[confproc]
Phung, Phu H
/ 2010
/ A model for safe and secure execution of downloaded vehicle applications
/ Road Transport Information and Control Conference and the ITS United Kingdom Members' Conference (RTIC 2010)
: 1~6
[confproc]
Nilsson, D.K
/ 2008
/ Efficient In-Vehicle Delayed Data Authentication Based on Compound Message Authentication Codes
/ Proceedings of IEEE 68th Vehicular Technology Conference, 2008. VTC 2008-Fall
: 1~5
[confproc]
Muter, M.
/ 2010
/ A structured approach to anomaly detection for in-vehicle networks
/ Information Assurance and Security (IAS), 2010 Sixth International Conference on
: 92~98
[confproc]
Marko Wolf
/ 2004
/ security in automotive bus systems
/ In Proceedings of the Workshop on Embedded Security in Cars 2004
: 1~13
[confproc]
Xiao Ni
/ 2007
/ AES Security Protocol Implementation for Automobile Remote Keyless System
/ Proceedings of IEEE 65th Vehicular Technology Conference, 2007. VTC2007-Spring
: 2526~2529
[thesis]
Gang-seok Kim
/ 2011
/ Vehicle ECU through CAN communication from eavesdropping and manipulation of the analysis of the possibility of external threats
/ Korea University
[confproc]
Karl Koscher
/ 2010
/ Experimental Security Analysis of a Modern Automobile
/ IEEE Symposium on Security and Privacy
: 447~462
[confproc]
T. Hoppe
/ 2007
/ Exemplary Automotive Attack Scenarios: Trojan horses for Electronic Throttle Control System (ETC) and replay attacks on the power window system
/ Proceedings of 23th VDI/VW Gemeinschaftstagung Automotive Security
: 165~183
[confproc]
Nilsson, Dennis K
/ 2008
/ Vehicle ECU classification based on safety-security characteristics
/ Road Transport Information and Control - RTIC 2008 and ITS United Kingdom Members' Conference, IET
: 1~7
[book]
Aditya P. Mathur
/ 2008
/ Foundations of Software Testing
/ Pearson Education
: 193~278
[book]
M. Sutton
/ 2007
/ Fuzzing: Brute Force Vulnerability Discovery
/ Addison-Wesley
: 386~417
[journal]
G. Devarajan
/ 2007
/ Unraveling SCADA Protocols: Using Sulley Fuzzer
/ DEFCON
15
[confproc]
Hye-ryun Lee
/ 2011
/ Detecting the vulnerability of software with cyclic behavior using Sulley
/ Proceedings of the Advanced Information Management and Service (ICIPM), 2011 7th International Conference on
: 83~88