DAC '97 Proceedings of the 34th annual Design Automation Conference
Synthesis and Optimization of Digital Circuits
Synthesis and Optimization of Digital Circuits
Silicon physical random functions
Proceedings of the 9th ACM conference on Computer and communications security
Telematics: Safe and Fun Driving
IEEE Intelligent Systems
Interface Theories for Component-Based Design
EMSOFT '01 Proceedings of the First International Workshop on Embedded Software
The Confused Deputy: (or why capabilities might have been invented)
ACM SIGOPS Operating Systems Review
Timing Analysis of the FlexRay Communication Protocol
ECRTS '06 Proceedings of the 18th Euromicro Conference on Real-Time Systems
Security analysis of a cryptographically-enabled RFID device
SSYM'05 Proceedings of the 14th conference on USENIX Security Symposium - Volume 14
Securing vehicles against cyber attacks
Proceedings of the 4th annual workshop on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead
On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
SAFECOMP '08 Proceedings of the 27th international conference on Computer Safety, Reliability, and Security
Proceedings of the 2008 IEEE/ACM International Conference on Computer-Aided Design
SAFECOMP '09 Proceedings of the 28th International Conference on Computer Safety, Reliability, and Security
Simulated attacks on CAN buses: vehicle virus
AsiaCSN '08 Proceedings of the Fifth IASTED International Conference on Communication Systems and Networks
A Survey of Hardware Trojan Taxonomy and Detection
IEEE Design & Test
On the efficiency of secure beaconing in VANETs
Proceedings of the third ACM conference on Wireless network security
Experimental Security Analysis of a Modern Automobile
SP '10 Proceedings of the 2010 IEEE Symposium on Security and Privacy
USENIX Security'10 Proceedings of the 19th USENIX conference on Security
A Formalization of the Security Features of Physical Functions
SP '11 Proceedings of the 2011 IEEE Symposium on Security and Privacy
Comprehensive experimental analyses of automotive attack surfaces
SEC'11 Proceedings of the 20th USENIX conference on Security
SECURING VEHICULAR COMMUNICATIONS
IEEE Wireless Communications
Can EDA combat the rise of electronic counterfeiting?
Proceedings of the 49th Annual Design Automation Conference
Secure vehicular communication systems: implementation, performance, and research challenges
IEEE Communications Magazine
Provably Secure Active IC Metering Techniques for Piracy Avoidance and Digital Rights Management
IEEE Transactions on Information Forensics and Security - Part 1
Future perspectives: the car and its IP-address - a potential safety and security risk assessment
SAFECOMP'07 Proceedings of the 26th international conference on Computer Safety, Reliability, and Security
Can EDA combat the rise of electronic counterfeiting?
Proceedings of the 49th Annual Design Automation Conference
Trust assurance levels of cybercars in v2x communication
Proceedings of the 2013 ACM workshop on Security, privacy & dependability for cyber vehicles
Security-aware mapping for CAN-based real-time distributed automotive systems
Proceedings of the International Conference on Computer-Aided Design
Design synthesis and optimization for automotive embedded systems
Proceedings of the 2014 on International symposium on physical design
Hi-index | 0.00 |
Modern vehicles integrate a multitude of embedded hard realtime control functionalities, and a host of advanced information and entertainment (infotainment) features. The true paradigm shift for future vehicles (cybercars) is not only a result of this increasing plurality of subsystems and functions, but is also driven by the unprecedented levels of intra- and inter-car connections and communications as well as networking with external entities. Several new cybercar security and safety challenges simultaneously arise. On one hand, many challenges arise due to increasing system complexity as well as new functionalities that should jointly work on the existing legacy protocols and technologies; such systems are likely unable to warrant a fully secure and dependable system without afterthoughts. On the other hand, challenges arise due to the escalating number of interconnections among the real-time control functions, infotainment components, and the accessible surrounding external devices, vehicles, networks, and cloud services. The arrival of cybercars calls for novel abstractions, models, protocols, design methodologies, testing and evaluation tools to automate the integration and analysis of the safety and security requirements.