References

  1. Richard R. Brooks, Seok Bae Yun & Juan Deng (2012): Chapter 26 - Cyber-Physical Security of Automotive Information Technology. In: Krishna Kant & Nan Zhang: Handbook on Securing Cyber-Physical Critical Infrastructure. Morgan Kaufmann, Boston, pp. 655–676, doi:10.1016/B978-0-12-415815-3.00026-1.
  2. Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham, Stefan Savage, Karl Koscher, Alexei Czeskis, Franziska Roesner & Tadayoshi Kohno (2011): Comprehensive Experimental Analyses of Automotive Attack Surfaces. In: 20th USENIX Security Symposium, San Francisco, CA, USA, August 8-12, 2011, Proceedings. USENIX Association. Available at http://static.usenix.org/events/sec11/tech/full_papers/Checkoway.pdf.
  3. Eduardo dos Santos, Dominik Schoop & Andrew Simpson (2016): Formal Models for Automotive Systems and Vehicular Networks: Benefits and Challenges. In: 2016 IEEE Vehicular Networking Conference (VNC), Columbus, OH, USA, pp. 1–8, doi:10.1109/VNC.2016.7835940.
  4. Ian D. Foster, Andrew Prudhomme, Karl Koscher & Stefan Savage (2015): Fast and Vulnerable: A Story of Telematic Failures. In: 9th USENIX Workshop on Offensive Technologies, WOOT '15, Washington, DC, USA, August 10-11, 2014.. USENIX Association. Available at https://www.usenix.org/conference/woot15/workshop-program/presentation/foster.
  5. Tobias Hoppe, Stefan Kiltz & Jana Dittmann (2011): Security threats to automotive CAN networks - Practical examples and selected short-term countermeasures. Rel. Eng. & Sys. Safety 96(1), pp. 11–25, doi:10.1016/j.ress.2010.06.026.
  6. Karl Koscher, Alexei Czeskis, Franziska Roesner, Shwetak Patel, Tadayoshi Kohno, Stephen Checkoway, Damon McCoy, Brian Kantor, Danny Anderson, Hovav Shacham & others (2010): Experimental Security Analysis of a Modern Automobile. In: Security and Privacy (SP), 2010 IEEE Symposium On. IEEE, pp. 447–462, doi:10.1109/SP.2010.34.
  7. Sven Laux, Gurjashan Singh Pannu, Stefan Schneider, Jan Tiemann, Florian Klingler, Christoph Sommer & Falko Dressler (2016): Demo: OpenC2X An Open Source Experimental and Prototyping Platform Supporting ETSI ITS-G5. In: 2016 IEEE Vehicular Networking Conference (VNC), pp. 1–2, doi:10.1109/VNC.2016.7835955.
  8. Charlie Miller & Chris Valasek (2013): Adventures in Automotive Networks and Control Units. DEF CON 21, pp. 260–264.
  9. Charlie Miller & Chris Valasek (2014): A Survey of Remote Automotive Attack Surfaces. Black Hat USA 2014, pp. 94.
  10. Charlie Miller & Chris Valasek (2015): Remote Exploitation of an Unaltered Passenger Vehicle. Black Hat USA 2015, pp. 91.
  11. Bassem Mokhtar & Mohamed Azab (2015): Survey on Security Issues in Vehicular Ad Hoc Networks. Alexandria Engineering Journal 54(4), pp. 1115–1126, doi:10.1016/j.aej.2015.07.011.
  12. Philipp Mundhenk, Sebastian Steinhorst, Martin Lukasiewycz, Suhaib A. Fahmy & Samarjit Chakraborty (2015): Security Analysis of Automotive Architectures Using Probabilistic Model Checking. In: Proceedings of the 52Nd Annual Design Automation Conference, DAC '15. ACM, New York, NY, USA, pp. 38:1–38:6, doi:10.1145/2744769.2744906.
  13. Oxford University (2017): FDR4 - The CSP Refinement Checker. https://www.cs.ox.ac.uk/projects/fdr/.
  14. Jonathan Petit, Michael Feiri & Frank Kargl (2014): Revisiting Attacker Model for Smart Vehicles. In: Wireless Vehicular Communications (WiVeC), 2014 IEEE 6th International Symposium On. IEEE, pp. 1–5, doi:10.1109/WIVEC.2014.6953258.
  15. Jonathan Petit & Steven E. Shladover (2015): Potential Cyberattacks on Automated Vehicles. IEEE Transactions on Intelligent Transportation Systems 16(2), pp. 546–556, doi:10.1109/TITS.2014.2342271.
  16. Q. Ran, X. Wu, X. Li, J. Shi, J. Guo & H. Zhu (2014): Modeling and Verifying the TTCAN Protocol Using Timed CSP. In: 2014 Theoretical Aspects of Software Engineering Conference, pp. 90–97, doi:10.1109/TASE.2014.8.
  17. Sanjit A. Seshia, Dorsa Sadigh & S. Shankar Sastry (2015): Formal Methods for Semi-Autonomous Driving 2015-July, doi:10.1145/2744769.2747927.
  18. Hocheol Shin, Dohyun Kim, Yujin Kwon & Yongdae Kim (2017): Illusion and Dazzle: Adversarial Optical Channel Exploits against Lidars for Automotive Applications, doi:10.1007/978-3-642-40349-1\voidb@x 0.06emwidth0.5em4.
  19. Sebastian Siegl, Kai-Steffen Hielscher, Reinhard German & Christian Berger (2011): Formal Specification and Systematic Model-Driven Testing of Embedded Automotive Systems. In: Design, Automation & Test in Europe Conference & Exhibition (DATE), 2011. IEEE, pp. 1–6, doi:10.1109/DATE.2011.5763028.
  20. Christoph Sommer & Falko Dressler (2015): Vehicular Networking. Cambridge : Cambridge University Press, doi:10.1017/CBO9781107110649.
  21. TASS International (2017): PreScan Version 8.1.0.
  22. Sam Thielman (2016): 'Someone Is Going to Die': Experts Warn Lawmakers over Self-Driving Cars. http://www.theguardian.com/technology/2016/mar/15/self-driving-cars-danger-senate-general-motors-google.
  23. Vector (11/8/17): CANoe - ECU Development & Test. https://vector.com/vi_canoe_en.html.
  24. Vector (7/11/17): CAPL Documentation - Vector :: KnowledgeBase. https://kb.vector.com/entry/48/.
  25. D. Waraus (2009): Steer-by-Wire System Based on FlexRay Protocol. In: 2009 Applied Electronics, pp. 269–272.
  26. X. Zheng & C. Julien (2015): Verification and Validation in Cyber Physical Systems: Research Challenges and a Way Forward, pp. 15–18, doi:10.1109/SEsCPS.2015.11.

Comments and questions to: eptcs@eptcs.org
For website issues: webmaster@eptcs.org