Checkoway et al., 2011 - Google Patents
Comprehensive experimental analyses of automotive attack surfacesCheckoway et al., 2011
View PDF- Document ID
- 15881746861475463428
- Author
- Checkoway S
- McCoy D
- Kantor B
- Anderson D
- Shacham H
- Savage S
- Koscher K
- Czeskis A
- Roesner F
- Kohno T
- Publication year
- Publication venue
- 20th USENIX security symposium (USENIX Security 11)
External Links
Snippet
Modern automobiles are pervasively computerized, and hence potentially vulnerable to attack. However, while previous research has shown that the internal networks within some modern cars are insecure, the associated threat model—requiring prior physical access …
- 238000004450 types of analysis 0 title description 7
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Checkoway et al. | Comprehensive experimental analyses of automotive attack surfaces | |
US11755713B2 (en) | System and method for controlling access to an in-vehicle communication network | |
den Hartog et al. | Security and privacy for innovative automotive applications: A survey | |
Wen et al. | {Plug-N-Pwned}: Comprehensive vulnerability analysis of {OBD-II} dongles as a new {Over-the-Air} attack surface in automotive {IoT} | |
Kelarestaghi et al. | Intelligent transportation system security: impact-oriented risk assessment of in-vehicle networks | |
Zhang et al. | Defending connected vehicles against malware: Challenges and a solution framework | |
Klinedinst et al. | On board diagnostics: Risks and vulnerabilities of the connected vehicle | |
Pan et al. | Cyber security attacks to modern vehicular systems | |
Foster et al. | Fast and vulnerable: A story of telematic failures | |
Luo et al. | Wireless telematics systems in emerging intelligent and connected vehicles: Threats and solutions | |
Yadav et al. | Security, vulnerability and protection of vehicular on-board diagnostics | |
Takahashi | An overview of cyber security for connected vehicles | |
EP2797780B1 (en) | Secured electronic device | |
Ammar et al. | Securing the on-board diagnostics port (obd-ii) in vehicles | |
Huq et al. | Driving security into connected cars: threat model and recommendations | |
Yan | A two-year survey on security challenges in automotive threat landscape | |
Riggs et al. | A survey on connected vehicles vulnerabilities and countermeasures | |
Costantino et al. | Reversing Kia motors head unit to discover and exploit software vulnerabilities | |
Oyler et al. | Security in automotive telematics: a survey of threats and risk mitigation strategies to counter the existing and emerging attack vectors | |
Lin et al. | Common attacks against car infotainment systems | |
Humayed | An overview of vehicle OBD-II port countermeasures | |
Pickford et al. | Systematic Risk Characterisation of Hardware Threats to Automotive Systems | |
Zhang et al. | Securing connected vehicles end to end | |
Nisch | Security Issues in Modern Automotive Systems | |
Ward | Aligning safety and security systems for connected vehicles |