J. ?-khaled-karray, S. Danger, M. Guilley, and . Elaabid, Attack Tree Construction and Its Application to the Connected Vehicle, Cyber-Physical Systems Security, p.175, 2018.

J. ?-khaled-karray, S. Danger, M. Guilley, and . Elaabid, Identifier Randomization: An Efficient Protection Against CAN-Bus Attacks, Cyber-Physical Systems Security, p.219, 2018.

J. ?-khaled-karray, S. Danger, . Guilley, ;. Elaabid, S. Procede et al., Predictionbased Intrusion Detection System for In-vehicle Networks using Supervised Learning and Outlier-detection. Internation workshop on information security theory and practice, Patent Applications: ? Khaled Karray, M Abdelaziz Elaabid, 2018.

A. ?-khaled-karray, S. Elaabid, J. Guilley, ;. Danger, . Vehicule-par et al.,

S. ?-khaled-karray, J. Guilley, M. Danger, and . Elaabid, Workshop on Practical Hardware Innovations in Security Implementation and Characterization, 2016.

S. ?-khaled-karray, J. Guilley, M. Danger, and . Elaabid, Protections against the automotive CAN bus attacks (Poster). IMT Cybersecurity Seminar, 2017.

J. ?-khaled-karray, S. Danger, M. Guilley, and . Elaabid, Attack tree generation: an application to the connected vehicle. International Workshops on Cryptographic architectures embedded in logic devices

J. ?-khaled-karray, S. Danger, M. Guilley, and . Elaabid, Attack Tree Construction and Its Application to the Connected Vehicle, pp.17-19, 2017.

A. Aijaz, B. Bochow, F. Dötzer, A. Festag, M. Gerlach et al., Attacks on inter vehicle communication systems-an analysis, Proc. WIT, p.46, 2006.

J. Christopher, S. G. Alberts, R. D. Behrens, W. Pethia, and . Inst, Operationally critical threat, asset, and vulnerability evaluation (octave) framework, version 1.0, p.22, 1999.

A. Sintsov, Testing CAN Network with help of CANtoolz, vol.Accessed, p.34, 2016.

P. Ammann, D. Wijesekera, and S. Kaushik, Scalable, graph-based network vulnerability analysis, Proceedings of the 9th ACM Conference on Computer and Communications Security, vol.46, p.48, 2002.

D. Angermeier, A. Nieding, and J. Eichler, Supporting risk assessment with the systematic identification, merging, and validation of security goals, International Workshop on Risk Assessment and Risk-driven Testing, p.44, 2016.

L. Apvrille, L. Li, and Y. Roudier, Model-driven engineering for designing safe and secure embedded systems, Architecture-Centric Virtual Integration (ACVI), p.48, 2016.
URL : https://hal.archives-ouvertes.fr/hal-01974731

L. Apvrille and Y. Roudier, Sysml-sec attack graphs: compact representations for complex attacks, International Workshop on Graphical Models for Security, p.48, 2015.
URL : https://hal.archives-ouvertes.fr/hal-02287141

A. William, . Arbaugh, J. David, J. M. Farber, and . Smith, A secure and reliable bootstrap architecture, Security and Privacy, 1997. Proceedings., 1997 IEEE Symposium on, p.20, 1997.

J. Bengtsson, K. Larsen, F. Larsson, P. Pettersson, and W. Yi, Up-paalâ??a tool suite for automatic verification of real-time systems, International Hybrid Systems Workshop, p.48, 1995.

B. Blanchet, B. Smyth, and V. Cheval, Proverif 1.93: Automatic cryptographic protocol verifier, user manual and tutorial. Internet, p.48, 2016.

P. Borazjani, D. Everett, and . Mccoy, Octane: An extensible open source car security testbed, Proceedings of the Embedded Security in Cars Conference, p.40, 2014.

A. Bouard, H. Schweppe, B. Weyl, and C. Eckert, Leveraging in-car security by combining information flow monitoring techniques, p.6, 2013.

M. Broy, Automotive software and systems engineering, Proceedings of the 2nd ACM/IEEE International Conference on Formal Methods and Models for Co-Design, pp.143-149, 2005.

