In http://www.hitex.com/. [5] The Model Driven Engineering Architecture ,
Secure On-board Architecture Specification, 2010. ,
On the security of public key protocols. Information Theory, IEEE Transactions on, vol.29, issue.2, pp.198-208, 1983. ,
Development of a Functional Specification for an In-Vehicle Safety Advisory and Warning System (IVSAWS), SAE Technical Paper Series ,
DOI : 10.4271/912864
Automatic vehicle identification technology and applications, 35th IEEE Vehicular Technology Conference, pp.285-291, 1985. ,
DOI : 10.1109/VTC.1985.1623367
Automated transit technology development a key to the future, 30th IEEE Vehicular Technology Conference, pp.442-447, 1980. ,
DOI : 10.1109/VTC.1980.1622849
On-Board Architecture and Protocols Attack Analysis, 2010. ,
On-Board Architecture and Protocols Verification, 2010. ,
Security requirements for automotive on-board networks based on dark-side scenarios, 2009. ,
Analyzing security protocols with secrecy types and logic programs, Journal of the ACM, vol.52, issue.1, pp.102-146, 2005. ,
DOI : 10.1145/1044731.1044735
A calculus for cryptographic protocols, Proceedings of the 4th ACM conference on Computer and communications security , CCS '97, pp.36-47, 1997. ,
DOI : 10.1145/266420.266432
The B-book: assigning programs to meanings, 1996. ,
DOI : 10.1017/CBO9780511624162
The Isabelle/HOL-OCL environment, 2012. ,
VSpyware: Spyware in VANETs, Local Computer Networks (LCN), 2010 IEEE 35th Conference on, pp.621-624, 2010. ,
New attacks on UMTS network access, 2009 Wireless Telecommunications Symposium, pp.1-6, 2009. ,
DOI : 10.1109/WTS.2009.5068979
Automatic generation of basic behavior schemas from UML class diagrams. Software and Systems Modeling, pp.47-67, 2010. ,
URL : https://hal.archives-ouvertes.fr/hal-00540822
A rigorous methodology for security architecture modeling and verification, Proceedings of the 4th annual workshop on Cyber security and informaiton intelligence research developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, pp.1-10, 2009. ,
DOI : 10.1145/1413140.1413155
Analysis of attacks against the security of keylessentry systems for vehicles and suggestions for improved designs. Vehicular Technology, IEEE Transactions on, vol.54, issue.1, pp.41-50, 2005. ,
Model-checking for real-time systems, Logic in Computer Science LICS '90, Proceedings., Fifth Annual IEEE Symposium on, pp.414-425, 1990. ,
A theory of timed automata, Theoretical Computer Science, vol.126, issue.2, pp.183-235, 1994. ,
DOI : 10.1016/0304-3975(94)90010-8
A Formal Notion of Trust ??? Enabling Reasoning about Security Properties, Trust Management IV: 4th IFIP WG 11.11 International Conference, IFIPTM 2010 Proceedings, pp.200-215, 2010. ,
DOI : 10.1007/978-3-642-13446-3_14
URL : https://hal.archives-ouvertes.fr/hal-01061328
TURTLE: a real-time UML profile supported by a formal validation toolkit. Software Engineering, IEEE Transactions on, issue.7, p.30, 2004. ,
A UML-based Environment for System Design Space Exploration, 2006 13th IEEE International Conference on Electronics, Circuits and Systems, 2006. ,
DOI : 10.1109/ICECS.2006.379694
URL : https://hal.archives-ouvertes.fr/hal-00525101
The AVISPA Tool for the Automated Validation of Internet Security Protocols and Applications, Computer Aided Verification, pp.135-165, 2005. ,
DOI : 10.1007/11513988_27
URL : https://hal.archives-ouvertes.fr/inria-00000408
The Artisan Studio ,
Automotive Open System Architecture ,
From Secrecy to Authenticity in Security Protocols, 9th International Static Analysis Symposium (SAS'02), 2002. ,
DOI : 10.1007/3-540-45789-5_25
ProVerif Automatic Cryptographic Protocol Verifier User Manual, 2010. ,
DOI : 10.1109/csfw.2001.930138
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.5150
Automated Verification of Remote Electronic Voting Protocols in the Applied Pi-Calculus, 2008 21st IEEE Computer Security Foundations Symposium, pp.195-209, 2008. ,
