H. Schweppe and Y. Roudier, Security and privacy for in-vehicle networks, 2012 IEEE 1st International Workshop on Vehicular Communications, Sensing, and Computing (VCSC), 2012.
DOI : 10.1109/VCSC.2012.6281235

H. Schweppe, B. Weyl, Y. Roudier, M. Idrees, T. Gendrullis et al., Securing car2X applications with effective hardware-software co-design for vehicular on-board networks, 27 th VDI Conference on Automotive Security, pp.45-57, 2011.

H. Schweppe, Y. Roudier, B. Weyl, L. Apvrille, and D. Scheuermann, Car2X communication: Securing the last meter, WIVEC 2011, 4 th IEEE International Symposium on Wireless Vehicular Communications, pp.5-6, 2011.

M. Idrees, H. Schweppe, Y. Roudier, M. Wolf, D. Scheuermann et al., Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates, Nets4Cars, 3 rd International Workshop on Communication Technologies for Vehicles appeared in Springer LNCS 6596, pp.22-24, 2011.
DOI : 10.1007/978-3-642-19786-4_20

L. Apvrille, R. Khayari, O. Henniger, Y. Roudier, H. Schweppe et al., Secure automotive on-board electronics network architecture, FISITA 2010, 32 nd World Automotive Congress, p.30

H. Schweppe, A. Zimmermann, and D. Grill, Flexible On-Board Stream Processing for Automotive Sensor Data, IEEE Transactions on Industrial Informatics, vol.6, issue.1, pp.81-92, 1109.
DOI : 10.1109/TII.2009.2037145

H. Schweppe, Securing Car2X Applications with effective Hardware- Software Co-Design for Vehicular On-Board Networks " , invited talk at Volkswagen AutoUni, 2011.

H. Schweppe, The EVITA project " , Posters and Vehicle Demonstrator at 5 th Car2Car CC Forum, pp.24-25, 2011.

H. Schweppe, Secure on-board protocols " , Presentation at Final EVITA Workshop on Security of Automotive On-Board Networks, 2011.

B. Weyl and H. Schweppe, The EVITA project: securing the networked vehicle " , invited Keynote Presentation at 9 th escar conference on embedded security in cars (escar), pp.9-10, 2011.

H. Schweppe, EVITA: Secure On-Board Protocols, Press Workshop, Posters and Vehicle Demonstrator, 2011.

:. G. Presented-for, S. Pedroza, L. Idrees, Y. Apvrille, and . Roudier, A formal methodology applied to secure over-the-air automotive applications, VTC-Fall2011, IEEE 74 th Vehicular Technology Conference -VTC Fall 2011, pp.5-8, 2011.

H. Schweppe, Security Requirements for Intersection Collision Warning " , Workshop Presentation at 4 th Car2Car CC Forum, 2010.

H. Schweppe, The EVITA project, an overview " , Poster at 4 th Car2Car CC Forum, 2010.

H. Schweppe, Secure on-board protocols " , CAST-Workshop on Mobile Security for Intelligent Cars, Presentation and Short Paper, 2010.

H. Schweppe and Y. Roudier, Security issues in vehicular systems: threats emerging solutions and standards, th Conference Conference on Security in Network Architectures and Information Systems, State of the Art Presentation and Short Paper, pp.18-21, 2010.

D. Upnp, /. Av, and . Eurecom, Guest lecture as part of Y. Roudier's course " Distributed Systems and Middleware, 2012.

E. and R. Sinha, Student semester project Distributed and Embedded Intrusion Detection for Automotive Systems, 2009.

E. , R. Gross, and J. Zaddach, Student semester project Security Middleware for Automotive Embedded Systems, 2010.

E. and N. Qi, Student semester project Simulating In-Vehicular Networking on the CAN bus co-supervised with Jérôme Härri. Security and Privacy in Automotive On-Board Networks Bibliography [AEKH + 10] Ludovic Apvrille, Secure automotive on-board electronics network architecture , FISITA'10, World Automotive Congress, p.2010, 2010.

