KT Cho, KG Shin - Proceedings of the 2016 ACM SIGSAC Conference …, 2016 - dl.acm.org
Contemporary vehicles are getting equipped with an increasing number of Electronic Control Units (ECUs) and wireless connectivities. Although these have enhanced vehicle …
Automobiles are equipped with Electronic Control Units (ECUs) that communicate via in- vehicle network protocol standards such as the Controller Area Network (CAN). These …
This paper presents a new masquerade attack called the cloaking attack and provides formal analyses for clock skew-based intrusion detection systems (IDSs) that detect …
A Tsoi, J Hinch, R Ruth, H Gabler - SAE International Journal of …, 2013 - JSTOR
This study evaluates the accuracy of 41 Event Data Recorders (EDR) extracted from model year 2012 General Motors, Chrysler, Ford, Honda, Mazda, Toyota, and Volvo vehicles …
L Gao, F Li, X Xu, Y Liu - Cluster Computing, 2019 - Springer
With the continuous development of the intelligent vehicle, vehicle security events occur frequently, therefore, the vehicle information security is particularly important. In this paper …
Y Chen, M Alam, S Mumtaz - IEEE Transactions on Green …, 2022 - ieeexplore.ieee.org
In vehicle security, attack identification has been proposed to identify the compromised electronic control units (ECUs) of a vehicle. Fingerprinting methods using a variety of …
M Tian, R Jiang, C Xing, H Qu, Q Lu… - 2019 IEEE 38th …, 2019 - ieeexplore.ieee.org
The in-vehicle controller area network (CAN) provides reliable communications among ECUs, whereas the lack of security design of CAN protocols makes it vulnerable to CAN …
J Laufenberg, T Kropf, O Bringmann - European Journal for Security …, 2021 - Springer
The vulnerability of modern cars increases due to their multiple connections to the environment, which offers the possibility of remote attacks in the worst case with fatal …
M Tian, R Jiang, H Qu, Q Lu… - Security and …, 2020 - Wiley Online Library
External wireless interfaces and the lack of security design of controller area network (CAN) standards make it vulnerable to CAN‐targeting attacks. Unfortunately, various defense …