2
0
Fork 0
mirror of https://github.com/MartinThoma/LaTeX-examples.git synced 2025-04-19 11:38:05 +02:00
LaTeX-examples/publications/Seminar-Kognitive-Automobile/literatur.bib
2015-12-24 17:53:51 +01:00

766 lines
41 KiB
BibTeX
Raw Permalink Blame History

% This file was created with JabRef 2.10.
% Encoding: Cp1252
@String { apr = {April} }
@String { aug = {August} }
@String { dec = {Dezember} }
@String { feb = {Februar} }
@String { jan = {Januar} }
@String { jul = {Juli} }
@String { jun = {Juni} }
@String { mar = {M{\"a}rz} }
@String { may = {Mai} }
@String { nov = {November} }
@String { oct = {Oktober} }
@String { sep = {September} }
@Misc{Albert2012,
Title = {Understanding C by learning assembly},
Author = {David Albert},
Month = sep,
Year = {2012},
Comment = {Verf{\"u}gbar unter \url{https://www.recurse.com/blog/7-understanding-c-by-learning-assembly}},
Owner = {Martin Thoma},
Timestamp = {2015.09.02},
Url = {https://www.recurse.com/blog/7-understanding-c-by-learning-assembly}
}
@Misc{Arora2013,
Title = {Buffer Overflow Attack Explained with a {C} Program Example},
Author = {Himanshu Arora},
Month = jun,
Year = {2013},
Owner = {Martin Thoma},
Timestamp = {2015.09.02},
Url = {http://www.thegeekstuff.com/2013/06/buffer-overflow/}
}
@Misc{Bendersky2011,
Title = {Stack frame layout on x86-64},
Author = {Eli Bendersky},
Month = sep,
Year = {2011},
Owner = {Martin Thoma},
Timestamp = {2015.09.02},
Url = {http://eli.thegreenplace.net/2011/09/06/stack-frame-layout-on-x86-64/}
}
@Misc{Bray2002,
Title = {Compiler Security Checks In Depth},
Author = {Brandon Bray},
HowPublished = {MSDN},
Month = feb,
Year = {2002},
Owner = {Martin Thoma},
Timestamp = {2015.06.29},
Url = {https://msdn.microsoft.com/en-us/library/aa290051(v=vs.71).aspx}
}
@InProceedings{Checkoway2011,
Title = {Comprehensive Experimental Analyses of Automotive Attack Surfaces},
Author = {Checkoway, Stephen and McCoy, Damon and Kantor, Brian and Anderson, Danny and Shacham, Hovav and Savage, Stefan and Koscher, Karl and Czeskis, Alexei and Roesner, Franziska and Kohno, Tadayoshi},
Booktitle = {Proceedings of the 20th USENIX Conference on Security},
Year = {2011},
Address = {Berkeley, CA, USA},
Pages = {6--6},
Publisher = {USENIX Association},
Series = {SEC'11},
Abstract = {Modern automobiles are pervasively computerized, and hence potentially vulnerable to attack. However, while previous research has shown that the internal networks within some modern cars are insecure, the associated threat model--requiring prior physical access--has justifiably been viewed as unrealistic. Thus, it remains an open question if automobiles can also be susceptible to remote compromise. Our work seeks to put this question to rest by systematically analyzing the external attack surface of a modern automobile. We discover that remote exploitation is feasible via a broad range of attack vectors (including mechanics tools, CD players, Bluetooth and cellular radio), and further, that wireless communications channels allow long distance vehicle control, location tracking, in-cabin audio exfiltration and theft. Finally, we discuss the structural characteristics of the automotive ecosystem that give rise to such problems and highlight the practical challenges in mitigating them.},
Acmid = {2028073},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/cars-usenixsec2011.pdf:PDF},
Location = {San Francisco, CA},
Numpages = {1},
Owner = {Martin Thoma},
Timestamp = {2015.04.24},
Url = {http://dl.acm.org/citation.cfm?id=2028067.2028073}
}
@Misc{Sky2014,
Title = {Thousands Of Cars Stolen Using Hi-Tech Gadgets},
Author = {Thomas Cheshire},
Month = may,
Year = {2014},
Abstract = {A Sky News investigation finds that almost half the 89,000 vehicles broken into in London last year were hacked electronically.},
Owner = {Martin Thoma},
Timestamp = {2015.06.15},
Url = {http://news.sky.com/story/1257320/thousands-of-cars-stolen-using-hi-tech-gadgets}
}
@Book{Eckert2012,