A. Apvrille, W. Muhammad, R. Ameur-boulifa, S. Coudert, and R. Pacalet, A UML-based environment for system design space exploration, ICECS '06, 13th IEEE International Conference on Electronics, Circuits and Systems, pp.1272-1275, 2006.

A. Anderson, Why information security is hard -an economic perspective, Seventeenth Annual Computer Security Applications Conference, IEEE, vol.138, pp.358-365, 2002.

[. Albert, G. Puebla, and M. Hermenegildo, Abstraction-Carrying Code: a Model for Mobile Code Safety, New Generation Computing, vol.21, issue.3, pp.171-204, 2008.
DOI : 10.1007/s00354-008-0039-7

[. Autosar, Specification of crypto abstraction library v1.2.0 r4.0 rev. 3 , online, pp.2011-2029

A. Barisani and D. Bianco, Hijacking RDS-TMC traffic information signals, The Phrack Magazine, 2007.

[. Bunzel, . Fürst, F. Wagenhuber, and . Stappert, Safety and security related features in AUTOSAR, Automotive -Safety & Security, pp.134-135, 2010.

[. Bayer, A. Moser, C. Kruegel, and E. Kirda, Dynamic Analysis of Malicious Code, Journal in Computer Virology, vol.2, issue.1, pp.67-77, 2006.
DOI : 10.1007/s11416-006-0012-2

[. Bruckmeier, Ethernet for Automotive Applications, Freescale Technology Forum, vol.115, issue.159, pp.1-20, 2010.

N. Bißmeyer, H. Stübing, M. M. , P. Stotz, J. Schütte et al., simTD Security Architecture: Deployment of a Security and Privacy Architecture in Field Operational Tests, 7th ESCAR Embedded Security in Cars Conference, p.15, 2009.

J. Croft and M. Caesar, Towards Practical Avoidance of Information Leakage in Enterprise Networks, p.2011

G. Coker, J. Guttman, P. Loscocco, A. Herzog, J. Millen et al., Principles of remote attestation, 10th International Conference on Information and Communications Security, pp.63-81, 2011.
DOI : 10.1007/s10207-011-0124-7

[. Cheng, Information Flow for Secure Distributed Applications, pp.28-94, 2009.

D. By-anton-cervin, B. Henriksson, and . Lincoln, Johan Eker, and Karl-erikÅerikÅ rzén, Analysis and Simulation of Timing, IEEE Control Systems Magazine, pp.16-30, 2003.

D. Canali, A. Lanzi, D. Balzarotti, C. Kruegel, M. Christodorescu et al., A quantitative study of accuracy in system call-based malware detection categories and subject descriptors, Proceedings of the 2012 International Symposium on Software Testing and Analysis (ACM ISSTA 2012), 2012.

[. Clause, W. Li, and A. Orso, Dytan, Proceedings of the 2007 international symposium on Software testing and analysis, ISSTA '07, pp.196-206, 2007.
DOI : 10.1145/1273463.1273490

S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham et al., Comprehensive experimental analyses of automotive attack surfaces, Proceedings of the 20th USENIX conference on Security, pp.43-75, 2011.

M. Leon-chavez, C. Hernandez-rosete, and F. R. Henriquez, Achieving confidentiality security service for can, Proceedings of the 15th International Conference on Electronics CONIELECOMP '05, pp.166-170, 2005.

[. Dworkin, Cipher modes of operation; the cmac mode for authentication., NIST Special Publication 800-38b. National Institute of Standards and Technology (NIST), 2005.

T. Eymann, M. Busse, and D. Deliverable, 2-12 Security and Firewall concepts for gateways, p.14, 2006.

W. Enck, P. Gilbert, L. P. Byuong-gon-chun, L. Cox, P. Jung et al., Taint- Droid: An information-flow tracking system for realtime pri- Security and Privacy in Automotive On-Board Networks 200 BIBLIOGRAPHY vacy monitoring on smartphones, Operating Systems Design and Implementation, pp.24-29, 2010.

