1 |
GUAN T, HAN Y, KANG N, et al. An overview of vehicular cybersecurity for intelligent connected vehicles[J]. Sustainability, 2022, 14(9): 5211.
|
2 |
MILLER C, VALASEK C. A survey of remote automotive attack surfaces[J]. Black Hat USA, 2014: 94.
|
3 |
章嘉彦, 李飞, 李如翔, 等. V2X 通信中基于椭圆曲线加密算法的身份认证研究[J]. 汽车工程, 2020, 42(1): 27-32.
|
|
ZHANG J, LI F, LI R, et al. Research on identity authentication in V2X communications based on elliptic curve encryption algorithm [J]. Automotive Engineering, 2020, 42(1): 27-32.
|
4 |
CHOW M C, MA M, PAN Z. Attack models and countermeasures for autonomous vehicles[M]. Intelligent Technologies for Internet of Vehicles. Springer, Cham, 2021: 375-401.
|
5 |
HAN M, WAN A, ZHANG F, et al. An attribute-isolated secure communication architecture for intelligent connected vehicles[J]. IEEE Transactions on Intelligent Vehicles, 2020, 5(4): 545-555.
|
6 |
PARK J S, KIM D H, SUH I H. Design and implementation of security function according to routing method in automotive gateway[J]. International Journal of Automotive Technology, 2021, 22(1): 19-25.
|
7 |
MURVAY P S, GROZA B. Security shortcomings and countermeasures for the SAE J1939 commercial vehicle bus protocol[J]. IEEE Transactions on Vehicular Technology, 2018, 67(5): 4325-4339.
|
8 |
ZHU H, ZHOU W, LI Z, et al. Requirements-driven automotive electrical/electronic architecture: a survey and prospective trends[J]. IEEE Access, 2021, 9: 100096-100112.
|
9 |
LAUTENBACH A, ALMGREN M, OLOVSSON T. Proposing HEAVENS 2.0-an automotive risk assessment model[C]. Computer Science in Cars Symposium, 2021: 1-12.
|
10 |
HENNIGER O, RUDDLE A, SEUDIE H, et al. Securing vehicular on-board it systems: the evita project[C]. VDI/VW Automotive Security Conference, 2009: 41.
|
11 |
SANDGREN H, ANTINVAN V. Software safety analysis to support ISO 26262-6 compliance in agile development[J]. IEEE Software, 2020, 38(3): 52-60.
|
12 |
ROULAND Q, HAMID B, JASKOLKA J. Specification, detection, and treatment of STRIDE threats for software components: modeling, formal methods, and tool support[J]. Journal of Systems Architecture, 2021, 117: 102073.
|
13 |
GHOSAL A, HALDER S, CONTI M. STRIDE: scalable and secure over-the-air software update scheme for autonomous vehicles[C]. ICC 2020-2020 IEEE International Conference on Communications (ICC). IEEE, 2020: 1-6.
|
14 |
LI X, YU Y, SUN G, et al. Connected vehicles' security from the perspective of the in-vehicle network[J]. IEEE Network, 2018, 32(3): 58-63.
|
15 |
BOZDALl M, SAMIE M, ASLAM S, et al. Evaluation of can bus security challenges[J]. Sensors, 2020, 20(8): 2364.
|
16 |
HUANG J, ZHAO M, ZHOU Y, et al. In-vehicle networking: protocols, challenges, and solutions[J]. IEEE Network, 2018, 33(1): 92-98.
|
17 |
JO H J, KIM J H, CHOI H Y, et al. Mauth-can: masquerade-attack-proof authentication for in-vehicle networks[J]. IEEE Transactions on Vehicular Technology, 2019, 69(2): 2204-2218.
|
18 |
ZELLE D, PLAPPERT C, RIEKE R, et al. ThreatSurf: a method for automated threat surface assessment in automotive cybersecurity engineering[J]. Microprocessors and Microsystems, 2022, 90: 104461.
|
19 |
LU K L, CHEN Y Y. ISO 26262 ASIL-oriented hardware design framework for safety-critical automotive systems[C]. 2019 IEEE International Conference on Connected Vehicles and Expo (ICCVE). IEEE, 2019: 1-6.
|
20 |
KWIATKOWSKA M, NORMAN G, PARKER D. Stochastic model checking[C]. International School on Formal Methods for the Design of Computer, Communication and Software Systems. Springer, Berlin, Heidelberg, 2007: 220-270.
|
21 |
KWIATKOWSKA M, NORMAN G, PARKER D. PRISM 4.0: verification of probabilistic real-time systems[C]. International Conference on Computer Aided Verification. Springer, Berlin, Heidelberg, 2011: 585-591.
|