Title = {IT-Sicherheit},
Author = {Claudia Eckert},
Publisher = {Oldenbourd Wissenschaftsverlag GmbH},
Year = {2012},
Owner = {Martin Thoma},
Timestamp = {2015.06.29}
}
@Misc{Richtlinie70/156/EWG:Fahrzeugklassen,
Title = {Richtlinie des {Rates} 70/156/EWG},
Author = {{Europ\"{a}ischer Rat}},
Month = feb,
Year = {1970},
Owner = {Martin Thoma},
Timestamp = {2015.06.11},
Url = {http://eur-lex.europa.eu/legal-content/DE/TXT/?qid=1434048145188&uri=CELEX:31970L0156}
}
@Misc{EURegulation2015/ecall,
Title = {Verordnung ({EU}) 2015/758 des Europ\"{a}ischen {Parlaments} und des {Rates}},
Author = {{European Parliament, Council of the European Union}},
Month = apr,
Year = {2015},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/EU-Verordnung-2015-758-ecall.pdf:PDF},
Owner = {Martin Thoma},
Timestamp = {2015.06.01},
Url = {http://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32015R0758}
}
@Misc{EURegulation661/2009,
Title = {Verordnung ({EG}) Nr. 661/2009 des Europ\"{a}ischen {Parlaments} und des {Rates}},
Author = {{European Parliament, Council of the European Union}},
Month = jul,
Year = {2009},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/EU-Verordnung-661-2009.pdf:PDF},
Owner = {Martin Thoma},
Timestamp = {2015.06.01},
Url = {http://eur-lex.europa.eu/legal-content/EN/ALL/?uri=CELEX:32009R0661}
}
@Misc{EUDirective98/69/EC,
Title = {Richtlinie {98/69/EC} des Europ\"{a}ischen {Parlaments} und des {Rates}},
Author = {{European Parliament, Council of the European Union}},
Month = oct,
Note = {\newline\url{http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31998L0069}},
Year = {1998},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/EU-Richtlinie-98-69-EG.pdf:PDF},
Owner = {Martin Thoma},
Timestamp = {2015.06.01},
Url = {http://eur-lex.europa.eu/legal-content/en/ALL/?uri=CELEX:31998L0069}
}
@InProceedings{Foster2015,
Title = {Fast and Vulnerable: A Story of Telematic Failures},
Author = {Ian Foster and Andrew Prudhomme and Karl Koscher and Stefan Savage},
Booktitle = {9th USENIX Workshop on Offensive Technologies (WOOT 15)},
Year = {2015},
Address = {Washington, D.C.},
Month = aug,
Publisher = {USENIX Association},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/woot15-paper-foster.pdf:PDF},
Url = {https://www.usenix.org/system/files/conference/woot15/woot15-paper-foster.pdf}
}
@InProceedings{Francillon2011,
Title = {Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars},
Author = {Aurelien Francillon AND Boris Danev AND Srdjan Capkun},
Booktitle = {NDSS},
Year = {2011},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/relay-attacks-on-passive-keyless-entry-and-start-systems-in-modern-cars.pdf:PDF},
Owner = {Martin Thoma},
Review = {* immobilizer chips prevent key copying
* legal implications (no trace of theft / closing/opening the door)
* open car to access OBD-II port for further attacks},
Timestamp = {2015.05.15},
Url = {https://eprint.iacr.org/2010/332.pdf}
}
@Misc{Gallagher2015,
Title = {Fiat Chrysler recalls 1.4 million cars over remote hack vulnerability},
Author = {Sean Gallagher},
HowPublished = {arstechnica},
Month = jul,
Year = {2015},
Owner = {Martin Thoma},
Timestamp = {2015.09.03},
Url = {http://arstechnica.com/security/2015/07/fiat-chrysler-recalls-1-4-million-cars-over-remote-hack-vulnerability/}
}
@Misc{Greenberg2015,
Title = {Your {BMW} or {Benz} Could Also Be Vulnerable to That {GM} {OnStar} Hack},
Author = {Andy Greenberg},
Month = aug,
Year = {2015},
Owner = {Martin Thoma},
Timestamp = {2015.09.03},
Url = {http://www.wired.com/2015/08/bmw-benz-also-vulnerable-gm-onstar-hack/}
}
@Misc{Dailymail2015,
Title = {Car-hackers driving off with top motors: Increasing numbers being stolen after thieves simply bypass security devices},
Author = {Chris Greenwood},
Month = feb,
Year = {2015},
Abstract = {Gangs using <20>keyless<73> techniques are estimated to have stolen more than 6,000 vehicles in London alone last year <20> almost half of all cars and vans stolen.