J. Eric, M. Byres, D. Franz, and . Miller, The use of attack trees in assessing vulnerabilities in scada systems, Proceedings of the international infrastructure survivability workshop, p.46, 2004.

N. Robert and . Charette, This car runs on code, IEEE spectrum, vol.46, issue.3, 2009.

M. Cheah, J. Hoang-nga-nguyen, . Bryans, . Siraj, and . Shaikh, Formalising systematic security evaluations using attack trees for automotive applications, IFIP International Conference on Information Security Theory and Practice, vol.45, p.48, 2017.
URL : https://hal.archives-ouvertes.fr/hal-01875515

S. Checkoway, D. Mccoy, B. Kantor, D. Anderson, H. Shacham et al., Comprehensive experimental analyses of automotive attack surfaces, USENIX Security Symposium, vol.15, p.33, 2011.

K. Cho, G. Kang, and . Shin, Fingerprinting electronic control units for vehicle intrusion detection, 25th USENIX Security Symposium (USENIX Security 16), vol.31, p.41, 2016.

S. Christian, C. Collberg, and . Thomborson, Watermarking, tamper-proofing, and obfuscation-tools for software protection, IEEE Transactions on software engineering, vol.28, issue.8, p.20, 2002.

, SAE Vehicle Electrical System Security Committee et al. Sae j3061-cybersecurity guidebook for cyber-physical automotive systems, p.44, 2016.

, Vehicle Electrical System Security Committee. Sae j3061-cybersecurity guidebook for cyber-physical automotive systems, xv, vol.21, p.22, 2016.

J. Barbara and . Czerny, System security and system safety engineering: Differences and similarities and a system security engineering process based on the iso 26262 process framework, SAE International Journal of Passenger Cars-Electronic and Electrical Systems, vol.6, p.44, 1419.

S. Dario, M. Mirco, and C. Michele, Detecting attacks to internal vehicle networks through hamming distance, IEEE 2017 AEIT International Annual Conference-Infrastructures for Energy and ICT, vol.40, p.41, 2017.

S. Eloi-de-chérisey, A. Guilley, O. Heuser, and . Rioul, On the optimality and practicability of mutual information analysis in some scenarios, Cryptography and Communications, vol.10, issue.1, p.80, 2018.

T. Dimkov, W. Pieters, and P. Hartel, Portunes: representing attack scenarios spanning through the physical, digital and social domain, Joint Workshop on Automated Reasoning for Security Protocol Analysis and Issues in the Theory of Security, vol.46, p.60, 2010.

J. Morris and . Dworkin, Recommendation for block cipher modes of operation: The cmac mode for authentication, p.36, 2016.

J. Eom, M. Park, S. Park, and T. Chung, A framework of defense system for prevention of insider's malicious behaviors, Advanced Communication Technology (ICACT), 2011 13th International Conference on, p.46, 2011.

. Ts-etsi, telecommunications and internet converged services and protocols for advanced networking (tispan), vol.102, p.22

. Etsi and . Sage, KASUMI specification, version: 1.0. 3GPP Confidentiality and Integrity Algorithms, p.35, 1999.

. Pub-fips, 198 (federal information processing standards publication) the keyed hash message authentication code (hmac), vol.36, pp.20899-8900

D. Ian, A. Foster, K. Prudhomme, S. Koscher, and . Savage, Fast and vulnerable: A story of telematic failures, WOOT, p.16, 2015.

O. Gadyatskaya, R. Jhawar, P. Kordy, K. Lounis, S. Mauw et al., Attack trees for practical security assessment: ranking of attack scenarios with adtool 2.0, International Conference on Quantitative Evaluation of Systems, p.47, 2016.

O. Gadyatskaya, R. Jhawar, S. Mauw, R. Trujillo-rasua, and T. Willemse, Refinement-aware generation of attack trees, International Workshop on Security and Trust Management, p.45, 2017.

M. Amir-hossein-ghamarian, A. De-mol, E. Rensink, M. Zambon, and . Zimakova, Modelling and analysis using groove, International journal on software tools for technology transfer, vol.14, issue.1, p.60, 2012.