[. Egele, C. Kruegel, E. Kirda, and G. Vigna, PiOS: Detecting privacy leaks in iOS applications The Internet Society, Network and Distributed System Security Symposium (NDSS), 2011.

T. Eisenbarth, T. Kasper, A. Moradi, C. Paar, M. Salmasizadeh et al., On the Power of Power Analysis in the Real World: A Complete Break of the KeeLoq Code Hopping Scheme, 2008.
DOI : 10.1007/978-3-540-85174-5_12

A. Ermolinskiy, S. Katti, S. Shenker, L. Lisa, M. Fowler et al., Towards practical taint tracking, p.84, 2010.

B. [. Ellison and . Schneier, Ten risks of PKI: What you're not being told about public key infrastructure, Computer Security Journal, vol.16, issue.1, pp.1-7, 2000.

[. Egele, T. Scholte, E. Kirda, and C. Kruegel, A survey on automated dynamic malware-analysis techniques and tools, ACM Computing Surveys, vol.44, issue.2, pp.1-6, 2008.
DOI : 10.1145/2089125.2089126

B. [. Francillon, S. Danev, and . Capkun, Relay Attacks on Passive Keyless Entry and Start Systems in Modern Cars, 18th Annual Network & Distributed System Security Symposium, Cryptology ePrint Archive, 2010.

A. Festag, H. Füßler, H. Hartenstein, A. Sarma, and R. Schmitz, Fleetnet: Bringing car-to-car communication into the real world, Proceedings of 11th World Congress on ITS, pp.14-129, 2004.

D. Fpc09-]-aurélien-francillon, C. Perito, and . Castelluccia, Defending embedded systems against control flow attacks, Proceedings of the first ACM workshop on Secure execution of untrusted code, SecuCode '09, pp.19-26, 2009.

[. Götz, G5A Automotive Security ? Lastanforderung an die Kryptoeinheit, VDI 27. Gemeinschaftstagung on Automotive Security, pp.71-80, 2011.

[. Guo, J. Baugh, and S. Wang, A Group Signature Based Secure and Privacy-Preserving Vehicular Communication Framework, 2007 Mobile Networking for Vehicular Environments, pp.103-108, 2007.
DOI : 10.1109/MOVE.2007.4300813

M. Gerlach, A. Festag, T. Leinmüller, G. Goldacker, and C. Harsch, Security architecture for vehicular communication, Fourth International Workshop on Intelligent Transportation (WIT2007), pp.73-125, 2007.

G. Gupta, N. Gupta, X. Zhang, D. Jeffrey, V. Nagarajan et al., Scalable dynamic information flow tracking and its applications, Parallel and Distributed Processing, IEEE International Symposium on, pp.14-18, 2008.

G. Glass, D. Herrscher, H. Meier, M. Plastowski, and P. Schoo, SEIS -security in embedded ip-based systems, ATZ elektronik worldwide 1, pp.36-115, 2010.

C. Holle, M. Ruland, and . Wolf, Thomas Wollinger, and Frank Zweers, OVERSEE a secure and open communication and runtime platform for innovative automotive applications , 7th ESCAR Embedded Security in Cars Conference, GHR + 09] André Groll, p.15, 2009.

[. Gollmann, Computer security, Wiley Interdisciplinary Reviews: Computational Statistics, vol.3, issue.5, pp.544-554, 2010.
DOI : 10.1002/wics.106

URL : https://hal.archives-ouvertes.fr/hal-00587185

C. [. Groll and . Ruland, Secure and authentic communication on existing in-vehicle networks, Intelligent Vehicles Symposium, IEEE, vol.73, issue.133, pp.1093-1097, 2009.

[. Hartkopp, Programmierschnittstellen für eingebettete Netzwerke in Mehrbenutzerbetriebssystemen am Beispiel des Controller Area Network, p.238, 2011.

