최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會誌 = KIISC review, v.33 no.4, 2023년, pp.13 - 22
주경호 (고려대학교 정보보호대학원 정보보호학과) , 최원석 (고려대학교 정보보호대학원 정보보호학과) , 이동훈 (고려대학교 정보보호대학원 정보보호학과)
Garcia, Flavio D., et al. "Lock it and still lose?it-on the ({In) Security} of automotive remote?keyless entry systems." 25th USENIX security?symposium (USENIX Security 16). 2016.?
Francillon, Aurelien, Boris Danev, and Srdjan?Capkun. "Relay attacks on passive keyless entry?and start systems in modern cars." Proceedings of the Network and Distributed System Security?Symposium (NDSS). 2011.?
Leu, Patrick, et al. "Ghost Peak: Practical?Distance Reduction Attacks Against?{HRP}{UWB} Ranging." 31st USENIX Security?Symposium (USENIX Security 22). 2022.?
Garcia, Flavio D., et al. "Lock it and still lose?it-on the ({In) Security} of automotive remote?keyless entry systems." 25th USENIX security?symposium (USENIX Security 16). 2016.?
Commission Directive 95/56/EC, Euratom of 8?November 1995 adapting to technical progress?Council Directive 74/61/EEC relating to devices?to prevent the unauthorized use of motor vehicles?
Keyless Entry/Go Leaflet Datasheet by NXP USA?Inc.?
IEEE 802.15 WPAN TM Task Group 4z Enhanced?Impulse?Radio
Indesteege, Sebastiaan, et al. "A practical attack on KeeLoq." Advances in Cryptology-EUROCRYPT 2008: 27th Annual International?Conference on the Theory and Applications of?Cryptographic Techniques, Istanbul, Turkey,?April 13-17, 2008. Proceedings 27. Springer?Berlin?Heidelberg, 2008.
Eisenbarth, Thomas, et al. "On the power of power analysis in the real world: A complete break?of the KeeLoq code hopping scheme." Advances?in Cryptology-CRYPTO 2008: 28th Annual?International Cryptology Conference, Santa?Barbara, CA, USA, August 17-21, 2008.?Proceedings 28. Springer Berlin Heidelberg,?2008.?
Kasper, Markus, et al. "Breaking KeeLoq in a flash: on extracting keys at lightning speed."?International Conference on Cryptology in Africa.?Berlin, Heidelberg: Springer Berlin Heidelberg,?2009.?
Wouters, Lennert, et al. "Fast, furious and insecure: Passive keyless entry and start systems in?modern supercars." IACR Transactions on Cryptographic Hardware and Embedded Systems?(2019): 66-85.?
Wouters, Lennert, et al. "Dismantling?DST80-based immobiliser systems." IACR?Transactions on Cryptographic Hardware and?Embedded Systems (2020): 99-127.?
Verdult, Roel, Flavio D. Garcia, and Josep?Balasch. "Gone in 360 seconds: Hijacking with?Hitag2." 21st USENIX Security Symposium?(USENIX Security 12). 2012.?
Hicks, Christopher, Flavio D. Garcia, and David?Oswald. "Dismantling the AUT64 automotive?cipher." IACR Transactions on Cryptographic?Hardware and Embedded Systems (2018): 46-69.?
Verdult, Roel, et al. "Dismantling megamos crypto: Wirelessly lockpicking a vehicle immobilizer."?22nd USENIX Security Symposium (USENIX?Security 13). 2013.?
This Hacker's Tiny Device Unlocks Cars And?Opens Garages | WIRED?
Chasing Cars: Keyless Entry System Attacks?
Wouters, Lennert, Benedikt Gierlichs, and Bart?Preneel. "My other car is your car: compromising?the Tesla Model X keyless entry system." IACR?Transactions on Cryptographic Hardware and?Embedded Systems (2021): 149-172.?
Poturalski, Marcin, et al. "The cicada attack: degradation and denial of service in IR ranging."?2010 IEEE International Conference on Ultra-Wideband. Vol. 2. IEEE, 2010.?
Flury, Manuel, et al. "Effectiveness of distance-decreasing attacks against impulse radio?ranging." Proceedings of the third ACM conference on Wireless network security. 2010.?
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.