DOI : 10.1109/CSF.2008.26
Deriving an information flow checker and certifying compiler for Java, 2006 IEEE Symposium on Security and Privacy (S&P'06), pp.13-242, 2006. ,
DOI : 10.1109/SP.2006.13
Intelligent Systems and Formal Methods in Software Engineering, IEEE Intelligent Systems, vol.21, issue.6, pp.71-81, 2006. ,
DOI : 10.1109/MIS.2006.117
Handbook of Process Algebra, 2001. ,
Logics of Specification Languages. Monographs in Theoretical Computer Science, 2008. ,
Verification of cryptographic protocols: tagging enforces termination, Foundations of Software Science and Computation Structures, pp.67-90, 2005. ,
DOI : 10.1016/j.tcs.2004.10.018
Denial of Service Attacks on Inter-Vehicle Communication Networks, 2008 11th International IEEE Conference on Intelligent Transportation Systems, 2008. ,
DOI : 10.1109/ITSC.2008.4732612
Security analysis of a cryptographically-enabled RFID device, Proceedings of the 14th conference on USENIX Security Symposium SSYM'05, 2005. ,
A semantics of security protocol language (SPL) using a class of composable high-level Petri nets, Proceedings. Fourth International Conference on Application of Concurrency to System Design, 2004. ACSD 2004., pp.99-108, 2004. ,
DOI : 10.1109/CSD.2004.1309120
Communication architecture and performance analysis of protocols for RTT infrastructure networks and vehicleroadside communications, Vehicular Technology Conference, pp.384-390, 1994. ,
Automotive system security, Proceedings of the 4th annual workshop on Cyber security and informaiton intelligence research developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, pp.1-26, 2008. ,
DOI : 10.1145/1413140.1413170
Goaloriented specification of adaptation requirements engineering in adaptive systems, Proceedings of the 2006 international workshop on Self-adaptation and self-managing systems, SEAMS '06, pp.23-29, 2006. ,
Attack Trees. Dr. Dobb's, Journal, 1999. ,
Automatic verification of correspondences for security protocols*, Journal of Computer Security, vol.17, issue.4, pp.363-434, 2009. ,
DOI : 10.3233/JCS-2009-0339
The SMV model checker ,
Model checking security policy model using both UML static and dynamic diagrams, Proceedings of the 4th international conference on Security of information and networks, SIN '11, pp.159-166, 2011. ,
DOI : 10.1145/2070425.2070451
Towards Validating Security Protocol Deployment in the Wild, 2009 33rd Annual IEEE International Computer Software and Applications Conference, 2009. ,
DOI : 10.1109/COMPSAC.2009.172
Integrating formal verification and conformance testing for reactive systems, IEEE Transactions on Software Engineering, vol.33, issue.8, pp.558-574, 2007. ,
DOI : 10.1109/TSE.2007.70707
URL : https://hal.archives-ouvertes.fr/inria-00422904
Specification and validation of multimedia protocols using RT-LOTOS, Proceedings of the Fifth IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, pp.354-362, 1995. ,
DOI : 10.1109/FTDCS.1995.525004
Availability enforcement by obligations and aspects identification, First International Conference on Availability, Reliability and Security (ARES'06), 2006. ,
DOI : 10.1109/ARES.2006.36
Modelling contexts in the Or-BAC model, 19th Annual Computer Security Applications Conference, 2003. Proceedings., pp.416-425, 2003. ,
DOI : 10.1109/CSAC.2003.1254346
Non-functional requirements, Proceedings of the 24th international conference on Software engineering , ICSE '02, pp.699-700, 2002. ,
DOI : 10.1145/581339.581452
TEPE, Proceedings of the UML&Formal Methods Workshop (UML&FM), 2010. ,
DOI : 10.1145/1921532.1921556
URL : https://hal.archives-ouvertes.fr/hal-00667841
Dynamic source routing in ad hoc wireless networks, Mobile Computing, pp.153-181, 1996. ,
Architecture and protocol design for a car-to-infrastructure packet radio network, [Proceedings] GLOBECOM '90: IEEE Global Telecommunications Conference and Exhibition, pp.1579-1585, 1990. ,