...
[...] Experts are concerned that thieves may even be using computer malware to take over vehicle systems via satellite, issuing remote commands for them to unlock and start up.[...]},
Owner = {Martin Thoma},
Timestamp = {2015.06.15},
Url = {http://www.dailymail.co.uk/news/article-2938793/Car-hackers-driving-motors-Increasing-numbers-stolen-thieves-simply-bypass-security-devices.html}
}
@Article{Howard2006,
Title = {A process for performing security code reviews},
Author = {Howard, M.A.},
Journal = {Security Privacy, IEEE},
Year = {2006},
Month = jul,
Number = {4},
Pages = {74-79},
Volume = {4},
__markedentry = {[Martin Thoma:]},
Abstract = {No one really likes reviewing source code for security vulnerabilities; its slow, tedious, and mind-numbingly boring. Yet, code review is a critical component of shipping secure software to customers. Neglecting it isn't an option},
Doi = {10.1109/MSP.2006.84},
File = {:home/moose/GitHub/informatik-2011/Paper/sicherheit-kog-autos/a-process-for-performing-security-code-reviews.pdf:PDF},
ISSN = {1540-7993},
Keywords = {program debugging;program diagnostics;security of data;security code reviews;security vulnerabilities;Computer bugs;Computer security;Data analysis;Data security;History;Java;Performance analysis;Privacy;Software tools;Wildlife;code review;secure code;security vulnerabilities},
Owner = {Martin Thoma},
Timestamp = {2015.06.29}
}
@Patent{Hwang1997,
Title = {Wireless car security system},
Nationality = {United States},
Year = {1997},
Author = {Hwang, S.M.},
Month = jul,
Note = {US Patent 5,648,754},
Url = {https://www.google.com/patents/US5648754},
Owner = {Martin Thoma},
Publisher = {Google Patents},
Timestamp = {2015.06.19}
}
@Misc{SAE2004,
Title = {Recommended Practice for Pass-Thru Vehicle Programming},
Author = {SAE International},
Month = dec,
Year = {2004},
Institution = {Vehicle E E System Diagnostic Standards Committee},
Organization = {SAE International},
Owner = {Martin Thoma},
Timestamp = {2015.06.29},
Url = {http://standards.sae.org/j2534/1_200412/}
}
@Misc{Jones2015,
Title = {{BMW} Fixes Software Flaw That Would<6C>ve Let Hackers Unlock Doors},
Author = {Willie Jones},
Month = feb,
Year = {2015},
Owner = {Martin Thoma},
Timestamp = {2015.06.19},
Url = {http://spectrum.ieee.org/cars-that-think/transportation/systems/bmw-fixes-vehicle-software-flaw-that-wouldve-let-hackers-in}
}
@Book{Metasploit2012,
Title = {Metasploit},
Author = {David Kennedy},
Publisher = {mitp Professional},
Year = {2012},
Owner = {Martin Thoma},
Timestamp = {2015.06.04}
}
@TechReport{Kiencke1986,
Title = {Automotive Serial Controller Area Network},
Author = {Uwe Kiencke AND Siegfried Dais AND Martin Litschel},
Institution = {Robert Bosch GmbH},
Year = {1986},
Month = feb,
Abstract = {A high speed serial communication link has been developed for interconnecting electronic control units within automobiles. The incorporation of object oriented communication in conjunction with acceptance filtering introduces a new level of message handling efficiency and flexibility. Powerful error handling techniques guarantee safe operation in noisy automotive environments.},
Doi = {10.4271/860391},
Owner = {Martin Thoma},
Timestamp = {2015.06.01},
Url = {http://papers.sae.org/860391/}
}
@InProceedings{Koscher2010,
Title = {Experimental Security Analysis of a Modern Automobile},
Author = {Koscher, Karl and Czeskis, Alexei and Roesner, Franziska and Patel, Shwetak and Kohno, Tadayoshi and Checkoway, Stephen and McCoy, Damon and Kantor, Brian and Anderson, Danny and Shacham, Hovav and Savage, Stefan},
Booktitle = {Proceedings of the 2010 IEEE Symposium on Security and Privacy},
Year = {2010},
Address = {Washington, DC, USA},
Pages = {447--462},
Publisher = {IEEE Computer Society},
Series = {SP '10},
Acmid = {1849990},
Doi = {10.1109/SP.2010.34},
File = {:/home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/cars-oakland2010.pdf:PDF},
ISBN = {978-0-7695-4035-1},
