Attack Tree Construction and Its Application to the Connected Vehicle, Cyber-Physical Systems Security, p.175, 2018. ,
Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks, Cyber-Physical Systems Security, p.219, 2018. ,
Predictionbased Intrusion Detection System for In-vehicle Networks using Supervised Learning and Outlier-detection. Internation workshop on information security theory and practice, Patent Applications: ? Khaled Karray, M Abdelaziz Elaabid, 2018. ,
,
Workshop on Practical Hardware Innovations in Security Implementation and Characterization, 2016. ,
, Protections against the automotive CAN bus attacks (Poster). IMT Cybersecurity Seminar, 2017.
Attack tree generation: an application to the connected vehicle. International Workshops on Cryptographic architectures embedded in logic devices ,
Attack Tree Construction and Its Application to the Connected Vehicle, pp.17-19, 2017. ,
Attacks on inter vehicle communication systems-an analysis, Proc. WIT, p.46, 2006. ,
Operationally critical threat, asset, and vulnerability evaluation (octave) framework, version 1.0, p.22, 1999. ,
Testing CAN Network with help of CANtoolz, vol.Accessed, p.34, 2016. ,
Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM Conference on Computer and Communications Security, vol.46, p.48, 2002. ,
Supporting risk assessment with the systematic identification, merging, and validation of security goals, International Workshop on Risk Assessment and Risk-driven Testing, p.44, 2016. ,
Model-driven engineering for designing safe and secure embedded systems, Architecture-Centric Virtual Integration (ACVI), p.48, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-01974731
Sysml-sec attack graphs: compact representations for complex attacks, International Workshop on Graphical Models for Security, p.48, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-02287141
A secure and reliable bootstrap architecture, Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on, p.20, 1997. ,
Up-paalâ??a tool suite for automatic verification of real-time systems, International Hybrid Systems Workshop, p.48, 1995. ,
Proverif 1.93: Automatic cryptographic protocol verifier, user manual and tutorial. Internet, p.48, 2016. ,
Octane: An extensible open source car security testbed, Proceedings of the Embedded Security in Cars Conference, p.40, 2014. ,
Leveraging in-car security by combining information flow monitoring techniques, p.6, 2013. ,
Automotive software and systems engineering, Proceedings of the 2nd ACM/IEEE International Conference on Formal Methods and Models for Co-Design, pp.143-149, 2005. ,
The use of attack trees in assessing vulnerabilities in scada systems, Proceedings of the international infrastructure survivability workshop, p.46, 2004. ,
This car runs on code, IEEE spectrum, vol.46, issue.3, 2009. ,
Formalising systematic security evaluations using attack trees for automotive applications, IFIP International Conference on Information Security Theory and Practice, vol.45, p.48, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01875515
Comprehensive experimental analyses of automotive attack surfaces, USENIX Security Symposium, vol.15, p.33, 2011. ,
Fingerprinting electronic control units for vehicle intrusion detection, 25th USENIX Security Symposium (USENIX Security 16), vol.31, p.41, 2016. ,
Watermarking, tamper-proofing, and obfuscation-tools for software protection, IEEE Transactions on software engineering, vol.28, issue.8, p.20, 2002. ,
, SAE Vehicle Electrical System Security Committee et al. Sae j3061-cybersecurity guidebook for cyber-physical automotive systems, p.44, 2016.
, Vehicle Electrical System Security Committee. Sae j3061-cybersecurity guidebook for cyber-physical automotive systems, xv, vol.21, p.22, 2016.