DOI : 10.1109/GLOCOM.1990.116756
Implementation of IPSec Protocol, 2012 Second International Conference on Advanced Computing & Communication Technologies, p.2012 ,
DOI : 10.1109/ACCT.2012.64
Automated Security Test Generation with Formal Threat Models. Dependable and Secure Computing, IEEE Transactions on, vol.9, issue.4, pp.526-540, 2012. ,
Radar requirements and architecture trades for automotive applications, 1997 IEEE MTT-S International Microwave Symposium Digest, pp.1253-1256, 1997. ,
DOI : 10.1109/MWSYM.1997.596554
Resolution-based proof for multi-modal temporal logics of knowledge, Proceedings Seventh International Workshop on Temporal Representation and Reasoning. TIME 2000, pp.69-78, 2000. ,
DOI : 10.1109/TIME.2000.856587
Using temporal logics of knowledge in the formal verification of security protocols, Proceedings. 11th International Symposium on Temporal Representation and Reasoning, 2004. TIME 2004., pp.148-151, 2004. ,
DOI : 10.1109/TIME.2004.1314432
A first step towards formal verification of security policy properties for RBAC, Fourth International Conference onQuality Software, 2004. QSIC 2004. Proceedings., pp.60-67, 2004. ,
DOI : 10.1109/QSIC.2004.1357945
Type Classification against Fault Enabled Mutant in Java Based Smart Card, 2012 Seventh International Conference on Availability, Reliability and Security, pp.551-556 ,
DOI : 10.1109/ARES.2012.24
URL : https://hal.archives-ouvertes.fr/hal-00937292
Introduction to Mathematical Logic, 2001. ,
DOI : 10.1007/978-1-4615-7288-6
European Commission FP7, 2008. ,
Progress and challenges in intelligent vehicle area networks, Communications of the ACM, vol.55, issue.2, pp.90-100, 2012. ,
DOI : 10.1145/2076450.2076470
Formal verification of timed systems: a survey and perspective, Proceedings of the IEEE, pp.1283-1305, 2004. ,
An asynchronous two-wire message bus for automotives, Vehicle Networks for Multiplexing and Data Communication, pp.8-9, 1988. ,
Real-Time and Embedded System Verification Based on Formal Requirements, 2006 International Symposium on Industrial Embedded Systems, pp.1-10, 2006. ,
DOI : 10.1109/IES.2006.357467
Hardware Module Design for Ensuring Trust, 2010 IEEE Computer Society Annual Symposium on VLSI, pp.155-160, 2010. ,
DOI : 10.1109/ISVLSI.2010.80
Aspect-oriented approach to early design modelling, IEE Proceedings - Software, vol.151, issue.4, pp.173-185, 2004. ,
DOI : 10.1049/ip-sen:20040920
A Security Architecture for Multipurpose ECUs in Vehicles, 25. VDI/VW- Gemeinschaftstagung: Automotive Security, 2009. ,
Specifying and analyzing early requirements in Tropos, Requirements Engineering, vol.9, issue.2 ,
DOI : 10.1007/s00766-004-0191-7
LLD Modeling, Verification and Automatic C-Code Generation, 2012. ,
Verification and Trade-Off Analysis of Security Properties in UML System Models. Software Engineering, IEEE Transactions on, vol.36, issue.3, pp.338-356, 2010. ,
A Tutorial on Uppaal, International School on Formal Methods for the Design of Computer, Communication, and Software Systems, SFM-RT 2004. Revised Lectures, pp.200-237 ,
DOI : 10.1007/978-3-540-30080-9_7
Trust for Vehicular Applications, Eighth International Symposium on Autonomous Decentralized Systems (ISADS'07), pp.295-304, 2007. ,
DOI : 10.1109/ISADS.2007.76
Foundations of Security Analysis and Design III. chapter Security and trust requirements engineering, pp.237-272, 2005. ,
On Non-Functional Requirements, 15th IEEE International Requirements Engineering Conference (RE 2007), pp.21-26, 2007. ,
DOI : 10.1109/RE.2007.45
Towards an Independent Semantics and Verification Technology for the HLPSL Specification Language, Proceedings of the Second Workshop on Automated Reasoning for Security Protocol Analysis, pp.59-77, 2005. ,
DOI : 10.1016/j.entcs.2005.06.004
Secure on-board protocols specification, 2010. ,