A. Groll, J. Holle, C. Ruland, M. Wolf, T. Wollinger et al., Oversee a secure and open communication and runtime platform for innovative automotive applications, 7th Embedded Security in Cars Conf.(ESCAR), p.19, 2009.

B. Groza, S. Murvay, A. Van-herrewege, and I. Verbauwhede, Libracan: a lightweight broadcast authentication protocol for controller area networks, International Conference on Cryptology and Network Security, p.36, 2012.

K. Han, A. Weimerskirch, and K. Shin, Automotive cybersecurity for in-vehicle communication, IQT QUARTERLY, vol.6, p.81, 2014.

K. Han, A. Weimerskirch, and K. Shin, A practical solution to achieve real-time performance in the automotive network by randomizing frame identifier, Proc. Eur. Embedded Secur. Cars (ESCAR), vol.37, p.81, 2015.

O. Hartkopp, C. Reuber, and R. Schilling, MaCAN -Message Authenticated CAN, Escar Conference, vol.35, p.36, 2012.

R. Heckel, Graph transformation in a nutshell. Electronic notes in theoretical computer science, vol.148, p.59, 2006.

O. Henniger, L. Apvrille, A. Fuchs, Y. Roudier, A. Ruddle et al., Security requirements for automotive on-board networks, Intelligent Transport Systems Telecommunications,(ITST), vol.46, p.68, 2009.
URL : https://hal.archives-ouvertes.fr/hal-02286288

A. Steven, S. Hofmeyr, A. Forrest, and . Somayaji, Intrusion detection using sequences of system calls, Journal of computer security, vol.6, issue.3, p.21, 1998.

T. Hoppe, S. Kiltz, and J. Dittmann, Security threats to automotive can networks-practical examples and selected short-term countermeasures, International Conference on Computer Safety, Reliability, and Security, vol.34, p.39, 2008.

T. Hoppe, S. Kiltz, and J. Dittmann, Security threats to automotive can networksâ??practical examples and selected short-term countermeasures, Reliability Engineering & System Safety, vol.96, issue.1, p.33, 2011.

A. Humayed and B. Luo, Using ID-Hopping to Defend Against Targeted DoS on CAN, Proceedings of the 1st International Workshop on Safe Control of Connected and Autonomous Vehicles, vol.37, p.77, 2017.

K. Ingols, R. Lippmann, and K. Piwowarski, Practical attack graph generation for network defense, Computer Security Applications Conference, 2006. ACSAC'06. 22nd Annual, p.48, 2006.

R. Millerb-ishtiaq-roufa, H. Mustafaa, S. Taylora, W. Xua, M. Gruteserb et al., Security and privacy vulnerabilities of in-car wireless networks: A tire pressure monitoring system case study, 19th USENIX Security Symposium, p.16, 2010.

A. Mafijul-md-islam, C. Lautenbach, T. Sandberg, and . Olovsson, A risk assessment framework for automotive embedded systems, Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, p.44, 2016.

, 11898-1-Road vehicles-Controller area network (CAN)-Part 1: Data link layer and physical signalling. International Organization for Standardization, ISO, p.27, 2003.

, 11898-2-Road vehicles-Controller area network (CAN)-Part 2: High-speed medium access unit. International Organization for Standardization, p.27, 2003.

, 11898-3-Road vehicles-Controller area network (CAN)-Part 2: Fault tolerant medium access unit. International Organization for Standardization, p.27, 2003.

. Iso and . Iso, 26262-5:Road vehicles -Functional safety -Part 5: Product development at the hardware level. International Organization for Standardization, p.98, 2011.

. Iso/iec, ISO/IEC 18045-Information technology -Security techniques -Methodology for IT security evaluation. International Organization for Standardization, p.47, 2008.

. Iso/iec, ISO/IEC 15408-Information technology -Security techniques -Evaluation criteria for IT security. International Organization for Standardization, p.47, 2009.

. Marieta-georgieva-ivanova, W. Christian, R. Probst, F. Hansen, and . Kammüller, Transforming graphical system models to graphical attack models, International Workshop on Graphical Models for Security, p.49, 2015.

