최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기The journal of the institute of internet, broadcasting and communication : JIIBC, v.16 no.5, 2016년, pp.39 - 48
이호용 (고려대학교 정보보호대학원) , 이동훈 (고려대학교 정보보호대학원)
One of the major trends of automotive networking architecture is the introduction of automotive Ethernet. Ethernet is already used in single automotive applications (e.g. to connect high-data-rate sources as video cameras), it is expected that the ongoing standardization at IEEE (IEEE802.3bw - 100BA...
* AI 자동 식별 결과로 적합하지 않은 문장이 있을 수 있으니, 이용에 유의하시기 바랍니다.
S. Bayer, M. Lange, M. Wolf: Automotive Ethernet Security. In Hanser Automotive Networks Special, Carl HanserVerlag, Issue 2013, November 2013.
B. Glas "Towards Harmonization of ECU Protection and Secure OnBoard Communication in AUTOSAR" ESCAR Asia 2014, Tokyo
B. Glas et al "Towards Authentic In-Car Communication on Automotive Bus Systems", 29. VDI/VW Gemeinschaftstagung Automotive Security, Kassel, 2013
NHTSA: Part 573 Safety Recall Report - Recall No. 15V-461. 2015-07-23 http://www-odi.nhtsa.dot.gov/acms/cs/jaxrs/download/doc/UCM483036/RCLRPT-15V461-9407.pdf
K. Koscher, et al.: Experimental security analysis of a modern automobile. IEEE Symposiumon Securityand Privacy, Oakland, CA, May16-19, 2010.
S. Checkoway, et al:Comprehensive Experimental Analyses of Automotive Attack Surfaces. USENIX Security, August 10-12, 2011
M. Wolf, A. Weimerskirch and C. Paar: Security in automotive bus systems. In Proceedings of the Workshop on Embedded Security in Cars (escar)'04
C. Miller and C. Valasek: Remote Exploitation of an Unaltered Passenger Vehicle. 2015-08-10 http://illmatics.com/Remote%20Car%20Hacking.pdf
I. Foster, A. Prudhomme, K. Koscher and S. Savage: Fast and Vulnerable: A Story of Telematic Failures. 9zh USENIX Workshop on Offensive Technologies, Washington D.C., 2015-08-10 http://cseweb.ucsd.edu/-savage/papers/WOOT15.pdf
C. Miller and C. Valasek: A Survey of Remote Automotive Attack Surfaces 2014-08-06 http://illmatics.com/remote%20attack%20surfaces.pdf
Sean Convery (Cisco Systems): Hacking Layer 2: Fun with Ethernet Switches. 2002-08-01 http://www.blackhat.com/presentations/bh-usa-02/bh-us-02-convery-switches.pdf
IEEE: 802.1AETM-2006 Standard for Local and metropolitan area networks - Media Access Control (MAC) Security. 2006-08-18
IEEE: P1722-rev1TM/D13 - Draft Standard for a Transport Protocol for Time-Sensitive Applications in Bridged Local Area Networks. April 2015
IEEE: 802.1Q-2014Standard for Local and metropolitan area networks--Bridges and Bridged NetworksIEEE 802.1Q
IEEE: P802.1Qci/D0.0 Draft Standard for Local and Metropolitan Area Networks - Bridges and Bridged Networks -Amendment: Per-Stream Filtering and Policing. 2015-05-18
IEEE: 802.1X-2010 - IEEE Standard for Local and metropolitan area networks-Port-Based Network Access Control. 2010-02-05
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
출판사/학술단체 등이 한시적으로 특별한 프로모션 또는 일정기간 경과 후 접근을 허용하여, 출판사/학술단체 등의 사이트에서 이용 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.