Dennis Nilsson

Showing 38 publications

2010

Using system call information to reveal hidden attack manifestations

Ulf Larson, Dennis Nilsson, Erland Jonsson et al
Proceedings of the 1st International Workshop on Security and Communication Networks, IWSCN 2009
Conference contribution
2010

A Model for Safe and Secure Execution of Downloaded Vehicle Applications

Phu Phung, Dennis Nilsson
Proceedings of Road Transport Information and Control - RTIC 2010, IET
Paper in proceedings
2009

Online Self-Healing Support for Embedded Systems

Lei Sun, Dennis Nilsson, Tomohiro Katori et al
2009 IEEE International Symposium on Object/Component/Service-Oriented Real-Time Distributed Computing, ISORC 2009; Tokyo; Japan; 17 March 2009 through 20 March 2009, p. 283-287
Paper in proceedings
2009

A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure

Dennis Nilsson, Ulf Larson
Journal of Networks. Vol. 4 (7), p. 552-564
Journal article
2009

Building a Self-Healing Embedded System in a Multi-OS Environment

Tomohiro Katori, Lei Sun, Dennis Nilsson et al
Proceedings of the 24th Annual ACM Symposium on Applied Computing (SAC), March 9-12, 2009, Honolulu, HI, USA
Paper in proceedings
2009

Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks

Dennis Nilsson, Ulf Larson
International Journal of Digital Crime and Forensics. Vol. 1 (2), p. 28-41
Journal article
2009

How to Secure the Connected Car

Dennis Nilsson
Doctoral thesis
2008

Unidirectional Auxiliary Channel Challenge-Response Authentication

Dennis Nilsson, Ulf Larson, Erland Jonsson
7th Annual Wireless Telecommunications Symposium, WTS 2008; Ponoma, CA; United States; 24 April 2008 through 26 April 2008, p. 84-91
Paper in proceedings
2008

Key Management and Secure Software Updates in Wireless Process Control Environments

Dennis Nilsson, Tanya Roosta, Ulf Lindqvist et al
Proceedings of the First ACM Conference on Wireless Network Security (WiSec), March 31 - April 2, 2008, Alexandria, VA, USA, p. 100-108
Paper in proceedings
2008

Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication

Dennis Nilsson, Ulf Larson, Erland Jonsson
5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008; Hong Kong; Hong Kong; 28 July 2008 through 31 July 2008
Paper in proceedings
2008

A Roadmap for Securing Vehicles against Cyber Attacks

Dennis Nilsson, Ulf Larson
NITRD National Workshop on High-Confidence Automotive Cyber-Physical Systems, April 3-4, 2008, Troy, MI, USA
Paper in proceedings
2008

An Intrusion Detection System for Wireless Process Control Systems

Tanya Roosta, Dennis Nilsson, Ulf Lindqvist et al
5th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, p. 866-872
Paper in proceedings
2008

Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure

Dennis Nilsson, Ulf Larson, Erland Jonsson
Report
2008

Secure Firmware Updates over the Air in Intelligent Vehicles

Dennis Nilsson, Ulf Larson
ICC 2008 - 2008 IEEE International Conference on Communications Workshops; Beijing; China; 19 May 2008 through 23 May 2008, p. 380-384
Paper in proceedings
2008

Securing Vehicles against Cyber Attacks

Ulf Larson, Dennis Nilsson
4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead, CSIIRW'08; Oak Ridge, TN; United States; 12 May 2008 through 14 May 2008
Paper in proceedings
2008

Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks

Dennis Nilsson, Ulf Larson
Proceedings of the First ACM International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics), January 21-23, 2008, Adelaide, Australia.
Paper in proceedings
2008

A framework for self-verification of firmwareupdates over the air in vehicle ecus

Dennis Nilsson, Lei Sun, Tatsuo Nakajima
2008 IEEE Globecom Workshops, GLOBECOM 2008; New Orleans, LA; United States; 30 November 2008 through 4 December 2008
Paper in proceedings
2008

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay

Dennis Nilsson, Ulf Larson, Francesco Picasso et al
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems (CISIS), October 23-24, 2008, Genova, Italy, p. 84-91
Paper in proceedings
2008