Two practical man-in-the-middle attacks on Bluetooth secure simple pairing and countermeasures, IEEE Transactions on Wireless Communications, vol.9, issue.1, pp.384-392, 2010. ,
DOI : 10.1109/TWC.2010.01.090935
Security in mobile ad hoc networks: challenges and solutions, IEEE Wireless Communications, vol.11, issue.1, pp.38-47, 2004. ,
DOI : 10.1109/MWC.2004.1269716
A Study of Automatic Code Generation, 2010 International Conference on Computational and Information Sciences, pp.689-691, 2010. ,
DOI : 10.1109/ICCIS.2010.171
Integrating Formal Analysis and Design to Preserve Security Properties, System Sciences, 2009. ,
Formally analyzing software architectural specifications using SAM, Journal of Systems and Software, vol.71, issue.1-2, pp.11-29, 2004. ,
DOI : 10.1016/S0164-1212(02)00087-0
Process algebraic approach to the parametric analysis of object scheduling in real-time systems, Object-Oriented Real-Time Dependable Systems WORDS 1999 Fall. Proceedings. Fifth International Workshop on, pp.131-138, 1999. ,
It's Time for Trustworthy Systems, IEEE Security & Privacy Magazine, vol.10, issue.2, pp.67-70 ,
DOI : 10.1109/MSP.2012.41
Threat modeling using formal methods: A new approach to develop secure web applications, 2011 7th International Conference on Emerging Technologies, pp.1-5, 2011. ,
DOI : 10.1109/ICET.2011.6048492
A systematic software development process for non-functional requirements, Information and Communication Technology Convergence (ICTC), 2010 International Conference on, pp.431-436, 2010. ,
The Rhapsody tool ,
Timed Automata: Semantics, Algorithms and Tools. In Lecture Notes on Concurrency and Petri Nets, LNCS, vol.3098, 2004. ,
A Model-Based Design Tool of Automotive Software Architecture, 2010 IEEE 34th Annual Computer Software and Applications Conference, pp.541-542, 2010. ,
DOI : 10.1109/COMPSAC.2010.60
Recent advances in in-vehicle embedded systems, IECON 2011 -37th Annual Conference on IEEE Industrial Electronics Society, pp.4623-4625, 2011. ,
Introduction to Automata Theory, Languages and Computation, 1979. ,
UMLsec: Extending UML for Secure Systems Development, Proceedings of the 5th International Conference on The Unified Modeling Language, UML '02, pp.412-425, 2002. ,
DOI : 10.1007/3-540-45800-X_32
Sound methods and effective tools for model-based security engineering with UML, Proceedings of the 27th international conference on Software engineering, ICSE '05, pp.322-331, 2005. ,
Automated Formal Verification and Testing of C Programs for Embedded Systems, 10th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC'07), pp.373-381, 2007. ,
DOI : 10.1109/ISORC.2007.22
Utilization of Timed Automata as a Verification Tool for Security Protocols, 2010 Fourth International Conference on Secure Software Integration and Reliability Improvement Companion, pp.86-93, 2010. ,
DOI : 10.1109/SSIRI-C.2010.27
Object analysis patterns for embedded systems, IEEE Transactions on Software Engineering, vol.30, issue.12, pp.970-992, 2004. ,
DOI : 10.1109/TSE.2004.102
Critical embedded automotive networks. Micro, IEEE, vol.22, issue.4, pp.14-18, 2002. ,
Embedded system security, Computer, vol.37, issue.7, pp.95-97, 2004. ,
DOI : 10.1109/MC.2004.52
The Complexity Challenge in Embedded System Design, 2008 11th IEEE International Symposium on Object and Component-Oriented Real-Time Distributed Computing (ISORC), pp.3-12, 2008. ,
DOI : 10.1109/ISORC.2008.14
Experimental Security Analysis of a Modern Automobile, 2010 IEEE Symposium on Security and Privacy, pp.447-462, 2010. ,
DOI : 10.1109/SP.2010.34
Prototyping an Embedded Automotive System from its UML/SysML Models, ERTSS'2012, 2012. ,
An approach to specification-based attack detection for in-vehicle networks, 2008 IEEE Intelligent Vehicles Symposium, pp.220-225, 2008. ,
DOI : 10.1109/IVS.2008.4621263