[. Hofmeyr, S. Forrest, and A. Somayaji, Intrusion detection using sequences of system calls, Journal of Computer Security, vol.6, issue.3, pp.151-180, 1998.
DOI : 10.3233/JCS-980109

A. Hergenhan and G. Heiser, Operating systems technology for converged ECUs, 6th Embedded Security in Cars Conference (escar), 2008.

[. Higgins, Smartphone Weather App Builds A Mobile Botnet, Dark Reading, 2010.

. His and . Security, She: Secure hardware extension version 1, 2009.

H. Hoppe, S. Kiltz, and J. Dittmann, Adaptive Dynamic Reaction to Automotive IT Security Incidents Using Multimedia Car Environment, 2008 The Fourth International Conference on Information Assurance and Security, pp.295-298, 2008.
DOI : 10.1109/IAS.2008.45

[. Hu, P. Kenneth, and . Laberteaux, Strong VANET Security on a Shoestring, escar, pp.1-9, 2006.

[. Van-herrewege, D. Singelee, I. Verbauwhede, and C. Simple, Backward Compatible Broadcast Authentication Protocol for CAN bus, escar 2011, embedded security in cars, pp.15-74, 2011.

[. Is, (E) ? Road vehicles ? Diagnostic systems ? Keyword Protocol, TC International Organization for Standardization, vol.22, issue.3, p.2000, 2000.

S. Idrees, H. Schweppe, Y. Roudier, M. Wolf, D. Scheuermann et al., Secure Automotive On-Board Protocols: A Case of Over-the-Air Firmware Updates, Nets4Cars-2011 3rd International Workshop on Communication Technologies for Vehicles (Nets4Cars-2011) (Oberpfaffenhofen- Wessling, p.2011
DOI : 10.1007/978-3-642-19786-4_20

R. [. Isermann, S. Schwarz, and . Stolzl, Fault-tolerant drive-bywire systems, Control Systems Magazine, IEEE, vol.22, issue.128, pp.64-81, 2002.

[. Jacobi, VW opener and alarm deactivator , Multipick- Service tool 70470, manual online at www.multipick.com, 2012, p.79

M. Jones, EMI Challenge to Ethernet in the Car, EE Times Europe, vol.13, issue.159, pp.1-6, 2010.

L. [. Knorreck, R. Apvrille, and . Pacalet, Fast Simulation Techniques for Design Space Exploration, 47th International Conference Objects, pp.308-327, 2009.
DOI : 10.1109/TC.2006.16

H. Knechtel and M. Böhner, Herausforderung Sicheres Bordnetz (secunet AG and Elektrobit Automotive GmbH, VDI 27. Gemeinschaftstagung on Automotive Security, pp.59-70, 2011.

[. Kiriansky, D. Bruening, and S. P. Amarasinghe, Secure execution via program shepherding, USENIX Security Symposium (Dan Boneh USENIX, pp.191-206, 2002.

A. Koscher, F. Czeskis, S. Roesner, T. Patel, S. Kohno et al., Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy, pp.72-75, 2010.
DOI : 10.1109/SP.2010.34

H. Kannan, M. Dalton, and C. Kozyrakis, Decoupling Dynamic Information Flow Tracking with a dedicated coprocessor, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks, pp.105-114, 2009.
DOI : 10.1109/DSN.2009.5270347

. Kfl-+-09-]-e, M. Kelling, T. Friedewald, M. Leimbach, P. Menzel et al., Specification and evaluation of e-security relevant use cases, p.48, 2009.

O. Kömmerling and M. G. Kuhn, Design principles for tamper-resistant smartcard processors, pp.9-20, 1999.

. Kkb-+-06-]-e, C. Kirda, G. Kruegel, G. Banks, R. Vigna et al., Behavior-based Spyware Detection, Proceedings of the 15th USENIX Security Symposium, 2006.

[. Kim, A. D. Keromytis, M. Covington, and R. Sahita, Capturing information flow with concatenated dynamic taint analysis, ARES, IEEE Computer Society, pp.355-362, 2009.

