, Argus Cyber Security Working With Bosch to Promote Public Safety and Mitigate Car Hacking, 2017.
Threat Intelligence for Bluetooth-enabled Systems with Automotive Applications : An Empirical Study, Proceedings of the 47th IEEE/IFIP Dependable Systems and Networks Workshops: Security and Safety in Vehicles (SSIV), 2017. ,
Towards a systematic security evaluation of the automotive Bluetooth interface, Journ.of Veh. Comms, vol.9, pp.8-18 ,
Comprehensive Experimental Analyses of Automotive Attack Surfaces, Proceedings of 20th USENIX Security Symposium, pp.77-92, 2011. ,
Error Handling of In-vehicle Networks Makes Them Vulnerable, Proceedings of the 23rd ACM SIGSAC Conference on Computer and Communications Security, pp.1044-1055, 2016. ,
, , 2012.
, ELM Electronics: ELM Electronics: OBD
Model-based security testing: a taxonomy and systematic classification. Software Testing Verification and Reliability, vol.26, pp.119-148, 2015. ,
Towards a testbed for automotive cyberecurity, Process of the 10th Int. Conf. on Software Testing, Verification and Validation: Industry Track, 2017. ,
, Hackers Remotely Kill a Jeep on the HighwayWith Me in It, 2015.
Communicating Sequential Processes, 1985. ,
Security threats to automotive CAN networksPractical examples and selected short-term countermeasures, Reliability Engineering & System Safety, vol.96, issue.1, pp.11-25, 2011. ,
Attack Trees with Sequential Conjunction, Proceedings of the 30th IFIP TC 11 International Conference, vol.455, pp.339-353, 2015.,
URL : https://hal.archives-ouvertes.fr/hal-01197256
Experimental Security Analysis of A Modern Automobile, Proceedings of the 2010 IEEE Symposium on Security and Privacy, pp.447-462, 2010. ,
Foundations of Attack Trees, Proceedings of the 8th Int. Conf. on Information Security and Cryptology, pp.186-198, 2005. ,
Test generation from state based use case models, Formal Asp. Comput, vol.26, issue.3, pp.441-490, 2014. ,
Survey of Vehicle IoT Bluetooth Devices, 2014 IEEE 7th International Conference on Service-Oriented Computing and Applications, pp.260-264, 2014. ,
Software engineering for automotive systems: A roadmap, Proceedings of the FOSE'07 2007 Future of Software Engineering, pp.55-71, 2007. ,
CAN Specification version 2, 1991. ,
Understanding Concurrent Systems, vol.1, 2010. ,
, EVITA Project: Deliverable D2.3-Security requirements for automotive on-board networks based on dark-side scenarios, 2009.
, SAE International: J3061 : Cybersecurity Guidebook for Cyber-Physical Vehicle Systems, 2016.
Efficient Attack Forest Construction for Automotive On-board Networks, 17th International Conference (ISC) on Information Security, 2014. ,
University of Oxford: FDR3-The CSP Refinement Checker, Attack Trees: Modeling Security Threats, 1999. ,
A taxonomy of model-based testing approaches, Softw. Test., Verif. Reliab, vol.22, issue.5, pp.297-312, 2012.,
URL : https://hal.archives-ouvertes.fr/hal-00940611
Automated generation of attack trees, Proc. of the 27th Computer Security Foundations Symposium, 2014. ,