Securing vehicles against cyber attacks on Cyber security and information intelligence research: developing strategies to meet the cyber security and information intelligence challenges ahead, CSIIRW '08, Proceedings of the 4th annual workshop, pp.1-30, 2008. ,
Embedded Security in Cars, Securing Current and Future Automotive IT Applications, 2006. ,
Formal security model research based on Petri-net, Granular Computing, 2005 IEEE International Conference on, pp.575-578, 2005. ,
SecureUML: A UML-Based Modeling Language for Model-Driven Security, Proceedings of the 5th International Conference on The Unified Modeling Language, UML '02, pp.426-441, 2002. ,
DOI : 10.1007/3-540-45800-X_33
A hierarchy of authentication specifications, Proceedings 10th Computer Security Foundations Workshop, pp.31-43, 1997. ,
DOI : 10.1109/CSFW.1997.596782
SmartCM a smart card fault injection simulator, 2011 IEEE International Workshop on Information Forensics and Security, pp.1-6, 2011. ,
DOI : 10.1109/WIFS.2011.6123124
URL : https://hal.archives-ouvertes.fr/hal-00685220
Using UML Models and Formal Verification in Model-Based Testing, 2010 17th IEEE International Conference and Workshops on Engineering of Computer Based Systems, pp.50-56, 2010. ,
DOI : 10.1109/ECBS.2010.13
Computer-aided Support for Secure Tropos, Automated Software Engineering, vol.26, issue.10, pp.341-364, 2007. ,
DOI : 10.1007/s10515-007-0013-5
The SPASS Theorem Prover ,
System Architectures for Safety Critical Automotive Applications In Safety Critical Software in Vehicle and Traffic Control, IEE Colloquium on, pp.4-5, 1990. ,
Attacks on Mobile and Embedded Systems: Currrent Trends ,
Verifying SeVeCom using set-based abstraction, 2011 7th International Wireless Communications and Mobile Computing Conference, pp.1164-1169, 2011. ,
DOI : 10.1109/IWCMC.2011.5982705
Generating formal specifications for security-critical applications - A model-driven approach, 2009 ICSE Workshop on Software Engineering for Secure Systems, pp.68-74, 2009. ,
DOI : 10.1109/IWSESS.2009.5068461
Security Analysis of Temporal-RBAC Using Timed Automata, 2008 The Fourth International Conference on Information Assurance and Security, pp.37-40, 2008. ,
DOI : 10.1109/IAS.2008.10
Formal verification of security specifications with common criteria, Proceedings of the 2007 ACM symposium on Applied computing , SAC '07, pp.1506-1512, 2007. ,
DOI : 10.1145/1244002.1244325
A Framework Towards the Efficient Identification and Modelling of Security Requirements, 5ème Conf. sur la Sécurité des Architectures Réseaux et Systèmes d'Information (SAR-SSI 2010), 2010. ,
Petri nets: Properties, analysis and applications, Proceedings of the IEEE, pp.541-580, 1989. ,
DOI : 10.1109/5.24143
Automotive Communications - Past, Current and Future, 2005 IEEE Conference on Emerging Technologies and Factory Automation, pp.8-992, 2005. ,
DOI : 10.1109/ETFA.2005.1612631
OMEGA2: A New Version of the Profile and the Tools, 2010 15th IEEE International Conference on Engineering of Complex Computer Systems, pp.373-378, 2010. ,
DOI : 10.1109/ICECCS.2010.41
OMEGA2: A new version of the profile and the tools (regular paper), UML&AADL'2009 -14th IEEE International Conference on Engineering of Complex Computer Systems, pp.373-378, 2009. ,
The SH-Verification Tool, Proc. 13th International Florida Artificial Intelligence Research Society Conference (FLAIRS-2000), pp.18-22, 2000. ,
Verification of Cooperating Systems ? An Approach Based on Formal Languages, Proc. 13th International Florida Artificial Intelligence Research Society Conference (FLAIRS-2000), pp.346-350, 2000. ,
VERTAF: an application framework for the design and verification of embedded real-time software. Software Engineering, IEEE Transactions on, vol.30, issue.10, pp.656-674, 2004. ,
Secure message transmission in mobile ad hoc networks, Ad Hoc Networks, pp.193-209, 2003. ,
DOI : 10.1016/S1570-8705(03)00018-0
