A. Cybersecurity, Argus Cyber Security Working With Bosch to Promote Public Safety and Mitigate Car Hacking, 2017.

M. Cheah, J. Bryans, D. S. Fowler, and S. A. Shaikh, Threat Intelligence for Bluetooth-enabled Systems with Automotive Applications : An Empirical Study, Proceedings of the 47th IEEE/IFIP Dependable Systems and Networks Workshops: Security and Safety in Vehicles (SSIV), 2017.

M. Cheah, . Shaikh, . Siraj, O. Haas, and A. Ruddle, Towards a systematic security evaluation of the automotive Bluetooth interface, Journ.of Veh. Comms, vol.9, pp.8-18

S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham et al., Comprehensive Experimental Analyses of Automotive Attack Surfaces, Proceedings of 20th USENIX Security Symposium, pp.77-92, 2011.

K. T. Cho and K. G. Shin, Error Handling of In-vehicle Networks Makes Them Vulnerable, Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security, pp.1044-1055, 2016.

J. Dunning, , 2012.

, ELM Electronics: ELM Electronics: OBD

M. Felderer, P. Zech, R. Breu, M. Buchler, and A. Pretschner, Model-based security testing: a taxonomy and systematic classification. Software Testing Verification and Reliability, vol.26, pp.119-148, 2015.

D. S. Fowler, M. Cheah, S. A. Shaikh, and J. Bryans, Towards a testbed for automotive cyberecurity, Process of the 10th Int. Conf. on Software Testing, Verification and Validation: Industry Track, 2017.

A. Greenberg, Hackers Remotely Kill a Jeep on the HighwayWith Me in It, 2015.

C. Hoare, Communicating Sequential Processes, 1985.

T. Hoppe, S. Kiltz, and J. Dittmann, Security threats to automotive CAN networksPractical examples and selected short-term countermeasures, Reliability Engineering & System Safety, vol.96, issue.1, pp.11-25, 2011.

R. Jhawar, B. Kordy, S. Mauw, S. Radomirovi´cradomirovi´c, and R. Trujillo-rasua, Attack Trees with Sequential Conjunction, Proceedings of the 30th IFIP TC 11 International Conference, vol.455, pp.339-353, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01197256

K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno et al., Experimental Security Analysis of A Modern Automobile, Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp.447-462, 2010.

S. Mauw and M. Oostdijk, Foundations of Attack Trees, Proceedings of the 8th Int. Conf. on Information Security and Cryptology, pp.186-198, 2005.

S. Nogueira, A. Sampaio, and A. Mota, Test generation from state based use case models, Formal Asp. Comput, vol.26, issue.3, pp.441-490, 2014.

D. K. Oka, T. Furue, L. Langenhop, and T. Nishimura, Survey of Vehicle IoT Bluetooth Devices, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp.260-264, 2014.

A. Pretschner, M. Broy, I. H. Kruger, and T. Stauner, Software engineering for automotive systems: A roadmap, Proceedings of the FOSE'07 2007 Future of Software Engineering, pp.55-71, 2007.

R. Bosch and G. , CAN Specification version 2, 1991.

A. Roscoe, Understanding Concurrent Systems, vol.1, 2010.

A. Ruddle, D. Ward, B. Weyl, S. Idrees, Y. Roudier et al., EVITA Project: Deliverable D2.3-Security requirements for automotive on-board networks based on dark-side scenarios, 2009.

, SAE International: J3061 : Cybersecurity Guidebook for Cyber-Physical Vehicle Systems, 2016.

M. Salfer, H. Schweppe, and C. Eckert, Efficient Attack Forest Construction for Automotive On-board Networks, 17th International Conference (ISC) on Information Security, 2014.

B. Schneier, University of Oxford: FDR3-The CSP Refinement Checker, Attack Trees: Modeling Security Threats, 1999.

M. Utting, A. Pretschner, and B. Legeard, A taxonomy of model-based testing approaches, Softw. Test., Verif. Reliab, vol.22, issue.5, pp.297-312, 2012.
URL : https://hal.archives-ouvertes.fr/hal-00940611

R. Vigo, F. Nielson, and H. R. Nielson, Automated generation of attack trees, Proc. of the 27th Computer Security Foundations Symposium, 2014.