최소 단어 이상 선택하여야 합니다.
최대 10 단어까지만 선택 가능합니다.
다음과 같은 기능을 한번의 로그인으로 사용 할 수 있습니다.
NTIS 바로가기情報保護學會誌 = KIISC review, v.33 no.4, 2023년, pp.47 - 55
이세영 (고려대학교 정보보호대학원) , 최원석 (고려대학교 정보보호대학원) , 이동훈 (고려대학교 정보보호대학원)
ISO, ISO. "11898-1: 2003-Road vehicles-Controller area network." International?Organization for Standardization, Geneva,?Switzerland, 2003.
K. Koscher, A. Czeskis, F. Roesner, S. Patel, T.?Kohno, S. Checkoway, D. McCoy, B. Kantor, D.?Anderson, H. Shacham et al., "Experimental security analysis of a modern automobile," in?Security and Privacy (SP), 2010 IEEE?Symposium on. IEEE, 2010, pp. 447-462.
Miller, Charlie, and Chris Valasek. "Remote exploitation of an unaltered passenger vehicle."?Black Hat USA 2015, no. S 91, 2015.
Nie, Sen, Ling Liu, and Yuefeng Du. "Free-fall:?Hacking tesla from wireless to can bus."?Briefing, Black Hat USA, 25, p.1-16, 2017.
Woo, Samuel, Hyo Jin Jo, and Dong Hoon Lee.?"A practical wireless attack on the connected car and security protocol for in-vehicle CAN."?Intelligent Transportation Systems, IEEE?Transactions on 16.2 (2015): 993-1006.
A.-I. Radu and F. D. Garcia, "Leia: A lightweight?authentication protocol for can," in European?Symposium on Research in Computer Security.?Springer, 2016, pp. 283-300.
A. Taylor, N. Japkowicz, and S. Leblanc,?"Frequency-based anomaly detection for the automotive can bus," in 2015 World Congress on Industrial Control Systems Security (WCICSS).?IEEE, 2015, pp. 45-49.
H. M. Song, H. R. Kim, and H. K. Kim,?"Intrusion detection system based on the analysis?of time intervals of can messages for in-vehicle?network," in 2016 international conference on information networking (ICOIN). IEEE, 2016, pp.?63-68.
M. R. Moore, R. A. Bridges, F. L. Combs, M.?S. Starr, and S. J. Prowell, "Modeling inter-signal?arrival times for accurate detection of can bus?signal injection attacks: a data-driven approach?to in-vehicle intrusion detection," in Proceedings?of the 12th Annual Conference on Cyber and?Information Security Research. ACM, 2017, pp.?1-4.
Stachowski, Stephen, Ron Gaynier, and David J.?LeBlanc. An assessment method for automotive?intrusion detection system performance.?University of Michigan, Ann Arbor,?Transportation Research Institute, 2019.
Kneib, Marcel. "A survey on sender identification methodologies for the controller area network." SICHERHEIT 2020 (2020).
Choi, Wonsuk, et al. "Identifying ecus using inimitable characteristics of signals in controller area networks." IEEE Transactions on Vehicular?Technology 67.6 (2018): 4757-4770.
Kneib, Marcel, and Christopher Huth. "Scission:?Signal characteristic-based sender identification?and intrusion detection in automotive networks."?Proceedings of the 2018 ACM SIGSAC?Conference on Computer and Communications?Security. 2018.
Choi, Wonsuk, et al. "Voltageids: Low-level?communication characteristics for automotive intrusion detection system." IEEE Transactions on Information Forensics and Security 13.8 (2018):?2114-2129.
Biham, Eli, Sara Bitan, and Eli Gavril. "TCAN:?authentication without cryptography on a can bus?based on nodes location on the bus." Proceedings?of the 2018 Workshop on Embedded Security in?Cars (ESCAR). Vol. 16. 2018.
Moreno, Carlos, and Sebastian Fischmeister.?"Sender Authentication for Automotive?In-Vehicle Networks through Dual Analog?Measurements to Determine the Location of the?Transmitter." ICISSP. 2019.
Cho, Kyong-Tak, and Kang G. Shin.?"Fingerprinting electronic control units for vehicle intrusion detection." 25th USENIX Security?Symposium (USENIX Security 16). 2016.
Kulandaivel, Sekar, et al. "{CANvas}: Fast and?Inexpensive Automotive Network Mapping."?28th USENIX Security Symposium (USENIX?Security 19). 2019.
Zhou, Jia, et al. "A Model-Based Method for?Enabling Source Mapping and Intrusion?Detection on Proprietary Can Bus." IEEE?Transactions on Intelligent Transportation?Systems (2022).
Zhou, Jia, et al. "Btmonitor: Bit-time-based intrusion detection and attacker identification in?controller area network." ACM Transactions on Embedded Computing Systems (TECS) 18.6?(2019): 1-23.
Shin, Jiwoo, et al. "RIDAS: Real-time identification of attack sources on controller area networks."
Bhatia, Rohit, et al. "Evading Voltage-Based?Intrusion Detection on Automotive CAN."?NDSS. 2021.
Ying, Xuhang, et al. "Shape of the cloak: Formal?analysis of clock skew-based intrusion detection?system in controller area networks." IEEE?Transactions on Information Forensics and?Security 14.9 (2019): 2300-2314.
*원문 PDF 파일 및 링크정보가 존재하지 않을 경우 KISTI DDS 시스템에서 제공하는 원문복사서비스를 사용할 수 있습니다.
※ AI-Helper는 부적절한 답변을 할 수 있습니다.