최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會論文誌 = Journal of the Korea Institute of Information Security and Cryptology, v.31 no.3, 2021년, pp.373 - 385
이세영 (고려대학교 정보보호대학원) , 최원석 (한성대학교)
To provide convenience and safety of drivers, the recent vehicles are being equipped with a number of electronic control units (ECUs). Multiple ECUs construct a network inside a vehicle to share information related to the vehicle's status; in addition, the CAN protocol is normally applied. As the mo...
Koscher, Karl, et al, "Experimental security analysis of a modern automobile," IEEE Symposium on Security and Privacy, pp. 447-462, Jul. 2010
Cho, Kyong-Tak, and Kang G. Shin. "Fingerprinting electronic control units for vehicle intrusion detection," 25th USENIX Security Symposium, pp. 911-927, Aug. 2016
Choi, Wonsuk, et al. "Voltageids: Low-level communication characteristics for automotive intrusion detection system," IEEE Transactions on Information Forensics and Security, 13(8), pp. 2114-2129, Aug. 2018
Song, Hyun Min, Ha Rang Kim, and Huy Kang Kim. "Intrusion detection system based on the analysis of time intervals of CAN messages for in-vehicle network," 2016 international conference on information networking (ICOIN), pp. 63-68, Mar. 2016
Seo, Eunbi, Hyun Min Song, and Huy Kang Kim. "Gids: Gan based intrusion detection system for in-vehicle network." 16th Annual Conference on Privacy, Security and Trust (PST), pp. 1-6, Nov. 2018
Choi, Wonsuk, et al. "Identifying ecus using inimitable characteristics of signals in controller area networks," IEEE Transactions on Vehicular Technology, 67(6), pp. 4757-4770, Feb. 2018
Miller, Charlie, and Chris Valasek. "Adventures in automotive networks and control units," Def Con 21, 2013
Checkoway, Stephen, et al. "Comprehensive experimental analyses of automotive attack surfaces," in Proceedings of the 20th USENIX Security Symposium, pp. 447-462, Aug. 2011
Foster, Ian, et al. "Fast and vulnerable: A story of telematic failures." 9th USENIX Workshop on Offensive Technologies, Aug. 2015.
Miller, Charlie, and Chris Valasek. "Remote exploitation of an unaltered passenger vehicle," Black Hat USA, Aug. 2015
Lv, Samuel, Sen Nie, and Ling Liu. "Car Hacking Research: Remote Attack Tesla Motors," Keen Security lab of Tencent, Sep. 2016
Taylor, Adrian, Nathalie Japkowicz, and Sylvain Leblanc. "Frequency-based anomaly detection for the automotive CAN bus," IEEE World Congress on Industrial Control Systems Security (WCICSS), pp. 45-49, Dec. 2015
Muter, Michael, and Naim Asaj. "Entropy-based anomaly detection for in-vehicle networks." IEEE Intelligent Vehicles Symposium (IV), pp. 1110-1115, Jun. 2011
Sagong, Sang Uk, et al. "Cloaking the clock: emulating clock skew in controller area networks," ACM/IEEE 9th International Conference on Cyber-Physical Systems (ICCPS), pp. 32-42, Apr. 2018
Foruhandeh, Mahsa. et al. "SIMPLE: Single-frame based physical layer identification for intrusion detection and prevention on in-vehicle networks,", In Proceedings of the 35th Annual Computer Security Applications Conference, pp. 229-244, Dec. 2019
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
Free Access. 출판사/학술단체 등이 허락한 무료 공개 사이트를 통해 자유로운 이용이 가능한 논문
※ AI-Helper는 부적절한 답변을 할 수 있습니다.