S. Jajodia and S. Noel, Topological vulnerability analysis, Cyber situational awareness, vol.46, p.49, 2010.

R. Jhawar, B. Kordy, S. Mauw, S. Radomirovi?, and R. Trujillo-rasua, Attack trees with sequential conjunction, IFIP International Information Security Conference, p.46, 2015.
URL : https://hal.archives-ouvertes.fr/hal-01197256

D. Joyner, O. ?ertík, A. Meurer, and B. E. Granger, Open source computer algebra systems, Sympy. ACM Communications in Computer Algebra, vol.45, issue.3/4, p.65, 2012.

M. Kang and J. Kang, Intrusion detection system using deep neural network for in-vehicle network security, PloS one, vol.11, issue.6, p.41, 2016.

K. Karray, J. Danger, S. Guilley, and M. Elaabid, Attack tree construction and its application to the connected vehicle. Cyber-Physical Systems Security, p.43, 2018.

K. Karray, J. Danger, S. Guilley, and M. Elaabid, Identifier randomization: An efficient protection against can-bus attacks. Cyber-Physical Systems Security, p.77, 2018.

K. Karray, J. Danger, S. Guilley, and M. Elaabid, Predictionbased intrusion detection system for in-vehicle networks using supervised learning and outlier-detection, IFIP International Workshop on Information Security Theory and Practice, p.97, 2018.
URL : https://hal.archives-ouvertes.fr/hal-02294610

P. Kleberger, T. Olovsson, and E. Jonsson, Security aspects of the in-vehicle network in the connected car, Intelligent Vehicles Symposium (IV), 2011 IEEE, p.20, 2011.

M. Kleine-budde, Socketcan-the official can api of the linux kernel, Proceedings of the 13th International CAN Conference (iCC 2012), p.116, 2012.

B. Kordy, P. Kordy, S. Mauw, and P. Schweitzer, Adtool: security analysis with attack-defense trees, International Conference on Quantitative Evaluation of Systems, p.47, 2013.

B. Kordy, S. Mauw, S. Radomirovi?, and P. Schweitzer, Foundations of attack-defense trees, International Workshop on Formal Aspects in Security and Trust, vol.45, p.68, 2010.

B. Kordy, L. Piètre-cambacédès, and P. Schweitzer, Dag-based attack and defense modeling: Donâ??t miss the forest for the attack trees, Computer science review, vol.13, p.47, 2014.

K. Koscher, A. Czeskis, F. Roesner, S. Patel, T. Kohno et al., Experimental security analysis of a modern automobile, Security and Privacy (SP), 2010 IEEE Symposium on, p.15, 2010.

H. Krawczyk, M. Bellare, and R. Canetti, Hmac: Keyed-hashing for message authentication, p.36, 1997.

R. Kumar, E. Ruijters, and M. Stoelinga, Quantitative attack tree analysis via priced timed automata, International Conference on Formal Modeling and Analysis of Timed Systems, p.47, 2015.

H. Lee, H. Seong-hoon-jeong, and . Kim, Otids: A novel intrusion detection system for in-vehicle network by using remote frame, 2017 15th Annual Conference on Privacy, Security and Trust (PST), vol.39, p.41, 2017.

G. Lenzini, S. Mauw, and S. Ouchani, Security analysis of socio-technical physical systems, Computers & electrical engineering, vol.47, p.49, 2015.

C. Linn and S. Debray, Obfuscation of executable code to improve resistance to static disassembly, Proceedings of the 10th ACM conference on Computer and communications security, p.20, 2003.

L. Isograph and . Attacktree, , 2019.

F. Lugou, W. Letitia, L. Li, R. Apvrille, and . Ameur-boulifa, Sysml models and model transformation for security, Conferénce on Model-Driven Engineering and Software Development (Modelsward'2016), p.48, 2016.
URL : https://hal.archives-ouvertes.fr/hal-02287286

T. Madl, J. Brückmann, and H. Hof, Can obfuscation by randomization (canora

K. Mahaffey, Hacking a tesla model s: What we found and what we learned, 2015.

M. Marchetti and D. Stabili, Anomaly detection of CAN bus messages through analysis of ID sequences, Intelligent Vehicles Symposium (IV), 2017 IEEE, vol.39, p.41, 2017.

