Ulf Larson
Showing 37 publications
T-Fuzz: Model-based fuzzing for robustness testing of telecommunication protocols
Guidance for Selecting Data Collection Mechanisms for Intrusion Detection
A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection
Using system call information to reveal hidden attack manifestations
A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
Unidirectional Auxiliary Channel Challenge-Response Authentication
An Approach to using Honeypots in In-Vehicle Networks
An Approach to Specification-based Attack Detection for In-Vehicle Networks
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles
Combining Physical and Digital Evidence in Vehicle Environments
A Roadmap for Securing Vehicles against Cyber Attacks
Secure Firmware Updates over the Air in Intelligent Vehicles
Decision Support for Intrusion Detection Data Collection
Vehicle ECU Classification Based on Safety-Security Characteristics
Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection
Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication
Operator-Centric and Adaptive Intrusion Detection
A Step Towards Securing Vehicles against Cyber Attacks
Simulated Attacks on CAN Buses: Vehicle virus
A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay
Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure
Securing Vehicles against Cyber Attacks
Low-Cost Key Management for Hierarchical Wireless Vehicle Networks
Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks
A General Model and Guidelines for Attack Manifestation Generation
A General Model and Guidelines for Attack Manifestation Generation
Using Common Log Information to Reveal Hidden Attack Manifestations
An intrusion detection-centric taxonomy and survey of data log mechanisms
An intrusion detection-centric taxonomy and survey of data log mechanisms
METAL - A tool for extracting attack manifestations
Reducing system call logs with selective auditing
New security issues in emerging computing environments - A reflection
Download publication list
You can download this list to your computer.
Filter and download publication list
As logged in user (Chalmers employee) you find more export functions in MyResearch.
You may also import these directly to Zotero or Mendeley by using a browser plugin. These are found herer:
Zotero Connector
Mendeley Web Importer
The service SwePub offers export of contents from Research in other formats, such as Harvard and Oxford in .RIS, BibTex and RefWorks format.