Ulf Larson

Showing 37 publications

2014

T-Fuzz: Model-based fuzzing for robustness testing of telecommunication protocols

W. Johansson, M.A. Svensson, Ulf Larson et al
Proceedings - IEEE 7th International Conference on Software Testing, Verification and Validation, ICST 2014, p. 323-332
Paper in proceedings
2014

Guidance for Selecting Data Collection Mechanisms for Intrusion Detection

Ulf Larson, Stefan Lindskog, Erland Jonsson
Handbook of Research on Emerging Developments in Data Privacy, p. 469-
Book chapter
2011

A Structured Approach to Selecting Data Collection Mechanisms for Intrusion Detection

Ulf Larson, Erland Jonsson, Stefan Lindskog
Privacy, Intrusion Detection, and Response: Technologies for Protecting Networks, p. 1-39
Book chapter
2010

Using system call information to reveal hidden attack manifestations

Ulf Larson, Dennis Nilsson, Erland Jonsson et al
Proceedings of the 1st International Workshop on Security and Communication Networks, IWSCN 2009
Conference contribution
2009

A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure

Dennis Nilsson, Ulf Larson
Journal of Networks. Vol. 4 (7), p. 552-564
Journal article
2009

Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks

Dennis Nilsson, Ulf Larson
International Journal of Digital Crime and Forensics. Vol. 1 (2), p. 28-41
Journal article
2009

On Adapting Data Collection to Intrusion Detection

Ulf Larson
Doctoral thesis
2008

Unidirectional Auxiliary Channel Challenge-Response Authentication

Dennis Nilsson, Ulf Larson, Erland Jonsson
7th Annual Wireless Telecommunications Symposium, WTS 2008; Ponoma, CA; United States; 24 April 2008 through 26 April 2008, p. 84-91
Paper in proceedings
2008

Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication

Dennis Nilsson, Ulf Larson, Erland Jonsson
5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008; Hong Kong; Hong Kong; 28 July 2008 through 31 July 2008
Paper in proceedings
2008

A Roadmap for Securing Vehicles against Cyber Attacks

Dennis Nilsson, Ulf Larson
NITRD National Workshop on High-Confidence Automotive Cyber-Physical Systems, April 3-4, 2008, Troy, MI, USA
Paper in proceedings
2008

Security Recommendations for a Hierarchical Wireless Vehicular Infrastructure

Dennis Nilsson, Ulf Larson, Erland Jonsson
Report
2008

Secure Firmware Updates over the Air in Intelligent Vehicles

Dennis Nilsson, Ulf Larson
ICC 2008 - 2008 IEEE International Conference on Communications Workshops; Beijing; China; 19 May 2008 through 23 May 2008, p. 380-384
Paper in proceedings
2008

Securing Vehicles against Cyber Attacks

Ulf Larson, Dennis Nilsson
4th Annual Cyber Security and Information Intelligence Research Workshop: Developing Strategies to Meet the Cyber Security and Information Intelligence Challenges Ahead, CSIIRW'08; Oak Ridge, TN; United States; 12 May 2008 through 14 May 2008
Paper in proceedings
2008

Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks

Dennis Nilsson, Ulf Larson
Proceedings of the First ACM International Conference on Forensic Applications and Techniques in Telecommunications, Information and Multimedia (e-Forensics), January 21-23, 2008, Adelaide, Australia.
Paper in proceedings
2008

A Revised Taxonomy of Data Collection Mechanisms with a Focus on Intrusion Detection

Ulf Larson, Stefan Lindskog, Erland Jonsson
Proceedings of the Third IEEE International Conference on Availability, Reliability and Security (ARES 2008), p. 624-629
Paper in proceedings
2008

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay

Dennis Nilsson, Ulf Larson, Francesco Picasso et al
Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems (CISIS), October 23-24, 2008, Genova, Italy, p. 84-91
Paper in proceedings
2008

Vehicle ECU Classification Based on Safety-Security Characteristics

Dennis Nilsson, Phu Phung, Ulf Larson
Proceedings of 13th IET Road Transport Information and Control - RTIC2008, May 20-22, 2008, Manchester, UK
Paper in proceedings
2008

Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes

Dennis Nilsson, Ulf Larson, Erland Jonsson
IEEE Vehicular Technology Conference
Paper in proceedings
2008

An Approach to Specification-based Attack Detection for In-Vehicle Networks

Ulf Larson, Dennis Nilsson, Erland Jonsson
Proceedings of the IEEE Intelligent Vehicles Symposium, June 4-6, 2008, Eindhoven, The Netherlands
Journal article
2008

Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles

Dennis Nilsson, Ulf Larson, Erland Jonsson
Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security (SAFECOMP), September 22-25, 2008, Newcastle, UK, p. 207-220
Paper in proceedings
2008

Combining Physical and Digital Evidence in Vehicle Environments

Dennis Nilsson, Ulf Larson
3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008; Berkeley, CA; United States; 22 May 2008 through 22 May 2008, p. 10-14
Paper in proceedings
2008

A Step Towards Securing Vehicles against Cyber Attacks

Dennis Nilsson, Ulf Larson
ENISA Quarterly Review. Vol. 4 (2), p. 12-13
Magazine article
2008

Simulated Attacks on CAN Buses: Vehicle virus

Dennis Nilsson, Ulf Larson
Proceedings of the Fifth IASTED Asian Conference on Communication Systems and Networks (ASIACSN), April 2-4, 2008, Langkawi, Malaysia
Paper in proceedings
2008

An Approach to using Honeypots in In-Vehicle Networks

Vilhelm Verendel, Dennis Nilsson, Ulf Larson et al
68th Semi-Annual IEEE Vehicular Technology, VTC 2008-Fall, Conference; Calgary, AB; Canada; 21 September 2008 through 24 September 2008
Paper in proceedings
2008

Operator-Centric and Adaptive Intrusion Detection

Ulf Larson, Stefan Lindskog, Dennis Nilsson et al
Proceedings of the Fourth International Conference on Information Assurance and Security (IAS 2008), September 8-10, 2008, Naples, Italy, p. 161-166
Paper in proceedings
2008

Decision Support for Intrusion Detection Data Collection

Ulf Larson, Stefan Lindskog, Dennis Nilsson et al
Proceedings of the 13th Nordic Workshop on Secure IT-systems (NordSec 2008), October 9-10, 2008, Copenhagen, Denmark
Paper in proceedings
2008

Low-Cost Key Management for Hierarchical Wireless Vehicle Networks

Dennis Nilsson, Ulf Larson, Erland Jonsson
Proceedings of the IEEE Intelligent Vehicles Symposium, June 4-6, 2008, Eindhoven, The Netherlands, p. 476-481
Paper in proceedings
2007

A General Model and Guidelines for Attack Manifestation Generation

Ulf Larson, Dennis Nilsson, Erland Jonsson
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). Vol. 5141, p. 274-286
Paper in proceedings
2007

Using Common Log Information to Reveal Hidden Attack Manifestations

Ulf Larson, Dennis Nilsson, Erland Jonsson
Report
2007

A General Model and Guidelines for Attack Manifestation Generation

Dennis Nilsson, Ulf Larson, Erland Jonsson
Report
2006

An intrusion detection-centric taxonomy and survey of data log mechanisms

Ulf Larson, Erland Jonsson
The 11th Nordic Workshop on Secure IT-systems
Journal article
2005

METAL - A tool for extracting attack manifestations

Ulf Larson, Emilie Lundin Barse, Erland Jonsson
Detection of Intrusions and Malware, and Vulnerability Assessment, Second International Conference, DIMVA 2005, p. 85-102
Paper in proceedings
2005

Reducing system call logs with selective auditing

Ulf Larson, Erland Jonsson
Nordic Workshop on Secure IT Systems (NordSec), p. 122-131
Paper in proceedings
2004

New security issues in emerging computing environments - A reflection

Håkan Kvarnström, Ulf Larson, Erland Jonsson
Report

Save references

If you have installed Zotero or Mendeley on your computer you can use a plugin to extract references from the publications you see.

Download plugins:
Zotero
Mendeley

There are no projects.
There might be more projects where Ulf Larson participates, but you have to be logged in as a Chalmers employee to see them.