J. Edward and . Markey, Tracking & hacking: Security & privacy gaps put american drivers at risk. US Senate, 2015.

F. Martinelli, F. Mercaldo, V. Nardone, A. Orlando, and A. Santone, Whoâ??s driving my car? a machine learning based approach to driver identification, vol.15, p.32, 2018.

F. Martinelli, F. Mercaldo, A. Orlando, V. Nardone, A. Santone et al., Human behavior characterization for driving style recognition in vehicle system, Computers & Electrical Engineering, vol.15, p.32, 2018.

S. Mauw and M. Oostdijk, Foundations of attack trees, International Conference on Information Security and Cryptology, vol.45, p.68, 2005.

C. Miller and C. Valasek, Adventures in automotive networks and control units, DEF CON, vol.21, p.39, 2013.

C. Miller and C. Valasek, Remote exploitation of an unaltered passenger vehicle, Black Hat USA, vol.39, p.41, 2015.

K. Müller, R. Ulrich, A. Stanitzki, and R. Kokozinski, Enabling secure boot functionality by using physical unclonable functions, 14th Conference on Ph. D. Research in Microelectronics and Electronics (PRIME), p.20, 2018.

P. Mundhenk, A. Mrowca, S. Steinhorst, M. Lukasiewycz, A. Suhaib et al., Open source model and simulator for real-time performance analysis of automotive network security, Acm Sigbed Review, vol.13, issue.3, p.36, 2016.

P. Mundhenk, A. Paverd, A. Mrowca, S. Steinhorst, M. Lukasiewycz et al., Security in automotive networks: Lightweight authentication and authorization, ACM Transactions on Design Automation of Electronic Systems (TODAES), vol.22, issue.2, p.36, 2017.

M. Müter and N. Asaj, Entropy-based anomaly detection for in-vehicle networks, Intelligent Vehicles Symposium (IV), 2011 IEEE, vol.40, p.41, 2011.

M. Müter, A. Groll, and F. C. Freiling, A structured approach to anomaly detection for in-vehicle networks, Information Assurance and Security (IAS), 2010.

, Sixth International Conference on, vol.39, p.41, 2010.

S. Sandeep-nair-narayanan, A. Mittal, and . Joshi, OBDSecureAlert: An Anomaly Detection System for Vehicles, Smart Computing (SMARTCOMP), 2016.

, IEEE International Conference on, vol.40, p.41, 2016.

U. E. Dennis-k-nilsson, E. Larson, and . Jonsson, Efficient in-vehicle delayed data authentication based on compound message authentication codes, Vehicular Technology Conference, p.35, 2008.

X. Ou, S. Govindavajhala, and A. W. Appel, Mulval: A logic-based network security analyzer, USENIX security, p.48, 2005.

A. Palanca, E. Evenchick, F. Maggi, and S. Zanero, A stealth, selective, link-layer denial-of-service attack against automotive networks, International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment, vol.32, p.34, 2017.

F. Pedregosa, G. Varoquaux, A. Gramfort, V. Michel, B. Thirion et al., Scikit-learn: Machine learning in python, Journal of machine learning research, vol.12, p.127, 2011.
URL : https://hal.archives-ouvertes.fr/hal-00650905

C. Phillips and L. P. Swiler, A graph-based system for networkvulnerability analysis, Proceedings of the 1998 workshop on New security paradigms, p.48, 1998.

S. Picek, A. Heuser, A. Jovic, S. Bhasin, and F. Regazzoni, The curse of class imbalance and conflicting metrics with machine learning for sidechannel evaluations, IACR Trans. Cryptogr. Hardw. Embed. Syst, vol.2019, issue.1, p.127, 2019.
URL : https://hal.archives-ouvertes.fr/hal-01935318

S. Pinchinat, M. Acher, and D. Vojtisek, Towards synthesis of attack trees for supporting computer-aided risk analysis, International Conference on Software Engineering and Formal Methods, p.45, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01064645

A. Rensink, The groove simulator: A tool for state space generation, International Workshop on Applications of Graph Transformations with Industrial Relevance, p.60, 2003.