Keywords = {Automobiles, communication standards, communication system security, computer security, data buses},
Numpages = {16},
Owner = {Martin Thoma},
Timestamp = {2015.04.24},
Url = {http://dx.doi.org/10.1109/SP.2010.34}
}
@Misc{Lee2014,
Title = {Keyless cars 'increasingly targeted by thieves using computers'},
Author = {Dave Lee},
Month = oct,
Year = {2014},
Owner = {Martin Thoma},
Timestamp = {2015.06.15},
Url = {http://www.bbc.com/news/technology-29786320}
}
@Article{Leen2002,
Title = {Expanding automotive electronic systems},
Author = {Leen, G. and Heffernan, D.},
Journal = {Computer},
Year = {2002},
Month = jan,
Number = {1},
Pages = {88-93},
Volume = {35},
Abstract = {A vast increase in automotive electronic systems, coupled with related demands on power and design, has created an array of new engineering opportunities and challenges. Today's high-end vehicles may have more than 4 kilometers of wiring, compared to 45 meters in vehicles manufactured in 1955. Reducing wiring mass through in-vehicle networks will bring an explosion of new functionality and innovation. Our vehicles will become more like PCs, creating the potential for a host of plug-and-play devices. On average, US commuters spend 9 percent of their day in an automobile. Thus, introducing multimedia and telematics to vehicles will increase productivity and provide entertainment for millions. Further, X-by-wire solutions will make computer diagnostics a standard part of mechanics' work and may even create an electronic chauffeur},
Doi = {10.1109/2.976923},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/Expanding-Automotive-Electronic-Systems.pdf:PDF},
ISSN = {0018-9162},
Keywords = {automobiles;automotive electronics;controller area networks;entertainment;multimedia systems;traffic engineering computing;PCs;US commuters;X-by-wire solutions;automobile;automotive electronic systems;computer diagnostics;electronic chauffeur;engineering opportunities;entertainment;high-end vehicles;in-vehicle networks;multimedia;plug-and-play devices;productivity;telematics;wiring mass;Automobile manufacture;Automotive electronics;Automotive engineering;Design engineering;Explosions;Personal communication networks;Power engineering and energy;Technological innovation;Vehicles;Wiring},
Owner = {Martin Thoma},
Timestamp = {2015.06.19},
Url = {http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=976923}
}
@InProceedings{Li2008,
Title = {A design for automotive CAN bus monitoring system},
Author = {Renjun Li and Chu Liu and Feng Luo},
Booktitle = {Vehicle Power and Propulsion Conference, 2008. VPPC '08. IEEE},
Year = {2008},
Month = sep,
Pages = {1-5},
Abstract = {This system is designed to test automotive CAN (controller area network) controlled devices or entire network. This system not only can display CAN frames (CAN 2.0A/B) received from or sent onto CAN bus, but also can record data on log files for off-line evaluation. Users can configure several monitoring modes and CAN channel features of the system with PC application. Furthermore the USB technology adopted in the system make it a more practical and convenient CAN bus testing system.},
Doi = {10.1109/VPPC.2008.4677544},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/04677544.pdf:PDF},
Keywords = {automotive electronics;controller area networks;field buses;protocols;CAN bus testing system;PC application;USB technology;automotive CAN bus monitoring system;controller area network;off-line evaluation;serial bus communication protocol;Automotive engineering;Control systems;Educational institutions;Filters;Monitoring;Propulsion;Smart cards;Space vehicles;System testing;Universal Serial Bus;CAN Bus;Monitoring System;USB},
Owner = {Martin Thoma},
Timestamp = {2015.06.01}
}
@Misc{Mahaffey2015,
Title = {Hacking a {Tesla} Model S: What we found and what we learned},
Author = {Kevin Mahaffey},
Month = aug,
Year = {2015},
Owner = {Martin Thoma},
Timestamp = {2015.09.03},
Url = {https://blog.lookout.com/blog/2015/08/07/hacking-a-tesla/}
}
@Article{McGraw2008,