T. [. Kleberger, E. Olovsson, and . Jonsson, Security aspects of the in-vehicle network in the connected car, 2011 IEEE Intelligent Vehicles Symposium (IV), pp.528-533, 2011.
DOI : 10.1109/IVS.2011.5940525

[. Kompfner, The ITS App Store, ITS International, Intertraffic Amsterdam (Amsterdam), Dailynews, pp.39-41, 2010.

F. Kargl, P. Papadimitratos, L. Buttyan, M. Müter, E. Schoch et al., Secure vehicular communication systems: implementation, performance, and research challenges, IEEE Communications Magazine, vol.46, issue.11, pp.110-118, 2008.
DOI : 10.1109/MCOM.2008.4689253

URL : http://arxiv.org/abs/0912.5393

P. Vasileios, G. Kermelis, K. Portokalidis, . Jee, and D. Angelos, Keromytis, libdft: Practical Dynamic Data Flow Tracking for Commodity Systems, pp.28-93

[. Krasner, Using Elliptic Curve Cryptography (ECC) for Enhanced Embedded Security, 2004.

A. Kung, Security architecture and mechanisms for V2V / V2I, p.14, 2008.

N. Lawson, Highway to hell: Hacking toll systems, Blackhat USA, 2008.

T. Leinmüller, L. Buttyan, J. Hubaux, F. Kargl, R. Kroh et al., SEVECOM -secure vehicle communication, Proceedings of IST Mobile Summit and 131.) Security and Privacy in Automotive On-Board Networks [LC06a] Lap Chung Lam and Tzi-cker Chiueh, A general dynamic information flow tracking framework for security applications, AC- SAC '06: Proceedings of the 22nd Annual Computer Security Applications Conference, pp.14-463, 2006.

R. Luk, R. Cohn, H. Muth, A. Patil, and . Klauser, Pin: building customized program analysis tools with dynamic instrumentation, ACM SIGPLAN, vol.106, issue.156, p.84, 2005.

[. Levy, Aleph One), Smashing the stack for fun and profit, The Phrack Magazine, 1996.

[. Lindlbauer, Towards a Secure Automotive Platform, 2009.

D. [. Larson, E. Nilsson, and . Jonsson, An approach to specification-based attack detection for in-vehicle networks, Intelligent Vehicles Symposium, pp.220-225, 2008.

[. Lutz, Renault debuts r-link, an in-dash android system with app market, engadget following press release by Renault at LeWeb'11, p.122, 2011.

M. Müter and N. Asaj, Entropy-based anomaly detection for in-vehicle networks, Intelligent Vehicles Symposium (IV), IEEE, pp.1110-1115, 2011.

A. Maier, Ethernet ? the standard for in-car communication , 2nd Workshop for Ethernet and IP at Automotive Technology Day (Regensburg), 2012.

[. Markoff, Google cars drive themselves in traffic, The New York Times, Science, Smarter Than You Think, 2010.

M. Müter and A. Groll, Attack detection for in-vehicle networks, VDI Conference on Automotive Security, p.95, 2009.

]. C. Mit03 and . Mitchell, Truncation attacks on macs, Electronics Letters, vol.39, issue.20, pp.1439-1440, 2003.

[. Macario, M. Torchiano, and M. Violante, An in-vehicle infotainment software architecture based on google android, 2009 IEEE International Symposium on Industrial Embedded Systems, pp.257-260, 2009.
DOI : 10.1109/SIES.2009.5196223

M. Mcclure, A. Weimerskirch, M. Wolf, C. Paar, W. Stephan et al., Caution: Malware Ahead. An analysis of emerging risks in automotive system security, p.15, 2011.

C. George and . Necula, Proof-carrying code, POPL '97: Proceedings of the 24th ACM SIGPLAN-SIGACT symposium on Principles of programming languages, pp.106-119, 1997.

. Nis12 and . Nissan, Nissan pioneers first-ever independent control steering technology, Press Release, p.11, 2012.

