R., 2020. Recent Advances and Future Trends for Automotive Functional Safety Design Methodologies. IEEE Trans. Ind. Inform. 16, 5629–5642. https://doi.org/10.1109/TII.2020.2978889 | ||
221 | 6 | 23 | Xilinx, “Zcu102,” https://www.xilinx.com/products/boards-and-kits/ek-u1-zcu102-g.html. | ||
402 | 11 | 33 | Xuhang Ying, Giuseppe Bernieri, Mauro Conti, and Radha Poovendran. TACAN: transmitter authentication through covert channels in controller area networks. CoRR, abs/1903.05231, 2019. | ||
13 | 1 | 12 | Y. Challal, H. Bettahar, and A. Bouabdallah, “A taxonomy of multicast data origin authentication: Issues and solutions,” IEEE Communications Surveys & Tutorials, vol. 6, no. 3, pp. 34–57, 2004, DOI: 10.1109/COMST.2004.5342292. | ||
152 | 4 | 25 | Y. Choi and T. Byun: Constraint-based test generation for automotive operating systems, Software & Systems Modeling, vol.16, no.1, pp.7–24, 2017. | ||
151 | 4 | 24 | Y. Choi: Model checking trampoline OS: a case study on safety analysis for automotive software. Softw. Test. Verif. Reliab. 24(1), pp.38–60, 2014. | ||
155 | 4 | 28 | Y. Huang, Y. Zhao et al.: Modeling and verifying the code-level OSEK/VDX operating system with CSP, TASE, pp. 142–149, 2011. | ||
94 | 3 | 19 | Y. Xun, Y. Zhao, and J. Liu, “Vehicleeids: A novel external intrusion detection system based on vehicle voltage signals,” IEEE Internet of Things Journal, vol. 9, no. 3, pp. 2124–2133, 2021. | ||
478 | 15 | 19 | Y. Zhao, J. Liu, and E. A. Lee, “A programming model for time- synchronized distributed real-time systems,” in 13th IEEE Real Time and Embedded Technology and Applications Symposium (RTAS’07), Apr. 2007, pp. 259–268. | ||
321 | 8 | 43 | Yuan Zhan and John A. Clark. Search-based mutation testing for simulink models. In GECCO 2005 - Genetic and Evolutionary Computation Conference, pages 1061–1068, New York, New York, USA, 2005. ACM Press. | ||
300 | 8 | 22 | Yue Jia and Mark Harman. An Analysis and Survey of the Development of Mutation Testing. IEEE Transactions on Software Engineering, 37(5):649–678, sep 2011. | ||
329 | 9 | 7 | Zhu, D., Kumar, V., Ravi, V. et al., "Detection method for Cybersecurity attack on Connected vehicles," SAE Technical Paper 2021-01-1249, 2021. |
Related Notes
Strategy to some summary and propose to AUTOSAR, SDV and Software Factory.
https://qiita.com/kaizen_nagoya/items/d36a9eba629022276918
AUTOSAR paper on arXiv
https://qiita.com/kaizen_nagoya/items/7c2355275ec53dbdc7a2
sdv, autosar and software factory papers on arxiv and their references
https://qiita.com/kaizen_nagoya/items/0eb7e74d049133ae4bfe
AUTOSAR on arXiv reference paper summary
https://qiita.com/kaizen_nagoya/items/aa639a268aaa56c5a501
Yet another strategy for papers on Software Engineering.
https://qiita.com/kaizen_nagoya/items/d186dfcb4d4f7cd1dcf1