[PDF][PDF] 0-days & mitigations: roadways to exploit and secure connected BMW cars

Z Cai, A Wang, W Zhang, M Gruffke, H Schweppe - Black Hat USA, 2019 - i.blackhat.com
Abstract In years 2016 and 2017, Keen Security Lab [1] has demonstrated two remote
attacks against Tesla Model S/X [2][3]; During a study conducted between early 2017 and …

Cross-layer design of automotive systems

Z Wang, H Liang, C Huang, Q Zhu - IEEE Design & Test, 2020 - ieeexplore.ieee.org
This article presents multiple cross-layer methods to ensure security as well as functional
correctness of automotive systems. These approaches tie together multiple abstraction …

[HTML][HTML] Connected and automated vehicles: Infrastructure, applications, security, critical challenges, and future aspects

M Sadaf, Z Iqbal, AR Javed, I Saba, M Krichen… - Technologies, 2023 - mdpi.com
Autonomous vehicles (AV) are game-changing innovations that promise a safer, more
convenient, and environmentally friendly mode of transportation than traditional vehicles …

A Systematic Review of Threat Analysis and Risk Assessment Methodologies for Connected and Automated Vehicles

M Benyahya, T Lenard, A Collen… - Proceedings of the 18th …, 2023 - dl.acm.org
With the prevalence of high cyber risks within the Connected Automated Vehicle (CAV)'s
environment, the core regulation bodies mandated applying Threat Analysis and Risk …

A review of factors impacting Cybersecurity in Connected and Autonomous Vehicles (CAVs)

M Pandey - 2022 8th International Conference on Control …, 2022 - ieeexplore.ieee.org
Cybersecurity, a critical aspect for any organization, is now being introduced into connected
and autonomous vehicles (CAV). Due to enhancements in automation and interconnectivity …

[PDF][PDF] Automotive cybersecurity for in-vehicle communication

K Han, A Weimerskirch, KG Shin - IQT QUARTERLY, 2014 - rtcl.eecs.umich.edu
Automotive cybersecurity issues have emerged as information technologies are increasingly
deployed in modern vehicles, and security researchers have already demonstrated the …

[PDF][PDF] On board diagnostics: Risks and vulnerabilities of the connected vehicle

D Klinedinst, C King - CERT Coordination Center, Tech. Rep, 2016 - academia.edu
The modern vehicle is often referred to as a “computer on wheels.” With over 100M lines of
code, the complexity is greater than your desktop operating system (85M lines of code) and …

Security on in-vehicle communication protocols: Issues, challenges, and future research directions

A Martínez-Cruz, KA Ramírez-Gutiérrez… - Computer …, 2021 - Elsevier
The automotive industry has represented an important sector of industrial development
worldwide. With technology growth, vehicles have been equipped with various devices that …

Secure automotive on-board protocols: A case of over-the-air firmware updates

MS Idrees, H Schweppe, Y Roudier, M Wolf… - … for Vehicles: Third …, 2011 - Springer
The software running on electronic devices is regularly updated, these days. A vehicle
consists of many such devices, but is operated in a completely different manner than …

Defending connected vehicles against malware: Challenges and a solution framework

T Zhang, H Antunes, S Aggarwal - IEEE Internet of Things …, 2014 - ieeexplore.ieee.org
Vehicles face growing security threats as they become increasingly connected with the
external world. Hackers, researchers, and car hobbyists have compromised security keys …