This content is not included in your SAE MOBILUS subscription, or you are not logged in.

A Comprehensive Attack and Defense Model for the Automotive Domain

Journal Article
11-02-01-0001
ISSN: 2572-1046, e-ISSN: 2572-1054
Published January 17, 2019 by SAE International in United States
A Comprehensive Attack and Defense Model for the Automotive Domain
Sector:
Citation: Hutzelmann, T., Banescu, S., and Pretschner, A., "A Comprehensive Attack and Defense Model for the Automotive Domain," SAE Int. J. Transp. Cyber. & Privacy 2(1):5-20, 2019, https://doi.org/10.4271/11-02-01-0001.
Language: English

References

  1. Broy , M. , Kruger , I.H. , Pretschner , A. , and Salzmann , C. Engineering Automotive Software Proceedings of the IEEE 95.2 2007 356 373
  2. Coppola , R. and Morisio , M. Connected Car: Technologies, Issues, Future Trends ACM Computing Surveys (CSUR) 49.3 2016 46
  3. Oka , D.K. , Furue , T. , Langenhop , L. , and Nishimura , T. Survey of Vehicle IoT Bluetooth Devices Service-Oriented Computing and Applications (SOCA), 2014 IEEE 7th International Conference on 2014 260 264
  4. Lu , N. , Cheng , N. , Zhang , N. , Shen , X. et al. Connected Vehicles: Solutions and Challenges IEEE Internet of Things Journal 1 4 289 299 2014
  5. Viereckl , R. , Ahlemann , D. , Koster , A. , Hirsh , E. et al. Connected Car Report 2016: Opportunities, Risk, and Turmoil on the Road to Autonomous Vehicles 2016 http://www.strategyand.pwc.com/reports/connected-car-2016-study
  6. Ponikwar , C. , Hof , H.-J. , Gopinath , S. , and Wischhof , L. 2016
  7. Asim , M. , Guajardo , J. , Kumar , S.S , and Tuyls , P. Physical Unclonable Functions and Their Applications to Vehicle System Security Vehicular Technology Conference, 2009. VTC Spring 2009. IEEE 69th 2009 1 5
  8. Hoppe , T. , Kiltz , S. , and Dittmann , J. Applying Intrusion Detection to Automotive It-Early Insights and Remaining Challenges Journal of Information Assurance and Security (JIAS) 4 6 226 235 2009
  9. Axelsson , S. 2000
  10. Kabiri , P. and Ghorbani , A.A. Research on Intrusion Detection and Response: A Survey IJ Network Security 1 2 84 102 2005
  11. Checkoway , S. , McCoy , D. , Kantor , B. , Anderson , D. et al. Comprehensive Experimental Analyses of Automotive Attack Surfaces USENIX Security Symposium San Francisco 2011
  12. Studnia , I. , Nicomette , V. , Alata , E. , Deswarte , Y. et al. Survey on Security Threats and Protection Mechanisms in Embedded Automotive Networks Dependable Systems and Networks Workshop (DSN-W), 2013 43rd Annual IEEE/IFIP Conference on 2013 1 12
  13. Parkinson , S. , Ward , P. , Wilson , K. , and Miller , J. Cyber Threats Facing Autonomous and Connected Vehicles: Future Challenges IEEE Transactions on Intelligent Transportation Systems 18 11 2898 2915 2017
  14. Keen Security Lab of Tencent Experimental Security Assessment of BMW Cars: A Summary Report 2018 https://keenlab.tencent.com/en/2018/05/22/New-CarHacking-Research-by-KeenLab-Experimental-Security-Assessment-of-BMW-Cars/
  15. Koscher , K. , Czeskis , A. , Roesner , F. , Patel , S. et al. Experimental Security Analysis of a Modern Automobile Security and Privacy (SP), 2010 IEEE Symposium on 2010 447 462
  16. Yan , C. , Xu , W. , and Liu , J. Can You Trust Autonomous Vehicles: Contactless Attacks Against Sensors of Self-Driving Vehicle DEF CON 24 2016
  17. Spaar , D. Auto, öffne dich! c’t Magazin 5 86 89 2015
  18. Kang , M.-J. and Kang , J.-W. Intrusion Detection System Using Deep Neural Network for In-Vehicle Network Security PloS one 11 6 e0155781 2016
  19. Computest The Connected Car-Ways to Get Unauthorized Access and Potential Implications https://www.computest.nl/wp-content/uploads/2018/04/connected-car-rapport.pdf 2018
  20. Dürrwang , J. , Braun , J. , Rumez , M. , and Kriesten , R. 2017
  21. Levi , M. , Allouche , Y. , and Kontorovich , A. 2017
  22. Keen Security Lab of Tencent Car Hacking Research: Remote Attack Tesla Motors 2016 https://keenlab.tencent.com/en/2016/09/19/Keen-Security-Lab-of-Tencent-Car-Hacking-Research-Remote-Attack-to-Tesla-Cars/
  23. Howard , B. Hack the Diagnostics Connector, Steal Yourself a BMW in 3 Minutes 2012 https://www.extremetech.com/extreme/132526-hack-the-diagnostics-connector-steal-yourself-a-bmw-in-3-minutes
  24. Hunt , T. Controlling Vehicle Features of Nissan LEAFs across the Globe Via Vulnerable APIs 2016 https://www.troyhunt.com/controlling-vehicle-features-of-nissan/
  25. Pen Test Partners Hacking the Mitsubishi Outlander PHEV Hybrid 2016 https://www.pentestpartners.com/security-blog/hacking-the-mitsubishi-outlander-phev-hybrid-suv/
  26. Chow , S. , Eisen , P. , Johnson , H. , and Van Oorschot , P.C White-Box Cryptography and an AES Implementation International Workshop on Selected Areas in Cryptography 2002 250 270

Cited By