Title = {Automated Code Review Tools for Security},
Author = {McGraw, G.},
Journal = {Computer},
Year = {2008},
Month = dec,
Number = {12},
Pages = {108-111},
Volume = {41},
__markedentry = {[Martin Thoma:6]},
Abstract = {Computer security has experienced important fundamental changes over the past decade. The most promising developments in security involve arming software developers and architects with the knowledge and tools they need to build more secure software. Among the many security tools available to software practitioners, static analysis tools for automated code review are the most effective. The paper presents how they work and why all developers should use them.},
Doi = {10.1109/MC.2008.514},
File = {:home/moose/GitHub/informatik-2011/Paper/sicherheit-kog-autos/automated-code-review-tools-for-security.pdf:PDF},
ISSN = {0018-9162},
Keywords = {program diagnostics;security of data;automated code review tools;computer security;secure software;software architects;software developers;static analysis tools;Application software;Best practices;Computer hacking;Computer security;IP networks;Instruments;Local area networks;Programming profession;Risk analysis;Software tools;code review;how things work;software development;software security;static analysis tools},
Language = German,
Owner = {Martin Thoma},
Timestamp = {2015.06.29}
}
@Misc{Mixter,
Title = {Writing buffer overflow exploits - a tutorial for beginners},
Author = {Mixter},
Url = {http://www.eecis.udel.edu/~bmiller/cis459/2007s/readings/buff-overflow.html}
}
@Misc{Nol2012,
Title = {Car thieves can steal motors in just 10 seconds - six times faster than a decade ago (and black Audis are their favourite)},
Author = {Steve Nolan},
Month = oct,
Year = {2012},
Abstract = {And Black Audis are top of car thieves<65> shopping lists with 150,000 cars are stolen each year and two thirds of these taken with their keys.
...},
Owner = {Martin Thoma},
Timestamp = {2015.06.15},
Url = {http://www.dailymail.co.uk/news/article-2223414/Car-thieves-steal-motors-just-10-seconds--times-faster-decade-ago-black-Audis-favourite.html}
}
@InProceedings{Obermaisser2008,
Title = {Temporal and Spatial Partitioning of a Time-Triggered Operating System Based on Real-Time Linux},
Author = {Obermaisser, R. and Leiner, B.},
Booktitle = {Object Oriented Real-Time Distributed Computing (ISORC), 2008 11th IEEE International Symposium on},
Year = {2008},
Month = may,
Pages = {429-435},
Abstract = {Real-time Linux variants are becoming prominent solutions for the development of embedded systems. Compared to traditional real-time operating systems, embedded system engineers can leverage solutions and knowhow from the Linux development community (e.g., development tools, applications, drivers). Due to the availability of implementations of Internet protocols and network drivers, Linux also facilitates the implementation of embedded systems connected to the Internet. The goal of this paper is to evaluate experimentally the capabilities of the Real-time Linux variant RTAI/LXRT with respect to partitioning between different application software modules. Partitioning ensures that a failure caused by a design fault in one application software module cannot propagate to cause a failure in other application software modules, e.g., by blocking access to the CPU or by overwriting memory. Partitioning is important when building mixed-criticality systems comprising both non safety-critical software modules and safety-related ones. Even at the same level of criticality, partitioning improves the robustness of an embedded system. The experimental results described in this paper point out several limitations of RTAI/LXRT Linux concerning fault isolation. Based on these results, we propose modifications to improve the partitioning with respect to temporal and spatial interference.},
Doi = {10.1109/ISORC.2008.10},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/temporal-and-spatial-partitioning-of-a-time-triggered-operating-system-based-on-real-time-linux.pdf:PDF},
