How to Secure the Connected Car
Doctoral thesis, 2009

Show more

in-vehicle networks

firmware updates

attacks

connected car

defense-in-depth

Security

diagnostics

wireless

Author

Dennis Nilsson

Chalmers, Computer Science and Engineering (Chalmers), Computer Engineering (Chalmers)

Included papers

Combining Physical and Digital Evidence in Vehicle Environments

3rd International Workshop on Systematic Approaches to Digital Forensic Engineering, SADFE 2008; Berkeley, CA; United States; 22 May 2008 through 22 May 2008,;(2008)p. 10-14

Paper in proceeding

Simulated Attacks on CAN Buses: Vehicle virus

Proceedings of the Fifth IASTED Asian Conference on Communication Systems and Networks (ASIACSN), April 2-4, 2008, Langkawi, Malaysia,;(2008)

Paper in proceeding

Vehicle ECU Classification Based on Safety-Security Characteristics

Proceedings of 13th IET Road Transport Information and Control - RTIC2008, May 20-22, 2008, Manchester, UK,;(2008)

Paper in proceeding

An Approach to Specification-based Attack Detection for In-Vehicle Networks

Proceedings of the IEEE Intelligent Vehicles Symposium, June 4-6, 2008, Eindhoven, The Netherlands,;(2008)

Journal article

A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay

Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems (CISIS), October 23-24, 2008, Genova, Italy,;(2008)p. 84-91

Paper in proceeding

A Defense-in-Depth Approach to Securing the Wireless Vehicle Infrastructure

Journal of Networks,;Vol. 4(2009)p. 552-564

Journal article

Conducting Forensic Investigations of Cyber Attacks on Automobile In-Vehicle Networks

International Journal of Digital Crime and Forensics,;Vol. 1(2009)p. 28-41

Journal article

Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes

IEEE Vehicular Technology Conference,;(2008)

Paper in proceeding

How to Secure Bluetooth-based Pico Networks

Proceedings of the 26th International Conference on Computer Safety, Reliability, and Security (SAFECOMP), September 18-21, 2007, Nuremberg, Germany.,;(2007)p. 209-223

Paper in proceeding

Auxiliary Channel Diffie-Hellman Encrypted Key-Exchange Authentication

5th International ICST Conference on Heterogeneous Networking for Quality, Reliability, Security and Robustness, QShine 2008; Hong Kong; Hong Kong; 28 July 2008 through 31 July 2008,;(2008)

Paper in proceeding

Creating a Secure Infrastructure for Wireless Diagnostics and Software Updates in Vehicles

Proceedings of the 27th International Conference on Computer Safety, Reliability, and Security (SAFECOMP), September 22-25, 2008, Newcastle, UK,;(2008)p. 207-220

Paper in proceeding

Low-Cost Key Management for Hierarchical Wireless Vehicle Networks

Proceedings of the IEEE Intelligent Vehicles Symposium, June 4-6, 2008, Eindhoven, The Netherlands,;(2008)p. 476-481

Paper in proceeding

Unidirectional Auxiliary Channel Challenge-Response Authentication

7th Annual Wireless Telecommunications Symposium, WTS 2008; Ponoma, CA; United States; 24 April 2008 through 26 April 2008,;(2008)p. 84-91

Paper in proceeding

An Approach to using Honeypots in In-Vehicle Networks

68th Semi-Annual IEEE Vehicular Technology, VTC 2008-Fall, Conference; Calgary, AB; Canada; 21 September 2008 through 24 September 2008,;(2008)

Paper in proceeding

Secure Firmware Updates over the Air in Intelligent Vehicles

ICC 2008 - 2008 IEEE International Conference on Communications Workshops; Beijing; China; 19 May 2008 through 23 May 2008,;(2008)p. 380-384

Paper in proceeding

A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs

Proceedings of the Third IEEE Workshop on Automotive Networking and Applications (AutoNet) co-located with IEEE GLOBECOM, November 30 - December 4, 2008, New Orleans, LA, USA,;(2008)

Paper in proceeding

Categorizing

Subject Categories (SSIF 2011)

Computer Engineering

Identifiers

ISBN

978-91-7385-245-6

Other

Series

Doktorsavhandlingar vid Chalmers tekniska högskola. Ny serie: 2926

Technical report D - Department of Computer Science and Engineering, Chalmers University of Technology and Göteborg University: 60D

Public defence

2009-05-15 15:15

HC2

Opponent: Professor Dieter Gollmann, Technische Universität Hamburg-Harburg, Germany

More information

Created

10/6/2017