Computer safety, reliability, and security, Berlin [u.a.]:
Springer, 2009, pp. 145–158.
T. Hoppe, S. Kiltz, and J. Dittmann, “Security threats to
automotive CAN networks: practical examples and se-
lected short-term countermeasures,” (eng), Reliability
engineering & system safety, vol. 96, no. 1, pp. 11–25,
Tobias Hoppe and Jana Dittmann, “Vortäuschen von
Komponentenfunktionalität im Automobil: Safety-
und Komfort-Implikationen durch Security-
Verletzungen am Beispiel des Airbags,” in Sicherheit,
2008, pp. 341-353.
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno, S.
Checkoway, D. McCoy, B. Kantor, D. Anderson, H.
Shacham, and S. Savage, “Experimental Security
Analysis of a Modern Automobile,” in Security and
Privacy (SP), 2010 IEEE Symposium on, 2010, pp.
447–462.
S. Checkoway, D. McCoy, B. Kantor, D. Anderson, H.
Shacham, S. Savage, K. Koscher, A. Czeskis, F.
Roesner, and T. Kohno, “Comprehensive experimental
analyses of automotive attack surfaces,” in Proceed-
ings of the 20th USENIX conference on Security,
Berkeley, CA, 2011, pp. 6-6.
J. Hubaux, S. Capkun, and Jun Luo, “The security and
privacy of smart vehicles,” IEEE Secur. Privacy Mag,
vol. 2, no. 3, pp. 49–55.
U. E. Larson and D. K. Nilsson, “Securing vehicles
against cyber attacks,” in Proceedings of the 4th annu-
al workshop on Cyber security and information intelli-
gence research, New York, NY, USA: ACM, 2008.
S. Pathak and U. Shrawankar, “Secured Communication in
Real Time VANET,” in Emerging Trends in Engineer-
ing and Technology (ICETET), 2009 2nd International
Conference on, 2009, pp. 1151–1155.
D. Eckhoff, C. Sommer, T. Gansen, R. German, and F.
Dressler, “Strong and affordable location privacy in
VANETs: Identity diffusion using time-slots and
swapping,” pp. 174–181.
C. Lin and R. Shakya, “VANET worm spreading from
traffic modeling,” in Radio and Wireless Symposium
(RWS), 2010 IEEE, 2010, pp. 669–672.
N. T. Courtois, G. V. Bard, and D. Wagner, “Algebraic
and Slide Attacks on KeeLoq,” pp. 97–115.
S. Indesteege, N. Keller, O. Dunkelman, E. Biham, and B.
Preneel, “A Practical Attack on Keeloq,” IN EU-
ROCRYPT, pp. 1–18,
http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.
1.1.190.7835, 2008.
C. Paar, T. Eisenbarth, M. Kasper, T. Kasper, and A.
Moradi, “KeeLoq and Side-Channel Analysis-
Evolution of an Attack,” pp. 65–69.
A. Francillon, B. Danev, and S. Capkun, “Relay Attacks
on Passive Keyless Entry and Start Systems in Modern
Cars,” IACR Cryptology ePrint Archive, vol. 2010, p.
332.
A. Barisani and D. Bianco, “Hijacking RDS-TMC Traffic
Information signals,” BlackHat, Las Vegas USA, 1-2
Agust 2007, http://www.phrack.org/
issues.html?issue=64&id=5#article, 2007.
I. Rouf, R. Miller, H. Mustafa, T. Taylor, S. Oh, W. Xu,
M. Gruteser, W. Trappe, and I. Seskar, “Security and
Privacy Vulnerabilities of In-Car Wireless Networks:
A Tire Pressure Monitoring System Case Study,” in
Proceedings of the 19th USENIX Security Symposi-
um, 2010.
Airbiquity Inc, “Whitepaper: aqLink® Overview,”
http://www.m2mpremier.com/uploadFiles/aqLink_Ov
erview.pdf, 2007.
A. Don Bailey, War texting: Weaponizing Machine 2
Machine. Available:
http://www.isecpartners.com/storage/docs/presentation
s/isec_bh2011_war_texting.pdf (2011, Nov. 28).
D. Lavrinc, Nissan's Steer-by-Wire System Brings Us
Closer to Autonomous Cars | Autopia | Wired.com.
Available:
http://www.wired.com/autopia/2012/10/nissan-steer-
by-wire/ (2012, Nov. 02).
M. Glass, D. Herrscher, H. Meier, M. Piastowski, and P.
Schoo, „SEIS“ – SICHERHEIT IN
EINGEBETTETEN IP- BASIERTEN SYSTEMEN.
ATZ elektronic, 2010.
Continental, With Continental the Apps Conquer the
Road. Available: http://www.conti-
online.com/generator/www/com/en/continental/pressp
ortal/themes/press_releases/3_automotive_group/interi
or/press_releases/pr_2010_02_23_cebit2010_autolinq
_en.html (2012, Feb. 07).
The Telegraph, Relaunched Audi A2 to include 'app' style
customisations. Available:
http://www.telegraph.co.uk/motoring/car-
manufacturers/audi/7788442/Relaunched-Audi-A2-to-
include-app-style-customisations.html (2012, Feb. 07).
Continental Automotive, AutoLinQ™. Available:
http://www.autolinq.de/en/ (2012, Feb. 07).
MeeGo, In-Vehicle. Available: https://meego.com/
devices/in-vehicle (2012, Feb. 07).
F. Schaub, B. Könings, and M. Weber, “Learning from
Android,” in Automotive security: 27. VDI/VW-
Gemeinschaftstagung, Berlin, 11. und 12. Oktober
2011, Düsseldorf: VDI-Verl, 2011.
N. Asaj, A. Held, and S. Schlott, “"Apps" im Fahrzeug -
Ansätze und deren Sicherheits- und Privacy-
Implikationen,” in Automotive security: 27. VDI/VW-
Gemeinschaftstagung, Berlin, 11. und 12. Oktober
2011, Düsseldorf: VDI-Verl, 2011.
J. Frank and P. Spindler, “Security vs. Safety,” in Auto-
motive security: 27. VDI/VW-Gemeinschaftstagung,
Berlin, 11. und 12. Oktober 2011, Düsseldorf: VDI-
Verl, 2011.
K. Scheibert and B. Steurich, “Sichere
Mikroprozessorarchitekturen: Lösungsansätze aus der
Halbleiterindustrie,” in Automotive security: 27.
VDI/VW-Gemeinschaftstagung, Berlin, 11. und 12.
Oktober 2011, Düsseldorf: VDI-Verl, 2011.
SEIS - Sicherheit in Eingebetteten IP-basierten Systemen
— eNOVA - Strategiekreis Elektromobilität.
Available: http://strategiekreis-
elektromobilitaet.de/public/projekte/seis (2012, Nov.
03).
TheNeedforSecurityinDistributedAutomotiveSystems
109