Keywords = {Linux;operating systems (computers);safety-critical software;real-time Linux;real-time abstraction interface;safety-critical software module;spatial partitioning;temporal partitioning;time-triggered operating system;Application software;Buildings;Embedded system;IP networks;Linux;Operating systems;Protocols;Real time systems;Software safety;Systems engineering and theory;fault-tolerance;operating systems;partitioning;real-time systems},
Owner = {Martin Thoma},
Timestamp = {2015.06.19}
}
@Misc{Poulsen2010,
Title = {Hacker Disables More Than 100 Cars Remotely},
Author = {Kevin Poulsen},
Month = mar,
Year = {2010},
Owner = {Martin Thoma},
Timestamp = {2015.09.03},
Url = {http://www.wired.com/2010/03/hacker-bricks-cars/}
}
@Misc{Rojas2014,
Title = {Der Hacker als Chauffeur},
Author = {Ra<EFBFBD>l Rojas},
Month = dec,
Year = {2014},
Abstract = {(Wolfgang Wiewesiek, "Secure Hardware Extension", Workshop on Cryptography and Embedded Security, N<>rnberg, 2012},
Owner = {Martin Thoma},
Timestamp = {2015.06.15},
Url = {http://www.heise.de/tp/artikel/43/43544/1.html}
}
@InProceedings{Rouf2010,
Title = {Security and Privacy Vulnerabilities of In-car Wireless Networks: A Tire Pressure Monitoring System Case Study},
Author = {Rouf, Ishtiaq AND Miller, Rob AND Mustafa, Hossen AND Taylor, Travis AND Oh, Sangho AND Xu, Wenyuan AND Gruteser, Marco AND Trappe, Wade AND Seskar, Ivan},
Booktitle = {Proceedings of the 19th USENIX Conference on Security},
Year = {2010},
Address = {Berkeley, CA, USA},
Pages = {21--21},
Publisher = {USENIX Association},
Series = {USENIX Security'10},
Acmid = {1929848},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/security-and-privacy-vulnerabilities-of-in-car-wireless-networks-a-tire-pressure-monitoring-system-case-study2010-002-tpms.pdf:PDF},
ISBN = {888-7-6666-5555-4},
Location = {Washington, DC},
Numpages = {1},
Owner = {Martin Thoma},
Review = {* eavesdropping is easily possible at a distance of roughly 40m from a passing vehicle
* Further, current protocols do not employ authentication and vehicle implementations do not perform basic input validation, thereby allowing for remote spoofing of sensor messages.
* The wide deployment of TPMSs in the United States is an outgrowth of the TREAD Act [35] resulting from the Ford-Firestone tire failure controversy [17].
* [...] These benefits have recently led to similar legislation in the European Union [7] which mandates TPMSs on all new vehicles starting in 2012.
* Spoofing (low pressure warning!) / Jamming / Reading / Vehicle identificaion is possible
* Temporary IDs could be used},
Timestamp = {2015.05.15},
Url = {http://dl.acm.org/citation.cfm?id=1929820.1929848}
}
@Book{Sambleben2012,
Title = {Informationstechnologie und Sicherheitspolitik: Wird der dritte Weltkrieg im Internet ausgetragen?},
Author = {Sambleben, J. AND Schumacher, S.},
Publisher = {Books on Demand},
Year = {2012},
ISBN = {9783848232703},
Owner = {Martin Thoma},
Timestamp = {2015.06.04},
Url = {https://books.google.de/books?id=ZFOR4lELZ40C}
}
@Book{ServerSecurity2008,
Title = {Guide to general server security},
Author = {Karen Scarfone AND Wayne Jansen AND Miles Tracy},
Publisher = {U.S. Dept. of Commerce, National Institute of Standards and Technology},
Year = {2008},
Owner = {Martin Thoma},
Timestamp = {2015.06.11},
Url = {http://csrc.nist.gov/publications/nistpubs/800-123/SP800-123.pdf}
}
@Patent{Seibold1988,
Title = {Security system and method for electronic apparatus, particularly car radios or similar automotive audio equipment},
Nationality = {United States},
Number = {US4720700 A},
Year = {1988},
Yearfiled = {1986},
Author = {Seibold, P. and Strauss, K.P.},
Month = jan # {~19},
Note = {US Patent 4,720,700},
Url = {https://www.google.com/patents/US4720700},
Owner = {Martin Thoma},
Publisher = {Google Patents},
Timestamp = {2015.06.19}
}
@Misc{Seltzer2013,
Title = {The {Morris} Worm: Internet malware turns 25},
