0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?

Security-Aware Modeling and Efficient Mapping for CAN-Based Real-Time Distributed Automotive Systems

Posted at

Security-Aware Modeling and Efficient Mapping for CAN-Based Real-Time Distributed Automotive Systems, Publisher: IEEE
Chung-Wei Lin; Qi Zhu; Alberto Sangiovanni-Vincentelli

reference

  1. “CAN Specification version 2.0”, 1991.
  2. “CAN with Flexible Data-Rate White Paper version 1.1”, 2011.
  3. S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H. Shacham, S. Savage, et al., "Comprehensive experimentalanalyses of automotive attack surfaces", USENIX Conf. Security, 2011.
  4. B. Groza, S. Murvay, A. Van Herrewege and I. Verbauwhede, "LiBrA-CAN: A lightweight broadcast authenticationprotocol for Controller Area Networks", Proc. Int. Conf. Cryptology Netw. Security, pp. 185-200, 2012.
  5. T. Hoppe, S. Kiltz and J. Dittmann, "Security threats to automotive CAN networks—practicalexamples and selected short-term countermeasures", Proc. Int. Conf. Computer Safety Rel. Security, pp. 11-25, 2008.
  6. P. Kleberger, T. Olovsson and E. Jonsson, "Security aspects of the in-vehicle network in theconnected car", Proc. IEEE Intell. Veh. Symp., pp. 528-533, 2011.
  7. K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S. Checkoway, et al., "Experimental security analysis of a modern automobile", Proc. IEEE Symp. Security Privacy, pp. 447-462, 2010.
  8. F. Koushanfar, A. Sadeghi and H. Seudie, "EDA for secure and dependable cybercars: Challengesand opportunities", Proc. ACM/IEEE Design Autom. Conf., pp. 220-228, 2012.
  9. C.-W. Lin and A. Sangiovanni-Vincentelli, "Cyber-security for the ControllerArea Network (CAN) communication protocol", Proc. ASE Int. Conf. Cyber Security, pp. 344-350, 2012.
  10. C.-W. Lin, Q. Zhu, C. Phung and A. Sangiovanni-Vincentelli, "Security-aware mapping for CAN-basedreal-time distributed automotive systems", Proc. IEEE/ACM Int. Conf. Computer-Aided Design, pp. 115-121, 2013.
  11. I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu, et al., "Security and privacyvulnerabilities of in-car wireless networks: A tire pressure monitoringsystem case study", USENIX Conf. Security, 2010.
  12. A. Van Herrewege, D. Singelee and I. Verbauwhede, "CANAuth—a simplebackward compatible broadcast authentication protocol for CAN bus", Workshop on Embedded Security in Cars, 2011.
  13. M. Wolf, A. Weimerskirch and C. Paar, "Security in automotivebus systems", Workshop on Embedded Security in Cars, 2004.

Related Article on Qiita

CAN FD and CAN XL on arXiv
https://qiita.com/kaizen_nagoya/items/d8efb0da53cd3456f735

CAN FD & CAN XL on arXiv references
https://qiita.com/kaizen_nagoya/items/7df86c66084372a96f1d

CAN FD & CAN XL on arXiv references name order
https://qiita.com/kaizen_nagoya/items/ec5e4e4491228db534c0

0
1
0

Register as a new user and use Qiita more conveniently

  1. You get articles that match your needs
  2. You can efficiently read back useful information
  3. You can use dark theme
What you can do with signing up
0
1

Delete article

Deleted articles cannot be recovered.

Draft of this article would be also deleted.

Are you sure you want to delete this article?