User-Centric Security and Privacy Threats in Connected Vehicles: A Threat Modeling Analysis Using STRIDE and LINDDUN

B Stingelová, CT Thrakl, L Wrońska… - 2023 IEEE Intl Conf …, 2023 - ieeexplore.ieee.org
The increasing equipment of cars with smart systems and their networking with other
devices is leading to a growing network of connected vehicles. Connected cars are Internet …

Security of communications in connected cars modeling and safety assessment

S Tbatou, A Ramrami, Y Tabii - … of the 2nd international Conference on …, 2017 - dl.acm.org
In the context of modernization and development of new information and communications
technology, ultra-connected world has become a strategic element. Wireless communication …

Security and privacy challenges in connected vehicular cloud computing

A Masood, DS Lakew, S Cho - IEEE Communications Surveys …, 2020 - ieeexplore.ieee.org
Vehicular cloud computing (VCC) is an improvement from conventional cloud computing to
new revolutionized computing services including intelligent transportation, autonomous …

Threat modeling and attack simulations of connected vehicles: Proof of concept

W Xiong, F Krantz, R Lagerström - … Czech Republic, February 23-25, 2019 …, 2020 - Springer
A modern vehicle contains over a hundred Electronic Control Units (ECUs) that
communicate over in-vehicle networks, and can also be connected to external networks …

Mobile applications for connected cars: Security analysis and risk assessment

N Topman, A Adnane - NOMS 2022-2022 IEEE/IFIP Network …, 2022 - ieeexplore.ieee.org
As connected vehicles continue to become more advanced and widespread, it is vital to
ensure that vehicle to everything (V2X) communications are secure. Connected car mobile …

Autonomous driving security: A comprehensive threat model of attacks and mitigation strategies

MA Hoque, R Hasan - 2022 IEEE 8th World Forum on Internet …, 2022 - ieeexplore.ieee.org
Autonomous vehicles (AVs) are envisioned to enhance safety and efficiency on the road,
increase productivity, and positively impact the urban transportation system. Due to recent …

[PDF][PDF] Responsibility for vehicle security and driver privacy in the age of the Connected Car

D Brown - URL: http://www. veracode. com/sites/default/files …, 2016 - veracode.com
The Connected Car is one of the primary use cases for the Internet of Things (IoT). Yet it is
one of the least well understood in terms of cybersecurity. Recent media coverage has …

Analysis and simulation of cyber attacks against connected and autonomous vehicles

S Malik, W Sun - 2020 international conference on connected …, 2020 - ieeexplore.ieee.org
We are expecting to see hundreds of thousands of smart connected cars in a matter of
months from now until they replace the legacy vehicles. Connectivity is at the core of every …

Threat modeling of connected vehicles: A privacy analysis and extension of vehiclelang

W Xiong, R Lagerström - 2019 International Conference on …, 2019 - ieeexplore.ieee.org
Modern vehicles contain more than a hundred Electronic Control Units (ECUs) that
communicate over different in-vehicle networks. These ECUs are often connected to the …

An Inclusive Survey of Internet of Vehicles with Emphasis on Cyber Security & Forensics

PS Indushree, GR Kiranmayi - 2023 Intelligent Computing …, 2023 - ieeexplore.ieee.org
The Internet of Vehicles (IoV), often referred to as interconnected automobiles, establishes
an expansive network interlinking diverse entities such as users, sensors, and vehicles. This …