S. Bluetooth and . Inc, Bluetooth Specification: File Transfer Profile (FTP), 2012.

R. Chang and V. Shmatikov, Formal analysis of authentication in bluetooth device pairing In: Foundations of Computer Security and Automated Reasoning for Security Protocol Analysis, p.45, 2007.

S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham et al., Comprehensive Experimental Analyses of Automotive Attack Surfaces, Proc. of 20th USENIX Security Symp, pp.77-92, 2011.

J. P. Dunning, Taming the Blue Beast: A Survey of Bluetooth Based Threats, IEEE Security & Privacy Magazine, vol.8, issue.2, pp.20-27, 2010.
DOI : 10.1109/MSP.2010.3

E. Project, Deliverable D2.3 -Security requirements for automotive on-board networks based on dark-side scenarios, 2009.

A. Fuchs and R. Rieke, Identification of Security Requirements in Systems of Systems by Functional Security Analysis, Architect. Dep. Sys. VII, vol.6420, pp.74-96, 2010.
DOI : 10.1007/978-3-642-17245-8_4

D. Gordon, T. Stehney, N. Wattas, and E. Yu, System Quality Requirements Engineering (SQUARE) Methodology: Case Study on Asset Management System, 2005.

M. S. Idrees, Y. Roudier, and L. Apvrille, A framework towards the efficient identification and modeling of security requirements, Proc. of the 5th Conf. on Network Architecture and Information Systems, pp.1-15, 2010.

A. Van-lamsweerde, Elaborating security requirements by construction of intentional anti-models, Proceedings. 26th International Conference on Software Engineering, 2004.
DOI : 10.1109/ICSE.2004.1317437

B. Liu, L. Shi, Z. Cai, and M. Li, Software Vulnerability Discovery Techniques: A Survey, 2012 Fourth International Conference on Multimedia Information Networking and Security, 2012.
DOI : 10.1109/MINES.2012.202

S. Mauw and M. Oostdijk, Foundations of Attack Trees, Proc. of the 8th Int. Conf. on Information Security and Cryptology, pp.186-198, 2005.
DOI : 10.1109/DISCEX.2001.932182

URL : http://www.win.tue.nl/~sjouke/publications/papers/attacktrees.pdf

P. Midian, Perspectives on Penetration Testing ??? Black Box vs. White Box, Network Security, vol.2002, issue.11, pp.10-12, 2002.
DOI : 10.1016/S1353-4858(02)11009-9

D. K. Oka, T. Furue, L. Langenhop, and T. Nishimura, Survey of Vehicle IoT Bluetooth Devices, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp.260-264, 2014.
DOI : 10.1109/SOCA.2014.20

A. L. Opdahl and G. Sindre, Experimental comparison of attack trees and misuse cases for security threat identification, Information and Software Technology, vol.51, issue.5, pp.916-932, 2009.
DOI : 10.1016/j.infsof.2008.05.013

A. Roscoe, Understanding Concurrent Systems, 2010.
DOI : 10.1007/978-1-84882-258-0

S. International, J3061 : Cybersecurity Guidebook for Cyber-Physical Vehicle Systems, 2016.

B. Schneier, Attack Trees, 1999.
DOI : 10.1002/9781119183631.ch21