Author = {Larry Seltzer},
Month = nov,
Year = {2013},
Owner = {Martin Thoma},
Timestamp = {2015.09.04},
Url = {http://www.zdnet.com/article/the-morris-worm-internet-malware-turns-25/}
}
@Book{Silberschatz2005,
Title = {Operating System Concepts},
Author = {Abraham Silberschatz AND Peter Baer Galvin AND Greg Gagne},
Editor = {7},
Publisher = {John Wiley \& Sons. Inc},
Year = {2005},
Owner = {Martin Thoma},
Timestamp = {2015.09.05}
}
@InProceedings{Song2008,
Title = {SVATS: A Sensor-Network-Based Vehicle Anti-Theft System},
Author = {Hui Song and Sencun Zhu and Guohong Cao},
Booktitle = {INFOCOM 2008. The 27th Conference on Computer Communications. IEEE},
Year = {2008},
Month = apr,
Pages = {-},
Abstract = {Today vehicle theft rate is very high, thus tracking/alarming systems are being deployed with an increasingly popularity. These systems however bear some limitations such as high cost, high false-alarm rate, and easy to be disabled. This paper describes the design, implementation and evaluation of a Sensor-network-based Vehicle Anti-Theft System (SVATS) to address these limitations. In this system, the sensors in the vehicles that are parked within the same parking area first form a sensor network, then monitor and identify possible vehicle thefts by detecting unauthorized vehicle movement. When an unauthorized movement is detected, an alert will be reported to a base station in the parking area, which sends warning messages to the security office. This paper focuses on the technical issues specific to the system such as topology management, theft detection, and intra-vehicle networking.},
Doi = {10.1109/INFOCOM.2008.279},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/svats-a-sensor-network-based-vehicle-anti-theft-system.pdf:PDF},
ISSN = {0743-166X},
Keywords = {alarm systems;road vehicles;traffic engineering computing;wireless sensor networks;alarming system;base station;false-alarm rate;intra-vehicle networking;sensor-network-based vehicle anti-theft system;topology management;tracking system;unauthorized vehicle movement detection;vehicle theft rate;Alarm systems;Base stations;Broadcasting;Communications Society;Computer science;Costs;Global Positioning System;Monitoring;Sensor systems;Vehicle detection},
Owner = {Martin Thoma},
Timestamp = {2015.06.19}
}
@Misc{Spaar2015,
Title = {{Auto, \"offne dich! Sicherheitsl\"ucken bei {BMWs} ConnectedDrive}},
Author = {Dieter Spaar},
Year = {2015},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/ct-bmw-hack.pdf:PDF},
Journal = {c't},
Owner = {Martin Thoma},
Timestamp = {2015.05.15},
Url = {http://www.heise.de/newsticker/meldung/ConnectedDrive-Der-BMW-Hack-im-Detail-2540786.html}
}
@Misc{Stevens2015,
Title = {{GM} issues fix for {OnStar} hack},
Author = {Tim Stevens},
Month = jul,
Year = {2015},
Owner = {Martin Thoma},
Timestamp = {2015.09.03},
Url = {http://www.cnet.com/news/ownstar-onstar-hack/}
}
@TechReport{Stumpf2013,
Title = {CycurHSM - An Automotive-qualified Software Stack for Hardware Security Modules},
Author = {Frederic Stumpf},
Institution = {escrypt GmbH},
Year = {2013},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/CycurHSM-Whitepaper.pdf:PDF},
Owner = {Martin Thoma},
Timestamp = {2015.05.15},
Url = {https://www.escrypt.com/fileadmin/escrypt/pdf/CycurHSM-Whitepaper.pdf}
}
@InProceedings{Syverson1994,
Title = {A taxonomy of replay attacks [cryptographic protocols]},
Author = {Syverson, P.},
Booktitle = {Computer Security Foundations Workshop VII, 1994. CSFW 7. Proceedings},
Year = {1994},
Month = jun,
Pages = {187-191},
Abstract = {This paper presents a taxonomy of replay attacks on cryptographic protocols in terms of message origin and destination. The taxonomy is independent of any method used to analyze or prevent such attacks. It is also complete in the sense that any replay attack is composed entirely of elements classified by the taxonomy. The classification of attacks is illustrated using both new and previously known attacks on protocols. The taxonomy is also used to discuss the appropriateness of particular countermeasures and protocol analysis methods to particular kinds of replays},
