S. Anssi, K. Albers, M. Dörfel, and S. Gérard, chronVAL/chronSIM: A Tool Suite for Timing Verification of Automotive Applications, Proc. Embedded Real-Time Software and Systems (ERTS), 2012.

H. Dierks, A. Metzner, and I. Stierand, Efficient Model-Checking for Real-Time Task Networks, 2009 International Conference on Embedded Software and Systems, 2009.
DOI : 10.1109/ICESS.2009.26

D. Dolev and A. C. Yao, On the security of public key protocols, Tech. rep, 1981.

A. Hamann, M. Jersak, K. Richter, and R. Ernst, A framework for modular analysis and exploration of heterogeneous embedded systems, Real-Time Systems, vol.50, issue.2-3, pp.1-3, 2006.
DOI : 10.1007/s11241-006-6884-x

M. Lin, L. Xu, L. Yang, X. Qin, N. Zheng et al., Static Security Optimization for Real-Time Systems, IEEE Transactions on Industrial Informatics, vol.5, issue.1, pp.22-37, 2009.
DOI : 10.1109/TII.2009.2014055

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.298.3889

T. Popp, An introduction to implementation attacks and countermeasures, 2009 7th IEEE/ACM International Conference on Formal Methods and Models for Co-Design, pp.108-115, 2009.
DOI : 10.1109/MEMCOD.2009.5185386

. Trusted-computing-group and . Inc, Trusted Platform Module (TPM) specifications. http://www.trustedcomputinggroup.org/resources, 2010.

M. Wolf and T. Gendrullis, Design, Implementation, and Evaluation of a Vehicular Hardware Security Module, Lecture Notes in Computer Science, vol.7259, pp.302-318, 2012.
DOI : 10.1007/978-3-642-31912-9_20