On the Road " -Reflections on the security of Vehicular communication systems, Vehicular Electronics and Safety ICVES 2008. IEEE International Conference on, pp.359-363, 2008. ,
Secure vehicular communication systems: design and architecture, IEEE Communications Magazine, vol.46, issue.11, pp.46100-109, 2008. ,
DOI : 10.1109/MCOM.2008.4689252
URL : http://arxiv.org/abs/0912.5391
Vehicular communication systems: Enabling technologies, applications, and future outlook on intelligent transportation, IEEE Communications Magazine, vol.47, issue.11, pp.4784-95, 2009. ,
DOI : 10.1109/MCOM.2009.5307471
AVATAR: A SysML Environment for the Formal Verification of Safety and Security Properties, 2011 11th Annual International Conference on New Technologies of Distributed Systems, pp.1-10, 2011. ,
DOI : 10.1109/NOTERE.2011.5957992
A Formal Methodology Applied to Secure Over-the-Air Automotive Applications, 2011 IEEE Vehicular Technology Conference (VTC Fall), 2011. ,
DOI : 10.1109/VETECF.2011.6093061
Ad-hoc on-demand distance vector routing, Mobile Computing Systems and Applications, 1999. Proceedings. WMCSA '99. Second IEEE Workshop on, pp.90-100, 1999. ,
Beyond Attack Trees: Dynamic Security Modeling with Boolean Logic Driven Markov Processes (BDMP), 2010 European Dependable Computing Conference, pp.199-208, 2010. ,
DOI : 10.1109/EDCC.2010.32
A Cause and Effect Approach towards Risk Analysis, 2011 Third International Workshop on Security Measurements and Metrics, pp.80-83, 2011. ,
DOI : 10.1109/Metrisec.2011.20
Software Engineering for Automotive Systems: A Roadmap, Future of Software Engineering (FOSE '07), pp.55-71, 2007. ,
DOI : 10.1109/FOSE.2007.22
The security of vehicular ad hoc networks, Proceedings of the 3rd ACM workshop on Security of ad hoc and sensor networks , SASN '05, pp.11-21, 2005. ,
DOI : 10.1145/1102219.1102223
Communicating and Mobile Systems, The Pi Calculus, 1999. ,
Diversity in Network Attacker Motivation: A Literature Review, 2009 International Conference on Computational Science and Engineering, pp.319-323, 2009. ,
DOI : 10.1109/CSE.2009.178
A Methodology for the Analysis and Modeling of Security Threats and Attacks for Systems of Embedded Components, Parallel, Distributed and Network-Based Processing (PDP), 2012 20th Euromicro International Conference on, pp.261-268, 2012. ,
On a formal framework for security properties Special issue on formal methods, techniques and tools for secure and reliable applications, International Computer Standards & Interface Journal (CSI), 2004. ,
Formal Methods in Software Product Line Engineering, Computer, vol.44, issue.2, pp.82-85, 2011. ,
DOI : 10.1109/MC.2011.47
The Z notation: a reference manual, 1989. ,
Cryptographically-Sound Protocol-Model Abstractions, Logic in Computer Science, 2008. LICS '08. 23rd Annual IEEE Symposium on, pp.3-17, 2008. ,
DOI : 10.1109/csf.2008.19
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.323.6473
Testing of embedded system using fault modeling, 2009 International Conference on Emerging Trends in Electronic and Photonic Devices & Systems, pp.177-180, 2009. ,
DOI : 10.1109/ELECTRO.2009.5441142
A Threat Analysis Methodology for Security Evaluation and Enhancement Planning, 2009 Third International Conference on Emerging Security Information, Systems and Technologies, pp.262-267, 2009. ,
DOI : 10.1109/SECURWARE.2009.47
Comprehensive Experimental Analyses of Automotive Attack Surfaces, 20th USENIX conference on Security, 2011. ,
Why Provable Security Matters?, Proceedings of the 22nd international conference on Theory and applications of cryptographic techniques, EURO- CRYPT'03, pp.449-461, 2003. ,
DOI : 10.1007/3-540-39200-9_28
simTD: a car-to-X system architecture for field operational tests, Topics in Automotive Networking]. Communications Magazine, pp.48148-154, 2010. ,