Doi = {10.1109/CSFW.1994.315935},
ISSN = {1063-6900},
Keywords = {cryptography;protocols;cryptographic protocols;message origin;replay attacks;taxonomy;Authorization;Cryptographic protocols;Cryptography;Laboratories;Security;Taxonomy}
}
@Patent{Turner1999,
Title = {Automotive vehicle anti-theft and anti-vandalism and anti-carjacking system},
Nationality = {United States},
Number = {US6002326 A},
Year = {1999},
Yearfiled = {1997},
Author = {Turner, V.J.},
Month = dec # {~14},
Note = {US Patent 6,002,326},
Url = {https://www.google.com/patents/US6002326},
Owner = {Martin Thoma},
Publisher = {Google Patents},
Timestamp = {2015.06.19}
}
@InProceedings{Verdult2015,
Title = {Dismantling Megamos Crypto: Wirelessly Lockpicking a Vehicle Immobilizer},
Author = {Roel Verdult and Flavio D. Garcia and Baris Ege},
Booktitle = {Supplement to the 22nd USENIX Security Symposium (USENIX Security 13)},
Year = {2015},
Address = {Washington, D.C.},
Pages = {703--718},
Publisher = {USENIX Association},
ISBN = {978-1-931971-232},
Url = {https://www.usenix.org/conference/usenixsecurity15/technical-sessions/presentation/verdult}
}
@Article{Wolf2004,
Title = {Sicherheit in automobilen Bussystemen},
Author = {Marko Wolf AND Andr{\'e} Weimerskirch AND Christof Paar},
Journal = {Automotive - Safety \& Security},
Year = {2004},
Month = oct,
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/WolfEtAl_SicherheitAutomobileBussysteme.pdf:PDF},
Owner = {Martin Thoma},
Timestamp = {2015.06.15},
Url = {http://www.weimerskirch.org/papers/WolfEtAl_SicherheitAutomobileBussysteme.pdf}
}
@Misc{Dailymail2014,
Title = {Forget carjacking, the next big threat is car-HACKING: Thousands of vehicles are being stolen using cheap gadgets bought online},
Author = {Victoria Woollaston},
Month = may,
Year = {2014},
Abstract = {... According to the MPS, 21,000 cars were stolen last year, and a further 68,000 were broken into. ...},
Owner = {Martin Thoma},
Timestamp = {2015.06.15},
Url = {http://www.dailymail.co.uk/sciencetech/article-2623275/Forget-carjacking-big-threat-car-HACKING-Thousands-vehicles-stolen-using-cheap-gadgets-bought-online.html}
}
@Article{Wright2011,
Title = {Hacking Cars},
Author = {Wright, Alex},
Journal = {Commun. ACM},
Year = {2011},
Month = nov,
Number = {11},
Pages = {18--19},
Volume = {54},
Acmid = {2018403},
Address = {New York, NY, USA},
Doi = {10.1145/2018396.2018403},
File = {:home/moose/GitHub/informatik-2011/Master/Wahlfach/Seminar-Kongitive-Automobile/hacking-cars-p18-wright.pdf:PDF},
ISSN = {0001-0782},
Issue_date = {November 2011},
Numpages = {2},
Owner = {Martin Thoma},
Publisher = {ACM},
Review = {"Ever since Toyota's well-publicized
struggles with the computerized brak-
ing systems in its 2010 Prius hybrid
cars, automotive computer systems
have come under increasing scrutiny."
See http://edition.cnn.com/2010/WORLD/asiapcf/02/04/japan.prius.complaints/ - Probleme mit ABS / delay of break
"At the University of South Carolina,
assistant professor Wenyuan Xu dis-
covered that she could track the move-
ment of cars by tapping into the RFID
data stored in modern tire pressure
monitoring systems from up to a dis-
tance of 40 meters."
Kevin
Finisterre of security consultancy Dig-
ital Munition - police cars
Embedded Vehicle Safety Committee},
Timestamp = {2015.05.15},
Url = {http://doi.acm.org/10.1145/2018396.2018403}
}
@Misc{AirbiquityFord,
Title = {Airbiquity link highlights {Ford}'s telematics strategy},
Year = {2008},
Owner = {Martin Thoma},
Timestamp = {2015.06.29},
Url = {http://www.sae.org/automag/technewsletter/080506Tech/07.htm}
}
@Misc{AirbiquityBMW,
Title = {Airbiquity Signs Telematics Deal With {BMW}},
Month = oct,
Year = {2006},
Owner = {Martin Thoma},
Timestamp = {2015.06.29},
Url = {http://www.airbiquity.com/news/press-releases/airbiquity-signs-telematics-deal-bmw/}
}