System security and system safety engineering: Differences and similarities and a system security engineering process based on the iso 26262 process framework, SAE International Journal of Passenger Cars-Electronic and Electrical Systems, vol.6, p.44, 1419. ,
Detecting attacks to internal vehicle networks through hamming distance, IEEE 2017 AEIT International Annual Conference-Infrastructures for Energy and ICT, vol.40, p.41, 2017. ,
On the optimality and practicability of mutual information analysis in some scenarios, Cryptography and Communications, vol.10, issue.1, p.80, 2018. ,
Portunes: representing attack scenarios spanning through the physical, digital and social domain, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, vol.46, p.60, 2010. ,
Recommendation for block cipher modes of operation: The cmac mode for authentication, p.36, 2016. ,
A framework of defense system for prevention of insider's malicious behaviors, Advanced Communication Technology (ICACT), 2011 13th International Conference on, p.46, 2011. ,
telecommunications and internet converged services and protocols for advanced networking (tispan), vol.102, p.22 ,
KASUMI specification, version: 1.0. 3GPP Confidentiality and Integrity Algorithms, p.35, 1999. ,
198 (federal information processing standards publication) the keyed hash message authentication code (hmac), vol.36, pp.20899-8900 ,
Fast and vulnerable: A story of telematic failures, WOOT, p.16, 2015. ,
Attack trees for practical security assessment: ranking of attack scenarios with adtool 2.0, International Conference on Quantitative Evaluation of Systems, p.47, 2016. ,
Refinement-aware generation of attack trees, International Workshop on Security and Trust Management, p.45, 2017. ,
Modelling and analysis using groove, International journal on software tools for technology transfer, vol.14, issue.1, p.60, 2012. ,
Oversee a secure and open communication and runtime platform for innovative automotive applications, 7th Embedded Security in Cars Conf.(ESCAR), p.19, 2009. ,
Libracan: a lightweight broadcast authentication protocol for controller area networks, International Conference on Cryptology and Network Security, p.36, 2012. ,
Automotive cybersecurity for in-vehicle communication, IQT QUARTERLY, vol.6, p.81, 2014. ,
A practical solution to achieve real-time performance in the automotive network by randomizing frame identifier, Proc. Eur. Embedded Secur. Cars (ESCAR), vol.37, p.81, 2015. ,
MaCAN -Message Authenticated CAN, Escar Conference, vol.35, p.36, 2012. ,
Graph transformation in a nutshell. Electronic notes in theoretical computer science, vol.148, p.59, 2006. ,
Security requirements for automotive on-board networks, Intelligent Transport Systems Telecommunications,(ITST), vol.46, p.68, 2009. ,
URL : https://hal.archives-ouvertes.fr/hal-02286288
Intrusion detection using sequences of system calls, Journal of computer security, vol.6, issue.3, p.21, 1998. ,
Security threats to automotive can networks-practical examples and selected short-term countermeasures, International Conference on Computer Safety, Reliability, and Security, vol.34, p.39, 2008. ,
Security threats to automotive can networksâ??practical examples and selected short-term countermeasures, Reliability Engineering & System Safety, vol.96, issue.1, p.33, 2011. ,
Using ID-Hopping to Defend Against Targeted DoS on CAN, Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles, vol.37, p.77, 2017. ,
Practical attack graph generation for network defense, Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, p.48, 2006. ,
Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study, 19th USENIX Security Symposium, p.16, 2010. ,
A risk assessment framework for automotive embedded systems, Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, p.44, 2016. ,
, 11898-1-Road vehicles-Controller area network (CAN)-Part 1: Data link layer and physical signalling. International Organization for Standardization, ISO, p.27, 2003.
, 11898-2-Road vehicles-Controller area network (CAN)-Part 2: High-speed medium access unit. International Organization for Standardization, p.27, 2003.
, 11898-3-Road vehicles-Controller area network (CAN)-Part 2: Fault tolerant medium access unit. International Organization for Standardization, p.27, 2003.