Defense against misbehavior in anonymous vehicular ad hoc networks, Ad Hoc Networks Privacy and Security in Wireless Sensor and Ad Hoc Networks, pp.1515-1525, 2009. ,
DOI : 10.1016/j.adhoc.2009.04.013
Specification and verification of intercomponent constraints in CTL, Proceedings of the 2005 conference on Specification and verification of component-based systems, SAVCBS '05, 2005. ,
car-to-car.org/. [187] The ISO/IEC. The ISO/IEC 15408 standard, 2004. ,
The SysML language In http://www.omgsysml.org/. [191] The Raytheon Company, GPS OCX technology, 2011. ,
The MARTE site ,
Design, Implementation, and Evaluation of a Vehicular Hardware Security Module, 14th International Conference on Information Security and Cryptology 2011 (ICISC), 2011. ,
Local Danger Warning based on Vehicle Ad-hoc Networks, Prototype and Simulation, Proceedings of 1st International Workshop on Intelligent Transportation (WIT), 2004. ,
Combining Misuse Cases with Attack Trees and Security Activity Models, 2010 International Conference on Availability, Reliability and Security, pp.438-445, 2010. ,
DOI : 10.1109/ARES.2010.101
Isabelle/HOL ? A Proof Assistant for Higher-Order Logic, LNCS, vol.2283, 2002. ,
Introduction to the ISO specification language LOTOS, Computer Networks and ISDN Systems, vol.14, issue.1, pp.25-59, 1987. ,
DOI : 10.1016/0169-7552(87)90085-7
The AutoFocus tool ,
The wireless sniffer Ufasoft Snif ,
Intelligent transport systems and effects on road traffic accidents: state of the art, IET Intelligent Transport Systems, vol.1, issue.2, pp.81-88, 2007. ,
DOI : 10.1049/iet-its:20060081
Secure systems development based on the common criteria: the PalME project, Proceedings of the 10th ACM SIGSOFT symposium on Foundations of software engineering, SIGSOFT '02/FSE-10, pp.129-138, 2002. ,
A Novel Approach to Building Secure Systems, The Second International Conference on Availability, Reliability and Security (ARES'07), pp.1074-1084, 2007. ,
DOI : 10.1109/ARES.2007.11
Stalked by satellite - an alarming rise in GPS-enabled harassment, IEEE Spectrum, vol.43, issue.7, pp.4315-4331, 2006. ,
DOI : 10.1109/MSPEC.2006.1652998
A Security Assurance Framework Combining Formal Verification and Security Functional Testing, 2012 12th International Conference on Quality Software, pp.136-139 ,
DOI : 10.1109/QSIC.2012.34
Rapid embedded system testing using verification patterns. Software, IEEE, vol.22, issue.4, pp.68-75, 2005. ,
Communications flow considerations in vehicle navigation and information systems, Conference Record of papers presented at the First Vehicle Navigation and Information Systems Conference (VNIS '89), pp.373-375, 1989. ,
DOI : 10.1109/VNIS.1989.98795
Electromagnetic compatibility, Telecommunications Energy Conference INTELEC '85. Seventh International, pp.79-85, 1985. ,
DOI : 10.1016/B978-0-08-097138-4.00008-2
A Qualitative Risk Analysis for the GPRS Technology, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, pp.61-68, 2008. ,
DOI : 10.1109/EUC.2008.123
On Modeling and Verifying of Application Protocols of TTCAN in Flight-Control System with UPPAAL, 2009 International Conference on Embedded Software and Systems, pp.572-577, 2009. ,
DOI : 10.1109/ICESS.2009.27
A High Level Protocol Specification Language for Industrial Security-Sensitive Protocols, Austrian Computer Society, pp.193-205, 2004. ,
URL : https://hal.archives-ouvertes.fr/inria-00100219
Test Specification, 2011. ,
Test Results, 2012. ,
Design of Secure and Application-Oriented VANETs, VTC Spring 2008, IEEE Vehicular Technology Conference, pp.2794-2799, 2008. ,
DOI : 10.1109/VETECS.2008.610
Practical Defense against WEP and WPA-PSK Attack for WLAN, 2010 International Conference on Computational Intelligence and Software Engineering, pp.1-4, 2010. ,
DOI : 10.1109/WICOM.2010.5600921
Embedded real-time system modeling and analysis using AADL, Networking and Information Technology (ICNIT), 2010 International Conference on, pp.247-251, 2010. ,