W. Ronald, P. Ritchey, and . Ammann, Using model checking to analyze network vulnerabilities, S&P 2000. Proceedings. 2000 IEEE Symposium on, p.48, 2000.

G. E. David-e-rumelhart, R. Hinton, and . Williams, Learning representations by back-propagating errors, nature, vol.323, issue.6088, p.116, 1986.

M. Salfer and C. Eckert, Attack surface and vulnerability assessment of automotive electronic control units, e-Business and Telecommunications (ICETE), vol.4, p.52, 2015.

M. Salfer, H. Schweppe, and C. Eckert, Efficient attack forest construction for automotive on-board networks, International Conference on Information Security, vol.46, p.48, 2014.

, Bruce Schneier. Attack trees. Dr. Dobbâ??s journal, vol.24, issue.12, p.68, 1999.

H. Schweppe and Y. Roudier, Security and privacy for in-vehicle networks, Vehicular Communications, Sensing, and Computing (VCSC), p.21, 2012.

H. Schweppe, Y. Roudier, B. Weyl, L. Apvrille, and D. Scheuermann, Car2x communication: securing the last meter-a cost-effective approach for ensuring trust in car2x applications using in-vehicle symmetric cryptography, Vehicular Technology Conference (VTC Fall), p.36, 2011.

O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, Automated generation and analysis of attack graphs, Proceedings. 2002 IEEE Symposium on, vol.46, p.48, 2002.

C. Smith, The Car Hacker's Handbook: A Guide for the Penetration Tester, vol.15, p.34, 2016.

H. M. Song, H. R. Kim, and H. Kim, Intrusion detection system based on the analysis of time intervals of can messages for in-vehicle network, 2016 international conference on information networking (ICOIN), vol.39, p.41, 2016.

, CAN Specification. Version 2.0. Robert Bosch GmbH, p.27, 1991.

I. Studnia, E. Alata, V. Nicomette, M. Kaâniche, and Y. Laarouchi, A language-based intrusion detection approach for automotive embedded networks, The 21st IEEE Pacific Rim International Symposium on Dependable Computing (PRDC 2015), vol.39, p.41, 2014.
URL : https://hal.archives-ouvertes.fr/hal-01967640

I. Studnia, E. Alata, V. Nicomette, M. Kaâniche, and Y. Laarouchi, A language-based intrusion detection approach for automotive embedded networks, International Journal of Embedded Systems, vol.10, issue.1, p.41, 2018.
URL : https://hal.archives-ouvertes.fr/hal-01967640

I. Studnia, V. Nicomette, E. Alata, Y. Deswarte, M. Kaaniche et al., Survey on security threats and protection mechanisms in embedded automotive networks, 2013 43rd Annual IEEE/IFIP Conference on Dependable Systems and Networks Workshop (DSN-W), p.20, 2013.
URL : https://hal.archives-ouvertes.fr/hal-01176042

A. Taylor, N. Japkowicz, and S. Leblanc, Frequency-based anomaly detection for the automotive CAN bus, Industrial Control Systems Security (WCICSS), 2015 World Congress on, vol.39, p.41, 2015.

A. Taylor, S. Leblanc, and N. Japkowicz, Anomaly detection in automobile control network data with long short-term memory networks, Data Science and Advanced Analytics (DSAA), 2016 IEEE International Conference on, vol.39, p.41, 2016.

A. Technologies and . Securitree,

C. Chee-wooi-ten, M. Liu, and . Govindarasu, Vulnerability assessment of cybersecurity for scada systems using attack trees, Power Engineering Society General Meeting, p.46, 2007.

C. Valasek and C. Miller, A survey of remote automotive attack surfaces, p.18, 2014.

A. Van-herrewege, D. Singelee, and I. Verbauwhede, Canauth-a simple, backward compatible broadcast authentication protocol for can bus, ECRYPT Workshop on Lightweight Cryptography, vol.2011, p.36, 2011.

D. Wagner and . Dean, Intrusion detection via static analysis, Proceedings. 2001 IEEE Symposium on, p.21, 2001.

M. Wolf, A. Weimerskirch, and T. Wollinger, State of the art: Embedding security in vehicles, EURASIP Journal on Embedded Systems, issue.1, p.20, 2007.