experimental analyses of automotive attack surfaces.
In USENIX Security Symposium.
Debar, H., Curry, D., and Feinstein, B. (2007a). The in-
trusion detection message exchange format (idmef).
Technical report.
Debar, H., Thomas, Y., Cuppens, F., and Cuppens-Boulahia,
N. (2007b). Enabling automated threat response
through the use of a dynamic security policy. Jour-
nal in Computer Virology, 3(3):195–210.
Edge, K. S., Dalton, G. C., Raines, R. A., and Mills, R. F.
(2006). Using attack and protection trees to analyze
threats and defenses to homeland security. In Military
Communications Conference, 2006. MILCOM 2006.
IEEE, pages 1–7. IEEE.
Hamad, M., Hammadeh, Z. A., Saidi, S., Prevelakis, V.,
and Ernst, R. (2018). Prediction of abnormal temporal
behavior in real-time systems. In Proceedings of the
33rd Annual ACM Symposium on Applied Computing,
pages 359–367. ACM.
Hamad, M., Nolte, M., and Prevelakis, V. (2016a). Towards
comprehensive threat modeling for vehicles. In 1st
Workshop on Security and Dependability of Critical
Embedded Real-Time Systems (CERTS).
Hamad, M., Nolte, M., and Prevelakis, V. (2017). A frame-
work for policy based secure intra vehicle communi-
cation. In Vehicular Networking Conference (VNC),
2017 IEEE. IEEE.
Hamad, M., Schlatow, J., Prevelakis, V., and Ernst, R.
(2016b). A communication framework for distributed
access control in microkernel-based systems. In 12th
Annual Workshop on Operating Systems Platforms
for Embedded Real-Time Applications (OSPERT16),
pages 11–16.
Herold, N. (2017). Incident Handling Systems with Auto-
mated Intrusion Response. Dissertation, Technische
Universit
¨
at M
¨
unchen, M
¨
unchen.
Hoppe, T., Kiltz, S., and Dittmann, J. (2008). Adaptive dy-
namic reaction to automotive it security incidents us-
ing multimedia car environment. In Information As-
surance and Security, 2008. ISIAS’08. Fourth Interna-
tional Conference on, pages 295–298. IEEE.
Hoppe, T., Kiltz, S., and Dittmann, J. (2009). Applying
intrusion detection to automotive it-early insights and
remaining challenges. Journal of Information Assur-
ance and Security (JIAS), 4(6):226–235.
Inayat, Z., Gani, A., Anuar, N. B., Khan, M. K., and Anwar,
S. (2016). Intrusion response systems: Foundations,
design, and challenges. Journal of Network and Com-
puter Applications, 62:53–74.
Ishtiaq Roufa, R. M., Mustafaa, H., Travis Taylora, S. O.,
Xua, W., Gruteserb, M., Trappeb, W., and Seskarb, I.
(2011). Security and privacy vulnerabilities of in-car
wireless networks: A tire pressure monitoring system
case study. In 19th USENIX Security Symposium.
ISO/IEC 18045:2008 (2008). nformation technology – Se-
curity techniques – Methodology for IT security eval-
uation. Standard, International Organization for Stan-
dardization.
Kanoun, W., Samarji, L., Cuppens-Boulahia, N., Dubus, S.,
and Cuppens, F. (2013). Towards a temporal response
taxonomy. In Di Pietro, R., Herranz, J., Damiani, E.,
and State, R., editors, Data Privacy Management and
Autonomous Spontaneous Security, pages 318–331,
Berlin, Heidelberg. Springer Berlin Heidelberg.
Kemmerer, R. A. and Vigna, G. (2002). Intrusion detection:
a brief history and overview. Computer, 35(4):supl27–
supl30.
Koscher, K., Czeskis, A., Roesner, F., Patel, S., Kohno,
T., Checkoway, S., McCoy, D., Kantor, B., Anderson,
D., Shacham, H., et al. (2010). Experimental security
analysis of a modern automobile. In Security and Pri-
vacy (SP), 2010 IEEE Symposium on, pages 447–462.
IEEE.
Larson, U. E. and Nilsson, D. K. (2008). Securing vehicles
against cyber attacks. In Proceedings of the 4th an-
nual workshop on Cyber security and information in-
telligence research: developing strategies to meet the
cyber security and information intelligence challenges
ahead, page 30. ACM.
Larson, U. E., Nilsson, D. K., and Jonsson, E. (2008). An
approach to specification-based attack detection for
in-vehicle networks. In Intelligent Vehicles Sympo-
sium, 2008 IEEE, pages 220–225. IEEE.
Le Lann, G. (1996). The ariane 5 flight 501 failure-a case
study in system engineering for computing systems.
PhD thesis, INRIA.
Locasto, M. E., Wang, K., Keromytis, A. D., and Stolfo,
S. J. (2005). Flips: Hybrid adaptive intrusion preven-
tion. In International Workshop on Recent Advances
in Intrusion Detection, pages 82–101. Springer.
Markit, I. (2016). Vehicles getting older: Av-
erage age of light cars and trucks in u.s.
rises again in 2016 to 11.6 years, ihs markit
says. https://news.ihsmarkit.com/press-
release/automotive/vehicles-getting-older-average-
age-light-cars-and-trucks-us-rises-again-201.
Moestl, M. and Ernst, R. (2015). Cross-layer dependency
analysis for safety-critical systems design. In ARCS
2015-The 28th International Conference on Architec-
ture of Computing Systems. Proceedings, pages 1–7.
VDE.
Nadeem, A. and Howarth, M. P. (2014). An intrusion detec-
tion & adaptive response mechanism for manets. Ad
Hoc Networks, 13:368–380.
Nighswander, T., Ledvina, B., Diamond, J., Brumley, R.,
and Brumley, D. (2012). Gps software attacks. In Pro-
ceedings of the 2012 ACM conference on Computer
and communications security, pages 450–461. ACM.
Prevelakis, V. and Hamad, M. (2015). Extending the oper-
ational envelope of applications. In 8th International
Conference on Trust & Trustworthy Computing
(TRUST 2015).
Schneier, B. (1999). Attack Trees - Modeling security
threats. Dr. Dobb’s Journal.
Shameli-Sendi, A., Ezzati-Jivan, N., Jabbarifar, M., and Da-
genais, M. (2012). Intrusion response systems: sur-
vey and taxonomy. Int. J. Comput. Sci. Netw. Secur,
12(1):1–14.
Stakhanova, N., Basu, S., and Wong, J. (2007). A tax-
onomy of intrusion response systems. International
Red-Zone: Towards an Intrusion Response Framework for Intra-vehicle System
157