Vehicle ECU Classification Based on Safety-Security Characteristics

Dennis Nilsson, Phu Phung, Ulf Larson
Proceedings of 13th IET Road Transport Information and Control - RTIC2008, May 20-22, 2008, Manchester, UK
Paper in proceedings
2008

Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes

Dennis Nilsson, Ulf Larson, Erland Jonsson
IEEE Vehicular Technology Conference
Paper in proceedings
2008

An Approach to Specification-based Attack Detection for In-Vehicle Networks

Ulf Larson, Dennis Nilsson, Erland Jonsson
Proceedings of the IEEE Intelligent Vehicles Symposium, June 4-6, 2008, Eindhoven, The Netherlands
Journal article
2008

Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles

Dennis Nilsson, Ulf Larson, Erland Jonsson
Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security (SAFECOMP), September 22-25, 2008, Newcastle, UK, p. 207-220
Paper in proceedings
2008

Combining Physical and Digital Evidence in Vehicle Environments

Dennis Nilsson, Ulf Larson
3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008; Berkeley, CA; United States; 22 May 2008 through 22 May 2008, p. 10-14
Paper in proceedings
2008

A Step Towards Securing Vehicles against Cyber Attacks

Dennis Nilsson, Ulf Larson
ENISA Quarterly Review. Vol. 4 (2), p. 12-13
Magazine article
2008

Simulated Attacks on CAN Buses: Vehicle virus

Dennis Nilsson, Ulf Larson
Proceedings of the Fifth IASTED Asian Conference on Communication Systems and Networks (ASIACSN), April 2-4, 2008, Langkawi, Malaysia
Paper in proceedings
2008

An Approach to using Honeypots in In-Vehicle Networks

Vilhelm Verendel, Dennis Nilsson, Ulf Larson et al
68th Semi-Annual IEEE Vehicular Technology, VTC 2008-Fall, Conference; Calgary, AB; Canada; 21 September 2008 through 24 September 2008
Paper in proceedings
2008

Operator-Centric and Adaptive Intrusion Detection

Ulf Larson, Stefan Lindskog, Dennis Nilsson et al
Proceedings of the Fourth International Conference on Information Assurance and Security (IAS 2008), September 8-10, 2008, Naples, Italy, p. 161-166
Paper in proceedings
2008

Decision Support for Intrusion Detection Data Collection

Ulf Larson, Stefan Lindskog, Dennis Nilsson et al
Proceedings of the 13th Nordic Workshop on Secure IT-systems (NordSec 2008), October 9-10, 2008, Copenhagen, Denmark
Paper in proceedings
2008

A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs

Dennis Nilsson, Lei Sun, Tatsuo Nakajima
Proceedings of the Third IEEE Workshop on Automotive Networking and Applications (AutoNet) co-located with IEEE GLOBECOM, November 30 - December 4, 2008, New Orleans, LA, USA
Paper in proceedings
2008

Low-Cost Key Management for Hierarchical Wireless Vehicle Networks

Dennis Nilsson, Ulf Larson, Erland Jonsson
Proceedings of the IEEE Intelligent Vehicles Symposium, June 4-6, 2008, Eindhoven, The Netherlands, p. 476-481
Paper in proceedings
2007

A General Model and Guidelines for Attack Manifestation Generation

Ulf Larson, Dennis Nilsson, Erland Jonsson
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5141, p. 274-286
Paper in proceedings
2007

Analyzing and Securing Bluetooth-based Pico Networks

Dennis Nilsson, Phillip A. Porras, Erland Jonsson
Report
2007

Using Common Log Information to Reveal Hidden Attack Manifestations

Ulf Larson, Dennis Nilsson, Erland Jonsson
Report
2007

A General Model and Guidelines for Attack Manifestation Generation

Dennis Nilsson, Ulf Larson, Erland Jonsson
Report
2007

How to Secure Bluetooth-based Pico Networks

Dennis Nilsson, Phillip A. Porras, Erland Jonsson
Proceedings of the 26th International Conference on Computer Safety, Reliability, and Security (SAFECOMP), September 18-21, 2007, Nuremberg, Germany., p. 209-223
Paper in proceedings

Save references

If you have installed Zotero or Mendeley on your computer you can use a plugin to extract references from the publications you see.

Download plugins:
Zotero
Mendeley

There are no projects.
There might be more projects where Dennis Nilsson participates, but you have to be logged in as a Chalmers employee to see them.