26262-5:Road vehicles -Functional safety -Part 5: Product development at the hardware level. International Organization for Standardization, p.98, 2011. ,
ISO/IEC 18045-Information technology -Security techniques -Methodology for IT security evaluation. International Organization for Standardization, p.47, 2008. ,
ISO/IEC 15408-Information technology -Security techniques -Evaluation criteria for IT security. International Organization for Standardization, p.47, 2009. ,
Transforming graphical system models to graphical attack models, International Workshop on Graphical Models for Security, p.49, 2015. ,
Topological vulnerability analysis, Cyber situational awareness, vol.46, p.49, 2010. ,
Attack trees with sequential conjunction, IFIP International Information Security Conference, p.46, 2015. ,
URL : https://hal.archives-ouvertes.fr/hal-01197256
Open source computer algebra systems, Sympy. ACM Communications in Computer Algebra, vol.45, issue.3/4, p.65, 2012. ,
Intrusion detection system using deep neural network for in-vehicle network security, PloS one, vol.11, issue.6, p.41, 2016. ,
Attack tree construction and its application to the connected vehicle. Cyber-Physical Systems Security, p.43, 2018. ,
Identifier randomization: An efficient protection against can-bus attacks. Cyber-Physical Systems Security, p.77, 2018. ,
Predictionbased intrusion detection system for in-vehicle networks using supervised learning and outlier-detection, IFIP International Workshop on Information Security Theory and Practice, p.97, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-02294610
Security aspects of the in-vehicle network in the connected car, Intelligent Vehicles Symposium (IV), 2011 IEEE, p.20, 2011. ,
Socketcan-the official can api of the linux kernel, Proceedings of the 13th International CAN Conference (iCC 2012), p.116, 2012. ,
Adtool: security analysis with attack-defense trees, International Conference on Quantitative Evaluation of Systems, p.47, 2013. ,
Foundations of attack-defense trees, International Workshop on Formal Aspects in Security and Trust, vol.45, p.68, 2010. ,
Dag-based attack and defense modeling: Donâ??t miss the forest for the attack trees, Computer science review, vol.13, p.47, 2014. ,
Experimental security analysis of a modern automobile, Security and Privacy (SP), 2010 IEEE Symposium on, p.15, 2010. ,
Hmac: Keyed-hashing for message authentication, p.36, 1997. ,
Quantitative attack tree analysis via priced timed automata, International Conference on Formal Modeling and Analysis of Timed Systems, p.47, 2015. ,
Otids: A novel intrusion detection system for in-vehicle network by using remote frame, 2017 15th Annual Conference on Privacy, Security and Trust (PST), vol.39, p.41, 2017. ,
Security analysis of socio-technical physical systems, Computers & electrical engineering, vol.47, p.49, 2015. ,
Obfuscation of executable code to improve resistance to static disassembly, Proceedings of the 10th ACM conference on Computer and communications security, p.20, 2003. ,
, , 2019.
Sysml models and model transformation for security, Conferénce on Model-Driven Engineering and Software Development (Modelsward'2016), p.48, 2016. ,
URL : https://hal.archives-ouvertes.fr/hal-02287286
Can obfuscation by randomization (canora ,
Hacking a tesla model s: What we found and what we learned, 2015. ,
Anomaly detection of CAN bus messages through analysis of ID sequences, Intelligent Vehicles Symposium (IV), 2017 IEEE, vol.39, p.41, 2017. ,
Tracking & hacking: Security & privacy gaps put american drivers at risk. US Senate, 2015. ,
Whoâ??s driving my car? a machine learning based approach to driver identification, vol.15, p.32, 2018. ,
Human behavior characterization for driving style recognition in vehicle system, Computers & Electrical Engineering, vol.15, p.32, 2018. ,
Foundations of attack trees, International Conference on Information Security and Cryptology, vol.45, p.68, 2005. ,
Adventures in automotive networks and control units, DEF CON, vol.21, p.39, 2013. ,
Remote exploitation of an unaltered passenger vehicle, Black Hat USA, vol.39, p.41, 2015. ,
Enabling secure boot functionality by using physical unclonable functions, 14th Conference on Ph. D. Research in Microelectronics and Electronics (PRIME), p.20, 2018. ,
Open source model and simulator for real-time performance analysis of automotive network security, Acm Sigbed Review, vol.13, issue.3, p.36, 2016. ,
Security in automotive networks: Lightweight authentication and authorization, ACM Transactions on Design Automation of Electronic Systems (TODAES), vol.22, issue.2, p.36, 2017. ,
Entropy-based anomaly detection for in-vehicle networks, Intelligent Vehicles Symposium (IV), 2011 IEEE, vol.40, p.41, 2011. ,
A structured approach to anomaly detection for in-vehicle networks, Information Assurance and Security (IAS), 2010. ,
, Sixth International Conference on, vol.39, p.41, 2010.
