Attack potential and efficient security enhancement of automotive bus networks using short MACs with rapid key change

S Bittl - … Technologies for Vehicles: 6th International Workshop …, 2014 - Springer
A number of successful attacks on automotive bus systems has been published recently.
However, only a limited amount of detailed studies about attack surfaces as well as efficient …

Using deep learning to detect network intrusions and malware in autonomous robots

A Jones, J Straub - Cyber Sensing 2017, 2017 - spiedigitallibrary.org
Cybersecurity threats to autonomous robots present a particular danger, as compromised
robots can directly and catastrophically effect their surroundings. A two-staged intrusion …

Threat Issues of Intelligent Transport System in the V2X Convergence Service Envrionment

JK Hong - 한국융합학회논문지, 2015 - earticle.net
V2X 카 융합서비스 환경에서, 인포테인먼트 서비스와 운전자 관리 서비스 가운데 주요
서비스는 드라이 버, 유지보수 관리자, 고객, 익명의 사용자의 중요한 정보를 중심으로 …

[PDF][PDF] Experimental analysis and implementation of bit level permutation instructions for embedded security

G Bansod, A Gupta, A Ghosh, G Bishnoi… - … on Information Science …, 2013 - academia.edu
With the increasing use of electronic control units (ECU's) in automobile or in any embedded
system security becomes an area of grave concern. Information is exchanged between …

Efficient Secure Communication in VANETs under the Presence of new Requirements Emerging from Advanced Attacks

S Bittl - 2017 - edoc.hu-berlin.de
Vehicular ad-hoc networks (VANETs) are an important approach to increase future safety of
driving by enabling cooperative advanced driver assistance systems. However, rigid security …

[PDF][PDF] Implementation of efficient bit permutation box for embedded security

N Raval, G Bansod, DN PISHAROTY - WSEAS Transactions on …, 2014 - wseas.com
Security in every real time applications is of utmost importance. The secure architecture
implemented in the automobiles such as EVITA (E-safety Vehicle Intrusion protected …

[PDF][PDF] Angriffspotentiale und Effiziente Absicherung Automobiler Bussysteme als Grundlage sicherer Car2X-Kommunikation

S Bittl, ESK Fraunhofer - 11th Conference Wireless …, 2014 - publica.fraunhofer.de
In den letzten Jahren wurde eine zunehmende Anzahl an Angriffen auf
Kommunikationsschnittstellen im Automobilbereich veröffentlicht. Außerdem ergeben sich …

[PDF][PDF] Analysis of cost effective bit permutation instructions for an embedded security

GV BANSOD, N PISHAROTY - academia.edu
As the number of Electronic Control Units (ECU's) is increasing in an embedded system this
opens a wide gateway for manipulating the data inside a system. In an automotive system …

An efficient approach to tolerate attackers in fault-tolerant systems

J Formann - 2014 - dl.gi.de
Malicious attackers can cause severe damage (financially or to the environment) if they gain
control of safety-relevant systems. This paper shows why the traditional disjoint treatment of …

Middleware para la planificación dinámica y adaptativa de comunicaciones multienlace vehículo-tierra con requisitos de calidad del servicio

IS Larrauri - 2013 - dialnet.unirioja.es
Las importantes inversiones en innovación tecnológica afrontadas por los operadores de
transporte durante los últimos años han permitido generalizar la adopción de tecnologías …