|
[1] M. Khurram, H. Kumar, A. Chandak, V. Sarwade, N. Arora, and T. Quach, "Enhancing connected car adoption: Security and over the air update framework," pp. 194-198, 2016. [2] S. Woo, H. J. Jo, and D. H. Lee, "A Practical Wireless Attack on the Connected Car and Security Protocol for In-Vehicle CAN," IEEE Transactions on Intelligent Transportation Systems, pp. 1-14, 2014. [3] Y. S. Lee, J. H. Kim, H. V. Hung, and J. W. Jeon, "A parallel re-programming method for in-vehicle gateway to save software update time," pp. 1497-1502, 2015. [4] H. Mansor, K. Markantonakis, R. N. Akram, K. Mayes, and I. Gurulian, "Log Your Car: The Non-invasive Vehicle Forensics," pp. 974-982, 2016. [5] H. A. Odat and S. Ganesan, "Firmware over the air for automotive, Fotamotive," pp. 130-139, 2014. [6] Y. Onuma, Y. Terashima, and R. Kiyohara, "ECU Software Updating in Future Vehicle Networks," pp. 35-40, 2017. [7] A. Acker and B. Beaton, "Software Update Unrest: The Recent Happenings Around Tinder and Tesla," pp. 1891-1900, 2016. [8] M. Steger, M. Karner, J. Hillebrand, W. Rom, C. Boano, and K. Romer, "Generic framework enabling secure and efficient automotive wireless SW updates," pp. 1-8, 2016. [9] V. L. L. Thing and J. Wu, "Autonomous Vehicle Security: A Taxonomy of Attacks and Defences," pp. 164-170, 2016. [10] S. R. Singh, A. K. Khan, and S. R. Singh, "Performance evaluation of RSA and Elliptic Curve Cryptography," pp. 302-306, 2016. [11] M. B. H. Krawczyk, R. Canetti, "HMAC: Keyed-Hashing for Message Authentication," RFC 2104, Internet Engineering Task Force (IETF), 1997. [12] 莊嶸騰, "車載網路再進化- 高速網路共通性平台," vol. 108期, pp. 14-19[Online],Available: https://www.artc.org.tw/upfiles/ADUpload/knowledge/tw_knowledge_501525448.pdf [13] D. K. Nilsson, U. E. Larson, and P. H. Phung, "Vehicle ECU classification based on safety-security characteristics," pp. 102-102, 2008. [14] F. Sagstetter et al., "Security Challenges in Automotive Hardware/Software Architecture Design," pp. 458-463, 2013. [15] K. Han and K. G. Shin, "Prevention of information mis-translation by a malicious gateway in connected vehicles," pp. 247-254, 2016. [16] R. Hassan, K. Markantonakis, and R. N. Akram, "Can You Call the Software in Your Device be Firmware?," pp. 188-195, 2016. [17] H. Teraoka, F. Nakahara, and K. Kurosawa, "Incremental update method for resource-constrained in-vehicle ECUs," pp. 1-2, 2016. [18] G. Pedroza, M. S. Idrees, L. Apvrille, and Y. Roudier, "A Formal Methodology Applied to Secure Over-the-Air Automotive Applications," pp. 1-5, 2011. [19] N. Jain, S. G. Mali, and S. Kulkarni, "Infield firmware update: Challenges and solutions," pp. 1232-1236, 2016. [20] D. K. Nilsson, L. Sun, and T. Nakajima, "A Framework for Self-Verification of Firmware Updates over the Air in Vehicle ECUs," pp. 1-5, 2008. [21] D. K. Nilsson and U. E. Larson, "Secure Firmware Updates over the Air in Intelligent Vehicles," pp. 380-384, 2008. [22] M. Steger, C. Boano, M. Karner, J. Hillebrand, W. Rom, and K. Romer, "SecUp: Secure and Efficient Wireless Software Updates for Vehicles," pp. 628-636, 2016. [23] A. Maruaisap and P. Kumhom, "A hardware-based security scheme for in-vehicle CAN," pp. 1-5, 2016. [24] 唐偲瑋,劉佳琳,許勝翔,莊祐軒,羅乃維, "在Android平台上使用特徵指紋技術以實現App完整性驗證機制 An App Integrity Evaluation Mechanism Using Fingerprint Technology on Android Platform," 2016.
|