OBDSecureAlert: An Anomaly Detection System for Vehicles, Smart Computing (SMARTCOMP), 2016. ,
, IEEE International Conference on, vol.40, p.41, 2016.
Efficient in-vehicle delayed data authentication based on compound message authentication codes, Vehicular Technology Conference, p.35, 2008. ,
Mulval: A logic-based network security analyzer, USENIX security, p.48, 2005. ,
A stealth, selective, link-layer denial-of-service attack against automotive networks, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, vol.32, p.34, 2017. ,
Scikit-learn: Machine learning in python, Journal of machine learning research, vol.12, p.127, 2011. ,
URL : https://hal.archives-ouvertes.fr/hal-00650905
A graph-based system for networkvulnerability analysis, Proceedings of the 1998 workshop on New security paradigms, p.48, 1998. ,
The curse of class imbalance and conflicting metrics with machine learning for sidechannel evaluations, IACR Trans. Cryptogr. Hardw. Embed. Syst, vol.2019, issue.1, p.127, 2019. ,
URL : https://hal.archives-ouvertes.fr/hal-01935318
Towards synthesis of attack trees for supporting computer-aided risk analysis, International Conference on Software Engineering and Formal Methods, p.45, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01064645
The groove simulator: A tool for state space generation, International Workshop on Applications of Graph Transformations with Industrial Relevance, p.60, 2003. ,
Using model checking to analyze network vulnerabilities, S&P 2000. Proceedings. 2000 IEEE Symposium on, p.48, 2000. ,
Learning representations by back-propagating errors, nature, vol.323, issue.6088, p.116, 1986. ,
Attack surface and vulnerability assessment of automotive electronic control units, e-Business and Telecommunications (ICETE), vol.4, p.52, 2015. ,
Efficient attack forest construction for automotive on-board networks, International Conference on Information Security, vol.46, p.48, 2014. ,
, Bruce Schneier. Attack trees. Dr. Dobbâ??s journal, vol.24, issue.12, p.68, 1999.
Security and privacy for in-vehicle networks, Vehicular Communications, Sensing, and Computing (VCSC), p.21, 2012. ,
Car2x communication: securing the last meter-a cost-effective approach for ensuring trust in car2x applications using in-vehicle symmetric cryptography, Vehicular Technology Conference (VTC Fall), p.36, 2011. ,
Automated generation and analysis of attack graphs, Proceedings. 2002 IEEE Symposium on, vol.46, p.48, 2002. ,
The Car Hacker's Handbook: A Guide for the Penetration Tester, vol.15, p.34, 2016. ,
Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network, 2016 international conference on information networking (ICOIN), vol.39, p.41, 2016. ,
, CAN Specification. Version 2.0. Robert Bosch GmbH, p.27, 1991.
A language-based intrusion detection approach for automotive embedded networks, The 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), vol.39, p.41, 2014. ,
URL : https://hal.archives-ouvertes.fr/hal-01967640
A language-based intrusion detection approach for automotive embedded networks, International Journal of Embedded Systems, vol.10, issue.1, p.41, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01967640
Survey on security threats and protection mechanisms in embedded automotive networks, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), p.20, 2013. ,
URL : https://hal.archives-ouvertes.fr/hal-01176042
Frequency-based anomaly detection for the automotive CAN bus, Industrial Control Systems Security (WCICSS), 2015 World Congress on, vol.39, p.41, 2015. ,
Anomaly detection in automobile control network data with long short-term memory networks, Data Science and Advanced Analytics (DSAA), 2016 IEEE International Conference on, vol.39, p.41, 2016. ,
,
Vulnerability assessment of cybersecurity for scada systems using attack trees, Power Engineering Society General Meeting, p.46, 2007. ,
A survey of remote automotive attack surfaces, p.18, 2014. ,
Canauth-a simple, backward compatible broadcast authentication protocol for can bus, ECRYPT Workshop on Lightweight Cryptography, vol.2011, p.36, 2011. ,
Intrusion detection via static analysis, Proceedings. 2001 IEEE Symposium on, p.21, 2001. ,
State of the art: Embedding security in vehicles, EURASIP Journal on Embedded Systems, issue.1, p.20, 2007. ,