C. George, P. Necula, and . Lee, The design and implementation of a certifying compiler , SIGPLAN Not, Cited on page 23.) Security and Privacy in Automotive On-Board Networks 208 BIBLIOGRAPHY, pp.333-344, 1998.

D. K. Nilsson, U. E. Larson, and E. Jonsson, Efficient invehicle delayed data authentication based on compound message authentication codes, Vehicular Technology Conference (VTC Fall '08, pp.1-5, 2008.

D. K. Nilsson, U. E. Larson, F. Picasso, and E. Jonsson, A First Simulation of Attacks in the Automotive Network Communications Protocol FlexRay, Proceedings of the International Workshop on Computational Intelligence in Security for Information Systems CISIS'08 Advances in Soft Computing, pp.84-91, 2009.
DOI : 10.1007/978-3-540-88181-0_11

J. Newsome and D. X. Song, Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software, NDSS, The Internet Society, 2005.

. Obl-+-10-]-kaan, L. Onarlioglu, A. Bilge, D. Lanzi, E. Balzarotti et al., Defeating return-oriented programming through gadget-less binaries, 26th ACSAC, 2010.

H. Orman, The Morris worm: A fifteen-year perspective, IEEE Security & Privacy Magazine, vol.1, issue.5, pp.35-43, 2003.
DOI : 10.1109/MSECP.2003.1236233

]. Oguma, A. Yoshioka, M. Nishikawa, and R. Shigetomi, Akira Otsuka, and Hideki Imai, New Attestation Based Security Architecture for In-Vehicle Communication, Global Telecommunications Conference, IEEE GLOBECOM, vol.73, issue.133, pp.1-6, 2008.

. Pbh-+-08-]-p, L. Papadimitratos, T. Buttyan, E. Holczer, J. Schoch et al., Secure vehicular communication systems: design and architecture, IEEE Communications Magazine, vol.46, issue.129, pp.100-109, 2008.

T. Pgw-+-11-]-hagen-platzdasch, M. Gendrullis, C. Wolf, W. Fischer, H. Wiewesiek et al., security architecture implementation ? progress report, p.52, 2011.

A. Poschmann, G. Leander, K. Schramm, and C. Paar, New light-weight crypto algorithms for rfid , Circuits and Systems, ISCAS 2007. IEEE International Symposium on, pp.1843-1846, 2007.

. Pre14 and . Preserve, The PRESERVE project: Preparing secure vehicle-to-x communication systems, pp.2011-2014

[. Raya, Data-Centric Trust in Ephemeral Networks, pp.1-111, 2009.

M. Raya and J. Hubaux, The security of vehicular ad hoc networks, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks , SASN '05, pp.11-21, 2005.
DOI : 10.1145/1102219.1102223

[. Rieck and T. Berlin, Machine Learning for Application-Layer Intrusion Detection, 2009.

R. Rouf, H. Miller, T. Mustafa, S. Taylor, W. Oh et al., Wade Trappe, and Ivan Seskar, Security and privacy vulnerabilities of in-car wireless networks: a tire pressure monitoring system case study, Proceedings of the 19th USENIX conference on Security, pp.13-83, 2010.

[. Gmbh, CAN specification v2, 1991.

I. Roy, D. E. Porter, M. D. Bond, K. S. Mckinley, and E. Witchel, Laminar: practical fine-grained decentralized information flow control, Proceedings of the 2009 ACM SIGPLAN conference on Programming language design and implementation PLDI '09, pp.63-74, 2009.

[. Ravi, A. Raghunathan, P. Kocher, and S. Hattangady, Security in embedded systems, ACM Transactions on Embedded Computing Systems, vol.3, issue.3, pp.461-491, 2004.
DOI : 10.1145/1015047.1015049

A. Ruddle, D. Ward, B. Weyl, S. Idrees, Y. Roudier et al., Security requirements for automotive on-board networks based on dark-side scenarios, Tech, pp.47-71, 2009.

. Sev08 and . Sevecom, The SeVeCom project, p.14, 20062008.

S. H. Schweppe, Y. Idrees, B. Roudier, R. Weyl, O. Khayari et al., Secure on-board protocols specification, pp.49-150, 2010.

E. Schoch, F. Kargl, T. Leinmüller, S. Schlott, and P. Papadimitratos, Impact of Pseudonym Changes on Geographic Routing in VANETs, Proceedings of the Third European conference on Security and Privacy in Ad-Hoc and Sensor Networks ESAS'06, pp.43-57, 2006.
DOI : 10.1007/11964254_6

[. R. Slivka, C. R. Sekar, I. V. Ramakrishnan, S. A. Ramakrishnan, and . Smolka, Model-carrying code (mcc): a new paradigm for mobilecode security, NSPW '01: Proceedings of the 2001 workshop on New security paradigms, pp.23-30, 2001.

K. Scheibert and B. Steurich, Sichere mikroprozessorarchitekturen (infineon technologies ag, VDI 27. Gemeinschaftstagung on Automotive Security, pp.17-34, 2011.

R. Sekar, V. N. Venkatakrishnan, S. Basu, S. Bhatkar, and D. C. Duvarney, Model-carrying code: a practical approach for safe execution of untrusted applications, SOSP '03: Proceedings of the nineteenth ACM symposium on Operating systems principles, pp.15-28, 2003.

. Tis and . Tisa, Traveller Information Services Association The traffic message channel (TMC)

S. Thrun, M. Montemerlo, H. Dahlkamp, D. Stavens, A. Aron et al., The robot that won the darpa grand challenge: Research articles, J. Robot. Syst, vol.23, issue.9, pp.661-692, 2006.

[. Weyl and T. Darmstadt, On Interdomain Security: Trust Establishment in Loosely Coupled Federated Environments, p.260, 2008.

[. Wang, D. Feng, C. Lin, and W. Wu, Security of Truncated MACs, Lecture Notes in Computer Science, vol.5487, pp.96-114, 2008.
DOI : 10.1007/978-3-642-01440-6_10

[. Williams, Toyota to recall Prius hybrids over ABS software, Computerworld, 2010.

[. Wahbe, S. Lucco, T. E. Anderson, and S. L. Graham, Efficient software-based fault isolation, Proceedings of the fourteenth ACM symposium on Operating systems principles SOSP '93, pp.203-216, 1993.
DOI : 10.1145/173668.168635

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.123.1419

M. S. Idrees, Y. Roudier, H. Schweppe, H. Platzdasch, R. Khayari et al., Secure on-board architecture specification, pp.48-57, 2010.

W. Xu, S. Bhatkar, and R. Sekar, Taint-enhanced policy enforcement: a practical approach to defeat a wide range of attacks, Proceedings of the 15th conference on USENIX Security Symposium -Volume USENIX- SS'06, USENIX Association, p.28, 2006.

[. Xia and J. Hook, Experience with Abstraction-carrying Code, Electronic Notes in Theoretical Computer Science, vol.89, issue.3, 2003.
DOI : 10.1016/S1571-0661(05)80005-2

D. Heng-yin, M. Song, and . Egele, Panorama: capturing system-wide information flow for malware detection and analysis, Proceedings of the 14th ACM conference on Computer and communications security, pp.116-127, 2007.

Y. Zhu, J. Jung, D. Song, T. Kohno, and D. Wetherall, Privacy scope: A precise information flow tracking system for finding application leaks, p.27, 2009.

[. Zhu, D. Jung, T. Song, and . Kohno, TaintEraser, ACM SIGOPS Operating Systems Review, vol.45, issue.1, p.84, 2011.
DOI : 10.1145/1945023.1945039

A. Zavou, G. Portokalidis, and A. D. Keromytis, Taint-Exchange: A Generic System for Cross-Process and Cross-Host Taint Tracking, Proceedings of the 6th International conference on Advances in information and computer security, pp.113-128, 2011.
DOI : 10.1145/1945023.1945039